[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111865581A - Quantum secret sharing method and quantum communication system based on tensor network - Google Patents

Quantum secret sharing method and quantum communication system based on tensor network Download PDF

Info

Publication number
CN111865581A
CN111865581A CN202010684924.3A CN202010684924A CN111865581A CN 111865581 A CN111865581 A CN 111865581A CN 202010684924 A CN202010684924 A CN 202010684924A CN 111865581 A CN111865581 A CN 111865581A
Authority
CN
China
Prior art keywords
quantum
information
tensor network
secret
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010684924.3A
Other languages
Chinese (zh)
Other versions
CN111865581B (en
Inventor
赖红
张强
张宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Southwest University
Original Assignee
Southwest University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Southwest University filed Critical Southwest University
Priority to CN202010684924.3A priority Critical patent/CN111865581B/en
Publication of CN111865581A publication Critical patent/CN111865581A/en
Application granted granted Critical
Publication of CN111865581B publication Critical patent/CN111865581B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

本发明公开了一种基于张量网络的量子秘密共享方法及量子通信系统,利用经典信息与量子信息的对应关系重构量子态,分发者结合AKLT模型和矩阵乘积态表示法实现秘密的划分,然后将子秘密通过经典认证信道和量子信道分发给参与者。最后,秘密重构是基于张量网络态理论及(n,n)门限组恢复协议实现。秘密信息的可扩展性,量子多体态的矩阵乘积表示可扩展性、转移特性及不唯一性是本方案的最大创新点,保障了量子通信的安全可靠,解决了现有量子态秘密共享不能实现动态性构造的问题。矩阵乘积态表示的多样性以及可对应张量网络的简单图形表示使得该方案在量子网络中的量子态共享及信息安全领域具备较好的应用前景。

Figure 202010684924

The invention discloses a quantum secret sharing method and a quantum communication system based on a tensor network. The quantum state is reconstructed by using the corresponding relationship between classical information and quantum information, and the distributor realizes the division of secrets by combining the AKLT model and the matrix product state representation. The sub-secret is then distributed to the participants through classical authentication channels and quantum channels. Finally, secret reconstruction is based on the theory of tensor network state and the (n,n) threshold group recovery protocol. The scalability of secret information, the scalability of matrix product representation of quantum many-body states, transfer characteristics and non-uniqueness are the biggest innovations of this scheme, which ensure the security and reliability of quantum communication, and solve the problem that the existing quantum state secret sharing cannot be achieved. The problem of dynamic construction. The diversity of matrix product state representation and the simple graphical representation corresponding to tensor networks make the scheme have good application prospects in the fields of quantum state sharing and information security in quantum networks.

Figure 202010684924

Description

基于张量网络的量子秘密共享方法及量子通信系统Quantum secret sharing method and quantum communication system based on tensor network

技术领域technical field

本发明涉及量子通信技术,更具体地说,涉及一种基于张量网络的量子秘密共享方法及量子通信系统。The present invention relates to quantum communication technology, more particularly, to a quantum secret sharing method and quantum communication system based on tensor network.

背景技术Background technique

在量子通信系统中,现有的量子态秘密共享方案,其安全性大都依赖于传输协议,且没有考虑扩展初始秘密态,从而使得这些量子态秘密共享方案无法实现动态的功能,一旦有新参与者加入同时旧的参与者退出,初始秘密态就得丢弃。In quantum communication systems, the security of the existing quantum state secret sharing schemes mostly depends on the transmission protocol, and the expansion of the initial secret state is not considered, so that these quantum state secret sharing schemes cannot achieve dynamic functions. If the participant joins and the old participant quits, the initial secret state must be discarded.

然而,继量子计算出现以来,人们越来越关注张量网络态的理论与应用,张量网络态是一种可以用数学图形来表述的态,是一种纠缠态。是否可以将张量网络态的算法应用到量子态秘密共享中,这样就可以由同一个状态对应的矩阵乘积态的不唯一性,突破现有量子态秘密共享方案无法实现动态的功能的限制。因此,引入张量网络态是量子态秘密共享方案设计的一种突破及趋势。另外,将量子态矩阵化,就是用矩阵乘积来表示一个多粒子纠缠态,其优势在于矩阵乘积态可与简单的图形表述联系在一起。However, since the emergence of quantum computing, people have paid more and more attention to the theory and application of tensor network state, which is a state that can be represented by mathematical graphs and is an entangled state. Whether the algorithm of tensor network state can be applied to quantum state secret sharing, so that the non-uniqueness of the matrix product state corresponding to the same state can break through the limitation of the existing quantum state secret sharing scheme that cannot achieve dynamic functions. Therefore, the introduction of tensor network state is a breakthrough and trend in the design of quantum state secret sharing scheme. In addition, matrixing the quantum state is to use the matrix product to represent a multi-particle entangled state. The advantage is that the matrix product state can be related to a simple graphical representation.

鉴于上述这两方面的创新及优势,设计一种矩阵乘积态算法和图态相结合的量子态秘密共享方法很有必要。In view of the above two innovations and advantages, it is necessary to design a quantum state secret sharing method combining matrix product state algorithm and graph state.

发明内容SUMMARY OF THE INVENTION

有鉴于此,本发明首先提供一种基于张量网络的量子秘密共享方法,利用张量网络权重实现分享量子态的可扩展性,解决了量子秘密态共享方案无法实现动态变化的问题。In view of this, the present invention first provides a quantum secret sharing method based on a tensor network, which utilizes the weight of the tensor network to realize the scalability of sharing quantum states, and solves the problem that the quantum secret state sharing scheme cannot achieve dynamic changes.

为实现上述目的,本发明所采用的具体技术方案如下:For achieving the above object, the concrete technical scheme adopted in the present invention is as follows:

一种基于张量网络的量子秘密共享方法,其关键在于包括以下步骤:A quantum secret sharing method based on tensor network, the key lies in including the following steps:

S1:分发者根据参与者的数量按照预定的张量网络模型将需要共享的量子态秘密信息制备成子秘密信息,所述子秘密信息包括所述张量网络模型中每个节点的物理指标信息|σi>和键指标信息

Figure BDA0002587194170000021
n表示参与者的数量;S1: The distributor prepares the quantum state secret information to be shared into sub-secret information according to the predetermined tensor network model according to the number of participants, and the sub-secret information includes the physical index information of each node in the tensor network model| σ i > and bond index information
Figure BDA0002587194170000021
n represents the number of participants;

S2:分发者通过量子信道将每个节点的物理指标信息|σi>发送给对应的参与者Pi,并对外公布h(·)和h(xi);其中h(·)表示预定的安全哈希函数,h(xi)表示根据各个参与者的身份信息xi按照预定的安全哈希函数计算出的身份验证信息;S2: The distributor sends the physical index information |σ i > of each node to the corresponding participant P i through the quantum channel, and announces h(·) and h( xi ); where h(·) represents the predetermined a secure hash function, h( xi ) represents the identity verification information calculated according to the identity information xi of each participant according to a predetermined secure hash function;

S3:各个参与者通过检查收到的物理指标信息|σi>是否纠缠来确认是否被窃听,确认未被窃听,则通过经典信道反馈各自按照预定安全哈希函数计算的身份验证信息h'(xi)至分发者;如果h(xi)=h'(xi),则分发者认为该参与者属于合法参与者,并通过经典信道向其发送对应的键指标信息

Figure BDA0002587194170000022
S3: Each participant confirms whether they are eavesdropped by checking whether the received physical index information |σ i > is entangled, and confirms that they have not been eavesdropped, then feed back the authentication information h' ( xi ) to the distributor; if h( xi )=h'( xi ), the distributor considers the participant to be a legitimate participant, and sends the corresponding key indicator information to it through the classical channel
Figure BDA0002587194170000022

S4:各个参与者通过经典信道发送各自按照预定安全哈希函数计算的身份验证信息h”(xi);如果h(xi)=h”(xi),则该参与者属于合法参与者,各个合法参与者之间相互传输各自收到的物理指标信息|σi>和键指标信息

Figure BDA0002587194170000023
S4: Each participant sends the identity verification information h"(x i ) calculated according to the predetermined secure hash function through the classical channel; if h(x i )=h"(x i ), the participant is a legal participant , each legal participant transmits the received physical index information |σ i > and key index information to each other
Figure BDA0002587194170000023

S5:任何一个参与者收集完所有合法参与者对应的物理指标信息|σi>和键指标信息

Figure BDA0002587194170000024
后,按照步骤S1预定张量网络模型恢复分发者需要共享的量子态秘密信息。S5: Any participant collects physical index information |σ i > and key index information corresponding to all legal participants
Figure BDA0002587194170000024
Then, according to the predetermined tensor network model in step S1, the quantum state secret information that the distributor needs to share is restored.

可选地,步骤S1中预定的张量网络模型采用矩阵乘积态张量网络模型、树状张量网络模型、投影纠缠对状态张量网络模型或多尺度纠缠重组假设张量网络模型。Optionally, the predetermined tensor network model in step S1 adopts a matrix product state tensor network model, a tree-like tensor network model, a projected entanglement pair state tensor network model or a multi-scale entanglement recombination hypothesis tensor network model.

可选地,参与者的数量至少设有两个。Optionally, the number of participants is at least two.

可选地,分发者将需要共享的量子态秘密信息按照AKLT模型制备子秘密信息。Optionally, the distributor will need to share the quantum state secret information to prepare sub-secret information according to the AKLT model.

可选地,当步骤S1中预定的张量网络模型采用矩阵乘积态张量网络模型且参与者的数量为3时,所述AKLT模型为:Optionally, when the predetermined tensor network model in step S1 adopts the matrix product state tensor network model and the number of participants is 3, the AKLT model is:

Figure BDA0002587194170000031
其中|ψ>表示含有需要共享的量子态秘密信息的量子多体系统。
Figure BDA0002587194170000031
where |ψ> denotes a quantum many-body system containing the secret information of the quantum state that needs to be shared.

可选地,所述各个参与者的身份信息xi采用各自的设备物理地址信息或身份编号信息。Optionally, the identity information xi of the respective participants adopts the respective device physical address information or identity number information.

本发明还提及一种量子通信系统,其关键在于:采用上述任一所述的量子秘密共享方法进行量子秘密共享,用于实现量子签名、量子认证或量子密钥分发。The present invention also refers to a quantum communication system, the key of which is: adopting any of the quantum secret sharing methods described above to perform quantum secret sharing for realizing quantum signature, quantum authentication or quantum key distribution.

本发明的技术效果是:The technical effect of the present invention is:

采用该方法,系统安全性和可靠性更高,秘密信息的可扩展性更强,更加方便实现秘密共享的动态功能,在量子网络中的量子态共享及信息安全领域具备较好的应用前景,可以进一步应用在量子签名、认证及密钥分发等量子密码协议中,可以为安全、多样、扩展性强的量子安全通信协议的设计提供科学的理论方法。Using this method, the system security and reliability are higher, the scalability of secret information is stronger, and the dynamic function of secret sharing is more convenient to realize, and it has a good application prospect in the field of quantum state sharing and information security in quantum networks. It can be further applied in quantum cryptography protocols such as quantum signature, authentication and key distribution, and can provide scientific theoretical methods for the design of secure, diverse and highly scalable quantum secure communication protocols.

附图说明Description of drawings

下面将结合附图及实施例对本发明作进一步说明,附图中:The present invention will be further described below in conjunction with the accompanying drawings and embodiments, in which:

图1为常见的四类张量网络拓扑结构;Figure 1 shows the common four types of tensor network topology;

图2为使用AKLT模型制备矩阵乘积态的拓扑结构图;Fig. 2 is the topological structure diagram of using the AKLT model to prepare the matrix product state;

图3为矩阵乘积态转化为线性方程组的工作原理图。Fig. 3 is a working principle diagram of converting the matrix product state into a system of linear equations.

具体实施方式Detailed ways

为了使本发明要解决的技术问题、技术方案和优点更加清楚,下面将结合附图及具体实施例进行详细描述,应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。In order to make the technical problems, technical solutions and advantages to be solved by the present invention clearer, the following will be described in detail with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, not for The invention is limited.

本实施例首先提供一种基于张量网络的量子秘密共享方法,为了更好的理解其发明构思,下面先对张量网络态理论及其多样性进行简要介绍。This embodiment first provides a quantum secret sharing method based on a tensor network. In order to better understand the inventive concept, the following briefly introduces the state theory of a tensor network and its diversity.

张量网络不仅用于数学,也用于物理、化学和机器学习。其基本想法是:一个带有实数项的m×n矩阵M可以表示从R^n→R^m的线性映射。这样的映射可以被描绘成具有两条边的节点。一条边表示输入空间,另一条边表示输出空间。换句话说,矩阵是一个二维的数组,而一个n维的数组被称为一个n阶张量或一个n-张量。例如,一个数字可以被认为是一个零维数组,即一个点,因此,它是一个0-张量,可以绘制为一个边为零的节点。同样地,一个向量可以被认为是一个一维的数组,因此是一个1-张量。它由一个具有一条边的节点表示。矩阵是二维数组,因此是2-张量。它由一个有两条边的节点表示。三维张量是一个三维数组,因此是一个有三条边的节点。将两个或更多张量的乘积由一组节点和边表示,其中具有相同索引的边发生缩并,然后将多个张量(包含向量、矩阵、高阶张量)按照特定规则缩并,形成一个网络,称为张量网络,每个张量网络中的节点即可通过物理指标和键指标进行限定。Tensor networks are not only used in mathematics, but also in physics, chemistry and machine learning. The basic idea is that an m×n matrix M with real entries can represent a linear mapping from R^n→R^m. Such a map can be depicted as a node with two edges. One edge represents the input space and the other edge represents the output space. In other words, a matrix is a two-dimensional array, and an n-dimensional array is called an n-order tensor or an n-tensor. For example, a number can be thought of as a zero-dimensional array, i.e. a point, so it is a 0-tensor that can be drawn as a node with zero edges. Likewise, a vector can be thought of as a one-dimensional array, and thus a 1-tensor. It is represented by a node with one edge. Matrices are two-dimensional arrays, and thus 2-tensors. It is represented by a node with two edges. A three-dimensional tensor is a three-dimensional array, and thus a node with three edges. The product of two or more tensors is represented by a set of nodes and edges, and the edges with the same index are collapsed, and then multiple tensors (including vectors, matrices, and higher-order tensors) are collapsed according to specific rules. , forming a network called a tensor network, and the nodes in each tensor network can be defined by physical indicators and key indicators.

如图1所示,目前最成功的四类张量网络分别是:图1(a)所示的矩阵乘积态张量网络模型(matrix product state,MPS);图1(b)所示的投影纠缠对状态张量网络模型(Projected Entangled Pair State,PEPS);图1(c)所示的树状张量网络模型(treetensor network,TTN)和图1(d)所示的多尺度纠缠重组假设张量网络模型(multiscaleentanglement renormalisation ansatz,MERA),其中仅底层中的张量具有物理索引。As shown in Figure 1, the four most successful types of tensor networks are: the matrix product state (MPS) network model shown in Figure 1(a); the projection shown in Figure 1(b) The entangled pair state tensor network model (Projected Entangled Pair State, PEPS); the tree tensor network model (treetensor network, TTN) shown in Figure 1(c) and the multi-scale entanglement recombination hypothesis shown in Figure 1(d) A tensor network model (multiscaleentanglement renormalisation ansatz, MERA) where only tensors in the bottom layer have physical indices.

然而对于一个具有n个自由度的量子多体系统而言,可以表示为:However, for a quantum many-body system with n degrees of freedom, it can be expressed as:

Figure BDA0002587194170000051
Figure BDA0002587194170000051

其中系数可以写成多个张量的乘积:where the coefficients can be written as the product of multiple tensors:

Figure BDA0002587194170000052
Figure BDA0002587194170000052

这时就有:

Figure BDA0002587194170000053
Then there is:
Figure BDA0002587194170000053

从而就被称为矩阵乘积态(MPS),因为一个量子多体系统的波函数可以在某组正交基下做展开,而正交基的个数有无穷个,故矩阵乘积态表示不唯一。Therefore, it is called a matrix product state (MPS), because the wave function of a quantum many-body system can be expanded under a certain set of orthonormal bases, and the number of orthonormal bases is infinite, so the matrix product state is not unique. .

基于上述原理,本实施例将矩阵乘积态应用到量子态秘密共享领域中,从而提出一种基于张量网络的量子秘密共享方法,以3个参与者为例,采用矩阵乘积态张量网络模型,具体包括以下步骤:Based on the above principles, this embodiment applies the matrix product state to the field of quantum state secret sharing, thereby proposing a quantum secret sharing method based on tensor networks. Taking three participants as an example, the matrix product state tensor network model is adopted. , which includes the following steps:

S1:分发者根据参与者的数量按照矩阵乘积态张量网络模型将需要共享的量子态秘密信息按照AKLT模型制备成子秘密信息,所述AKLT模型为:

Figure BDA0002587194170000054
其中|ψ>表示含有需要共享的量子态秘密信息的量子多体系统,所述子秘密信息包括所述张量网络模型中每个节点的物理指标信息|σ1>,|σ2>,|σ3>和键指标信息
Figure BDA0002587194170000061
S1: The distributor prepares the quantum state secret information to be shared into sub-secret information according to the AKLT model according to the matrix product state tensor network model according to the number of participants. The AKLT model is:
Figure BDA0002587194170000054
where |ψ> represents a quantum many-body system containing secret information of quantum states to be shared, and the sub-secret information includes physical index information of each node in the tensor network model |σ 1 >, |σ 2 >, | σ 3 > and bond index information
Figure BDA0002587194170000061

S2:分发者通过量子信道将每个节点的物理指标信息|σ1>,|σ2>,|σ3>发送给对应的参与者P1,P2,P3,并对外公布h(·)和h(x1),h(x2),h(x3);其中h(·)表示预定的安全哈希函数,h(xi)表示根据各个参与者的身份信息xi按照预定的安全哈希函数计算出的身份验证信息,具体实施时,各个参与者的身份信息可以采用各自的设备物理地址信息或身份编号信息;S2: The distributor sends the physical index information of each node |σ 1 >, |σ 2 >, |σ 3 > to the corresponding participants P 1 , P 2 , P 3 through the quantum channel, and announces h(· ) and h(x 1 ), h(x 2 ), h(x 3 ); where h(·) represents a predetermined secure hash function, and h(x i ) represents a predetermined security hash function according to each participant’s identity information xi The identity verification information calculated by the secure hash function of , in the specific implementation, the identity information of each participant can use their own device physical address information or identity number information;

S3:各个参与者通过检查收到的物理指标信息|σ1>,|σ2>,|σ3>是否纠缠来确认是否被窃听,确认未被窃听,则通过经典信道反馈各自按照预定安全哈希函数计算的身份验证信息h'(xi)至分发者;如果h(xi)=h'(xi),则分发者认为该参与者属于合法参与者,并通过经典信道向其发送对应的键指标信息;S3: Each participant confirms whether they are eavesdropped by checking whether the received physical index information |σ 1 >, |σ 2 >, |σ 3 > is entangled, and if it is confirmed that it has not been eavesdropped, then feed back through the classical channel according to the predetermined security. The authentication information h'(x i ) calculated by the hash function is sent to the distributor; if h(x i )=h'(x i ), the distributor considers the participant to be a legitimate participant and sends it to it through the classical channel Corresponding key indicator information;

S4:各个参与者通过经典信道发送各自按照预定安全哈希函数计算的身份验证信息h”(xi);如果h(xi)=h”(xi),则该参与者属于合法参与者,各个合法参与者之间相互传输各自收到的物理指标信息和键指标信息;S4: Each participant sends the identity verification information h"(x i ) calculated according to the predetermined secure hash function through the classical channel; if h(x i )=h"(x i ), the participant is a legal participant , each legal participant transmits the physical index information and key index information received by each other;

S5:任何一个参与者收集完所有合法参与者对应的物理指标信息|σ1>,|σ2>,|σ3>和键指标信息

Figure BDA0002587194170000062
后,按照步骤S1预定的矩阵乘积态张量网络模型即可恢复分发者需要共享的量子态秘密信息。S5: Any participant collects physical indicator information |σ 1 >, |σ 2 >, |σ 3 > and key indicator information corresponding to all legal participants
Figure BDA0002587194170000062
Then, according to the predetermined matrix product state tensor network model in step S1, the quantum state secret information that the distributor needs to share can be recovered.

本实施例还提供一种量子通信系统,采用上述量子秘密共享方法进行量子秘密共享,用于实现量子签名、量子认证或量子密钥分发。This embodiment also provides a quantum communication system, which adopts the above quantum secret sharing method for quantum secret sharing, which is used to realize quantum signature, quantum authentication or quantum key distribution.

实施过程中所提及的AKLT模型结构如图2所示,属于量子通信领域的经典模型,图2中矩阵

Figure BDA0002587194170000063
的值是由一个秘密矩阵M来决定的,使得矩阵乘积态张量网络模型中各张量的关联关系与每一个纠缠态的纠缠特性有关系,具体内容可参考文献:Affleck,Ian,TomKennedy,Elliott Lieb,and Hal Tasaki."Rigorous results on valence-bond groundstates in antiferromagnets."Physical Review Letters 59,no.7(1987):799-802.The AKLT model structure mentioned in the implementation process is shown in Figure 2, which belongs to the classical model in the field of quantum communication. The matrix in Figure 2
Figure BDA0002587194170000063
The value of is determined by a secret matrix M, so that the relationship between the tensors in the matrix product state tensor network model is related to the entanglement characteristics of each entangled state. For details, please refer to the literature: Affleck, Ian, TomKennedy, Elliott Lieb, and Hal Tasaki. "Rigorous results on valence-bond groundstates in antiferromagnets." Physical Review Letters 59, no. 7(1987): 799-802.

通过本实施例提供的技术方案可以看出,将初始秘密设置在量子多体系统|ψ>中.假设不诚信者或者攻击者想要窃取秘密信息,且截获到了两份子秘密时,通过

Figure BDA0002587194170000071
来求解秘密态|ψ>,其过程相当于图3所示的求解2个3元一次线性方程组,信息的不确定性仍为其本身,因此通过所获得信息得不到任何关于秘密的信息量。It can be seen from the technical solution provided in this embodiment that the initial secret is set in the quantum many-body system |ψ>. Assuming that a dishonest person or an attacker wants to steal secret information and intercepts two secrets, the
Figure BDA0002587194170000071
to solve the secret state |ψ>, the process is equivalent to solving two 3-element linear equations shown in Figure 3, the uncertainty of the information is still itself, so no information about the secret can not be obtained through the obtained information quantity.

而矩阵乘积态张量网络应用的前提是构造一个秘密矩阵M,而这种前提条件恰恰使得秘密信息可扩展,秘密矩阵多样化,并且成为其他量子秘密共享方案所不具备的创新点和优势。The premise of the application of matrix product state tensor network is to construct a secret matrix M, and this premise makes the secret information scalable, the secret matrix is diversified, and becomes the innovation and advantage that other quantum secret sharing schemes do not have.

由于矩阵态的不唯一性,从而很容易实现秘密共享的动态功能。一旦有参与者的更新(即旧的参与者退出和新的参与者加入),我们可以利用不同的秘密矩阵M来重新构建矩阵乘积态使得该量子态可以继续使用,而不会影响到共享态的安全性。Due to the non-uniqueness of the matrix state, it is easy to realize the dynamic function of secret sharing. Once there is an update of the participants (that is, the old participant quits and the new participant joins), we can use a different secret matrix M to reconstruct the matrix product state so that the quantum state can continue to be used without affecting the shared state security.

此外,矩阵乘积态的应用,不仅仅使得方案更利于图形化表述,更重要的是|Ψ>中的|σ1>,|σ2>,|σ3>和

Figure BDA0002587194170000072
使得参与者与量子多体态|Ψ>之间是相互独立的,即当参与者个人进行测量时,并不能够获取到自己手中的信息,因为子秘密信息会随着测量,通过矩阵乘积操作将秘密转移出去。值得注意的是,秘密信息的转移并不意味着任意的物理上的操作或者改变态的本身,其仅仅是对物理态的重新标记。In addition, the application of the matrix product state not only makes the scheme more convenient for graphical representation, but more importantly, the |σ 1 >, |σ 2 >, |σ 3 > and |σ 3 > in |Ψ>
Figure BDA0002587194170000072
Make the participants and the quantum many-body state |Ψ> independent of each other, that is, when the participants personally measure, they cannot obtain the information in their own hands, because the sub-secret information will be measured along with the measurement, through the matrix product operation. Secretly transferred out. It is worth noting that the transfer of secret information does not imply any physical manipulation or changing the state itself, it is merely a relabeling of the physical state.

综上可以看出,本发明提出的一种基于张量网络的量子秘密共享方法及量子通信系统,利用经典信息与量子信息的对应关系重构量子态,分发者结合AKLT模型和矩阵乘积态表示法实现秘密的划分,然后将子秘密通过经典认证信道和量子信道分发给参与者。最后,秘密重构是基于张量网络态理论及(n,n)门限组恢复协议实现。秘密信息的可扩展性,量子多体态的矩阵乘积表示可扩展性、转移特性及不唯一性是本方案的最大创新点,保障了量子通信的安全可靠,解决了现有量子态秘密共享不能实现动态性构造的问题。矩阵乘积态表示的多样性以及可对应张量网络的简单图形表示使得该方案在量子网络中的量子态共享及信息安全领域具备较好的应用前景。更重要的是这些理论都可以进一步应用在量子签名、认证及密钥分发等量子密码协议中,可以为安全、多样、扩展性强的量子安全通信协议的设计提供科学的理论方法。To sum up, it can be seen that a quantum secret sharing method and quantum communication system based on tensor network proposed by the present invention utilizes the correspondence between classical information and quantum information to reconstruct the quantum state, and the distributor combines the AKLT model and the matrix product state representation. The method realizes the division of secrets, and then distributes the sub-secrets to participants through classical authentication channels and quantum channels. Finally, secret reconstruction is based on the theory of tensor network state and the (n,n) threshold group recovery protocol. The scalability of secret information, the scalability of matrix product representation of quantum many-body states, transfer characteristics and non-uniqueness are the biggest innovations of this scheme, which ensure the security and reliability of quantum communication, and solve the problem that the existing quantum state secret sharing cannot be achieved. The problem of dynamic construction. The diversity of matrix product state representation and the simple graphical representation corresponding to tensor networks make the scheme have good application prospects in the fields of quantum state sharing and information security in quantum networks. More importantly, these theories can be further applied in quantum cryptographic protocols such as quantum signature, authentication and key distribution, and can provide scientific theoretical methods for the design of secure, diverse and highly scalable quantum secure communication protocols.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器或者网络设备等)执行本发明各个实施例所述的方法。From the description of the above embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus a necessary general hardware platform, and of course hardware can also be used, but in many cases the former is better implementation. Based on this understanding, the technical solutions of the present invention can be embodied in the form of software products in essence or the parts that make contributions to the prior art, and the computer software products are stored in a storage medium (such as ROM/RAM, magnetic disk, CD-ROM), including several instructions to make a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) execute the methods described in the various embodiments of the present invention.

上面结合附图对本发明的实施例进行了描述,但是本发明并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本发明的启示下,在不脱离本发明宗旨和权利要求所保护的范围情况下,还可做出很多形式,这些均属于本发明的保护之内。The embodiments of the present invention have been described above in conjunction with the accompanying drawings, but the present invention is not limited to the above-mentioned specific embodiments, which are merely illustrative rather than restrictive. Under the inspiration of the present invention, without departing from the scope of protection of the present invention and the claims, many forms can be made, which all belong to the protection of the present invention.

Claims (7)

1.一种基于张量网络的量子秘密共享方法,其特征在于包括以下步骤:1. a quantum secret sharing method based on tensor network, is characterized in that comprising the following steps: S1:分发者根据参与者的数量按照预定的张量网络模型将需要共享的量子态秘密信息制备成子秘密信息,所述子秘密信息包括所述张量网络模型中每个节点的物理指标信息|σi>和键指标信息
Figure FDA0002587194160000011
n表示参与者的数量;
S1: The distributor prepares the quantum state secret information to be shared into sub-secret information according to the predetermined tensor network model according to the number of participants, and the sub-secret information includes the physical index information of each node in the tensor network model| σ i > and bond index information
Figure FDA0002587194160000011
n represents the number of participants;
S2:分发者通过量子信道将每个节点的物理指标信息|σi>发送给对应的参与者Pi,并对外公布h(·)和h(xi);其中h(·)表示预定的安全哈希函数,h(xi)表示根据各个参与者的身份信息xi按照预定的安全哈希函数计算出的身份验证信息;S2: The distributor sends the physical index information |σ i > of each node to the corresponding participant P i through the quantum channel, and announces h(·) and h( xi ); where h(·) represents the predetermined secure hash function, h( xi ) represents the identity verification information calculated according to the predetermined secure hash function according to the identity information xi of each participant; S3:各个参与者通过检查收到的物理指标信息|σi>是否纠缠来确认是否被窃听,确认未被窃听,则通过经典信道反馈各自按照预定安全哈希函数计算的身份验证信息h'(xi)至分发者;如果h(xi)=h'(xi),则分发者认为该参与者属于合法参与者,并通过经典信道向其发送对应的键指标信息
Figure FDA0002587194160000012
S3: Each participant confirms whether they are eavesdropped by checking whether the received physical index information |σ i > is entangled, and confirms that they have not been eavesdropped, then feed back the authentication information h' ( xi ) to the distributor; if h( xi )=h'( xi ), the distributor considers the participant to be a legitimate participant, and sends the corresponding key indicator information to it through the classical channel
Figure FDA0002587194160000012
S4:各个参与者通过经典信道发送各自按照预定安全哈希函数计算的身份验证信息h”(xi);如果h(xi)=h”(xi),则该参与者属于合法参与者,各个合法参与者之间相互传输各自收到的物理指标信息|σi>和键指标信息
Figure FDA0002587194160000013
S4: Each participant sends the identity verification information h"(x i ) calculated according to the predetermined secure hash function through the classical channel; if h(x i )=h"(x i ), the participant is a legal participant , each legal participant transmits the received physical index information |σ i > and key index information to each other
Figure FDA0002587194160000013
S5:任何一个参与者收集完所有合法参与者对应的物理指标信息|σi>和键指标信息
Figure FDA0002587194160000014
后,按照步骤S1预定张量网络模型恢复分发者需要共享的量子态秘密信息。
S5: Any participant collects physical index information |σ i > and key index information corresponding to all legal participants
Figure FDA0002587194160000014
After that, according to the predetermined tensor network model in step S1, the quantum state secret information that the distributor needs to share is restored.
2.根据权利要求1所述的基于张量网络的量子秘密共享方法,其特征在于:步骤S1中预定的张量网络模型采用矩阵乘积态张量网络模型、树状张量网络模型、投影纠缠对状态张量网络模型或多尺度纠缠重组假设张量网络模型。2. The quantum secret sharing method based on tensor network according to claim 1, is characterized in that: the predetermined tensor network model in step S1 adopts matrix product state tensor network model, tree tensor network model, projection entanglement A tensor network model is assumed for a state tensor network model or multiscale entanglement reorganization. 3.根据权利要求1所述的基于张量网络的量子秘密共享方法,其特征在于:参与者的数量至少设有两个。3 . The quantum secret sharing method based on tensor network according to claim 1 , wherein the number of participants is at least two. 4 . 4.根据权利要求1所述的基于张量网络的量子秘密共享方法,其特征在于:分发者将需要共享的量子态秘密信息按照AKLT模型制备子秘密信息。4. The quantum secret sharing method based on a tensor network according to claim 1, wherein the distributor prepares the sub-secret information according to the AKLT model according to the quantum state secret information to be shared. 5.根据权利要求4所述的基于张量网络的量子秘密共享方法,其特征在于:5. the quantum secret sharing method based on tensor network according to claim 4, is characterized in that: 当步骤S1中预定的张量网络模型采用矩阵乘积态张量网络模型且参与者的数量为3时,所述AKLT模型为:
Figure FDA0002587194160000021
其中|ψ>表示含有需要共享的量子态秘密信息的量子多体系统。
When the predetermined tensor network model in step S1 adopts the matrix product state tensor network model and the number of participants is 3, the AKLT model is:
Figure FDA0002587194160000021
where |ψ> denotes a quantum many-body system containing the secret information of the quantum state that needs to be shared.
6.根据权利要求1所述的基于张量网络的量子秘密共享方法,其特征在于:所述各个参与者的身份信息xi采用各自的设备物理地址信息或身份编号信息。6 . The quantum secret sharing method based on a tensor network according to claim 1 , wherein the identity information x i of the respective participants adopts respective equipment physical address information or identity number information. 7 . 7.一种量子通信系统,其特征在于:采用权利要求1-6任一所述的量子秘密共享方法进行量子秘密共享,用于实现量子签名、量子认证或量子密钥分发。7. A quantum communication system, characterized in that the quantum secret sharing method according to any one of claims 1-6 is used for quantum secret sharing, for realizing quantum signature, quantum authentication or quantum key distribution.
CN202010684924.3A 2020-07-16 2020-07-16 Quantum secret sharing method and quantum communication system based on tensor network Active CN111865581B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010684924.3A CN111865581B (en) 2020-07-16 2020-07-16 Quantum secret sharing method and quantum communication system based on tensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010684924.3A CN111865581B (en) 2020-07-16 2020-07-16 Quantum secret sharing method and quantum communication system based on tensor network

Publications (2)

Publication Number Publication Date
CN111865581A true CN111865581A (en) 2020-10-30
CN111865581B CN111865581B (en) 2021-05-25

Family

ID=72984566

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010684924.3A Active CN111865581B (en) 2020-07-16 2020-07-16 Quantum secret sharing method and quantum communication system based on tensor network

Country Status (1)

Country Link
CN (1) CN111865581B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113655673A (en) * 2021-08-20 2021-11-16 中国科学技术大学 A device for generating two-dimensional lattice tensor network states
CN113849862A (en) * 2021-09-23 2021-12-28 北京印刷学院 Quantum signature method based on secret sharing
CN113938280A (en) * 2021-12-17 2022-01-14 北京邮电大学 Dealer semi-offline rational quantum state sharing method and device and quantum communication control system
CN114021730A (en) * 2021-11-19 2022-02-08 中国科学技术大学 Physical tensor network state data post-processing method, system, device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070215862A1 (en) * 2006-01-30 2007-09-20 Beausoleil Raymond G Methods for preparing entangled quantum states
CN103326852A (en) * 2013-06-20 2013-09-25 武汉大学 Shared key establishment method under quantum computation environment
CN103986575A (en) * 2014-06-05 2014-08-13 武汉大学 A Calculation Asymmetric Shared Key Establishment Method
CN108429615A (en) * 2018-01-10 2018-08-21 如般量子科技有限公司 A kind of Stunnel communication means and Stunnel communication systems based on quantum key
CN109379183A (en) * 2018-09-25 2019-02-22 苏州大学张家港工业技术研究院 Multi-hop lossless teleportation method based on non-maximally entangled chain channel
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation
WO2020095051A2 (en) * 2018-11-07 2020-05-14 Gtn Ltd A quantum circuit based system configured to model physical or chemical systems
CN111406380A (en) * 2017-11-28 2020-07-10 黑莓有限公司 Method and system for key agreement with half-groups

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070215862A1 (en) * 2006-01-30 2007-09-20 Beausoleil Raymond G Methods for preparing entangled quantum states
CN103326852A (en) * 2013-06-20 2013-09-25 武汉大学 Shared key establishment method under quantum computation environment
CN103986575A (en) * 2014-06-05 2014-08-13 武汉大学 A Calculation Asymmetric Shared Key Establishment Method
CN111406380A (en) * 2017-11-28 2020-07-10 黑莓有限公司 Method and system for key agreement with half-groups
CN108429615A (en) * 2018-01-10 2018-08-21 如般量子科技有限公司 A kind of Stunnel communication means and Stunnel communication systems based on quantum key
CN109379183A (en) * 2018-09-25 2019-02-22 苏州大学张家港工业技术研究院 Multi-hop lossless teleportation method based on non-maximally entangled chain channel
WO2020095051A2 (en) * 2018-11-07 2020-05-14 Gtn Ltd A quantum circuit based system configured to model physical or chemical systems
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
ANURAG ANSHU: "Convex-Split and Hypothesis Testing Approach to One-Shot Quantum Measurement Compression and Randomness Extraction", 《IEEE TRANSACTIONS ON INFORMATION THEORY》 *
ZUNAIRA BABAR等: "Duality of Quantum and Classical Error Correction Codes:Design Principles and Examples", 《IEEE COMMUNICATIONS SURVEYS&TUTORIALS》 *
刘文渊: "二维量子多体系统的张量网络态算法", 《中国博士学位论文期刊全文数据库》 *
黄瑞珍: "张量网络态的Lanczos优化方法研究", 《中国博士学位论文期刊全文数据库》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113655673A (en) * 2021-08-20 2021-11-16 中国科学技术大学 A device for generating two-dimensional lattice tensor network states
CN113655673B (en) * 2021-08-20 2024-01-23 合肥幺正量子科技有限公司 Two-dimensional square grid tensor network state generation device
CN113849862A (en) * 2021-09-23 2021-12-28 北京印刷学院 Quantum signature method based on secret sharing
CN114021730A (en) * 2021-11-19 2022-02-08 中国科学技术大学 Physical tensor network state data post-processing method, system, device and storage medium
CN113938280A (en) * 2021-12-17 2022-01-14 北京邮电大学 Dealer semi-offline rational quantum state sharing method and device and quantum communication control system
CN113938280B (en) * 2021-12-17 2022-02-25 北京邮电大学 Maker semi-offline rational quantum state sharing method, device and quantum communication control system

Also Published As

Publication number Publication date
CN111865581B (en) 2021-05-25

Similar Documents

Publication Publication Date Title
Li et al. Privacy-preserving federated learning framework based on chained secure multiparty computing
Zhu et al. A secure and efficient data integrity verification scheme for cloud-IoT based on short signature
CN111865581A (en) Quantum secret sharing method and quantum communication system based on tensor network
Yin et al. An anti-quantum transaction authentication approach in blockchain
Yang et al. New quantum key agreement protocols based on cluster states
Joy et al. Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer
CN112367167B (en) Quantum secret sharing method and system based on tensor network state dynamic compression
CN110602077A (en) Quantum block chain network anonymous election method and system based on trust evaluation
Yang et al. Three-party quantum secret sharing against collective noise
Cai et al. Multi-party quantum key agreement with five-qubit brown states
Mazloom et al. Secure parallel computation on national scale volumes of data
Yi et al. Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform
Cui A cross-chain protocol based on quantum teleportation for underlying architecture of metaverse
Zhang et al. Post-Quantum Blockchain over Lattice.
Musanna et al. A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing
Chen et al. A class of protocols for quantum private comparison based on the symmetry of states
Zhang et al. Improvements on “Secure multi-party quantum summation based on quantum Fourier transform”
Zhou et al. Multi-party semi-quantum key agreement protocol based on the four-qubit cluster states
CN109361513B (en) A User Weight Allocation Method for Shamir Secret Sharing
Li et al. A novel quantum anonymous ranking protocol
CN108833087A (en) A multi-user quantum identity authentication method based on orbital angular momentum
Liu et al. Dynamic multi-party quantum private comparison protocol with single photons in both polarization and spatial-mode degrees of freedom
Tang et al. Robust semi-quantum private comparison protocols against collective noises with decoherence-free states
Sutradhar et al. An efficient simulation of quantum secret sharing
Liu et al. ESA-FedGNN: Efficient secure aggregation for federated graph neural networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20201030

Assignee: Chongqing Shanchan Technology Co.,Ltd.

Assignor: SOUTHWEST University

Contract record no.: X2024980018986

Denomination of invention: Quantum secret sharing method and quantum communication system based on tensor network

Granted publication date: 20210525

License type: Common License

Record date: 20241029

Application publication date: 20201030

Assignee: Chongqing ruanjiang Turing Artificial Intelligence Technology Co.,Ltd.

Assignor: SOUTHWEST University

Contract record no.: X2024980018983

Denomination of invention: Quantum secret sharing method and quantum communication system based on tensor network

Granted publication date: 20210525

License type: Common License

Record date: 20241029

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20201030

Assignee: CHONGQING HONGYUELIANG TECHNOLOGY CO.,LTD.

Assignor: SOUTHWEST University

Contract record no.: X2024980021248

Denomination of invention: Quantum secret sharing method and quantum communication system based on tensor network

Granted publication date: 20210525

License type: Common License

Record date: 20241118

EE01 Entry into force of recordation of patent licensing contract