当前位置:主页 > 科技论文 > 网络通信论文 >

基于多粒子纠缠态的量子密码协议研究

发布时间:2018-11-18 11:44
【摘要】:量子密码学是经典密码学和量子力学衍生的结合体。和经典密码学相比,由于量子密码的安全性完全依赖于量子力学的基本原理,故它具备理论上的无条件安全性。因此,研究者们试图利用量子力学的基本原理来解决一些经典密码学无法解决或者难以解决的安全问题,如密钥分发、图像水印、数字签名等,并在此基础上形成了系统的理论体系。量子纠缠态作为量子信息领域的一个重要的资源,它具有十分特别的性质,即纠缠性。利用量子纠缠态的这一特性,人们设计了一些精妙的量子密码协议,如量子秘钥分发、量子隐形传态、量子并行计算等。本文对一些常见的多粒子纠缠态进行研究,并在此基础上设计了四个量子密码协议。这些协议分别是:1、基于Greenberger-Horne-Zeilinger (GHZ)态的量子公平盲签名方案。在这个方案中,我们利用哈希函数(Hash)和随机数来生成签名者、仲裁者和发送者选择的测量基的信息,再联合GHZ态的关联性分别对各自手中的粒子进行测量,进而产生签名所用的信息,最终完成整个盲签名过程。对该方案的安全性分析表明该方案满足公平盲签名方案的安全性要求,即不可伪造性、不可否认性、盲性和可追踪性。2、具有双向认证功能的多方量子密钥分发。该协议利用GHZ态的纠缠特性,实现具有双向认证功能的多方量子密钥分发协议,并利用带密钥的单向Hash函数技术对每个用户的身份进行认证。该协议的安全性分析表明该协议在理论上是安全的。3、基于最低有效位的量子图像水印。该方案通过置换载体图像灰度值的某一个比特把水印图像嵌入到量子载体图像的某些像素中。这些像素的位置是由一个私钥决定的。只有拥有这个私钥的版权者才可以在无需初始载体图像的前提下提取出水印信息。该水印方案的计算机仿真实验表明,该方案实现了水印的不可见性,并具有良好的可伸缩性。4、基于重复码的量子图像水印方案。该方案首先使用重复码对水印图像进行编码,然后把编码后的水印图像嵌入到载体图像像素点的某些灰度比特中。只有知道水印嵌入的像素点和比特位置的版权者才可以提取出水印信息。由于使用了重复码处理水印,故该水印方案具有一定的鲁棒性。此外,该水印方案的计算机仿真和分析也表明了该方案是有效的。
[Abstract]:Quantum cryptography is a combination of classical cryptography and quantum mechanics derivation. Compared with classical cryptography, the security of quantum cryptography is completely dependent on the basic principles of quantum mechanics, so it has unconditional security in theory. Therefore, researchers try to use the basic principles of quantum mechanics to solve some security problems which cannot be solved or difficult to solve by classical cryptography, such as key distribution, image watermarking, digital signature, etc. On this basis, a systematic theoretical system is formed. As an important resource in the field of quantum information, quantum entangled states have very special properties, namely entanglement. Based on the properties of quantum entangled states, some sophisticated quantum cryptographic protocols are designed, such as quantum secret key distribution, quantum teleportation, quantum parallel computation, etc. In this paper, some common multi-particle entangled states are studied, and four quantum cryptographic protocols are designed. These protocols are as follows: 1. Quantum fair blind signature scheme based on Greenberger-Horne-Zeilinger (GHZ) state. In this scheme, we use the hash function (Hash) and the random number to generate the information of the measurement basis selected by the signer, the arbiter and the sender, and then combine the correlation of the GHZ states to measure the particles in their hands, respectively. Then the information used in the signature is generated and the whole blind signature process is finally completed. The security analysis of the scheme shows that the scheme meets the security requirements of the fair blind signature scheme, that is, non-forgery, non-repudiation, blindness and traceability, and multi-party quantum key distribution with bidirectional authentication. The protocol utilizes the entanglement property of GHZ state to realize the multi-party quantum key distribution protocol with bidirectional authentication function and authenticates the identity of each user by using one-way Hash function technology with key. The security analysis of the protocol shows that the protocol is theoretically secure. 3. The quantum image watermarking based on the lowest significant bit is proposed. In this scheme, the watermark image is embedded into some pixels of the quantum carrier image by replacing a bit of the gray value of the carrier image. The location of these pixels is determined by a private key. Only the copyright owner who owns the private key can extract the watermark information without the initial carrier image. The computer simulation results show that the proposed scheme achieves the invisibility of the watermark and has good scalability. 4. Quantum image watermarking scheme based on repetition code is proposed. The scheme firstly encodes the watermark image by repetition code, and then embeds the encoded watermark image into some gray bits of the pixel of the carrier image. Only the copyright who knows the pixel and bit position of the watermark can extract the watermark. Because the watermark is processed by repeated code, the scheme is robust to a certain extent. In addition, the computer simulation and analysis of the watermarking scheme also show that the scheme is effective.
【学位授予单位】:福建师范大学
【学位级别】:硕士
【学位授予年份】:2015
【分类号】:O413;TN918.4

【参考文献】

相关期刊论文 前2条

1 ;Experimental implementation of a fixed-point duality quantum search algorithm in the nuclear magnetic resonance quantum system[J];Science China(Physics,Mechanics & Astronomy);2011年05期

2 吴华;赵于康;赵勇;赵梅生;;实用化光纤量子加密电话网络和高速数据传输系统——现场应用与安全管理[J];中国科学:信息科学;2014年03期



本文编号:2339952

资料下载
论文发表

本文链接:https://www.wllwen.com/kejilunwen/wltx/2339952.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户4e9b0***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com