Font Size: a A A

Design Of Several Quantum Cryptographic Protocols With Verifiability

Posted on:2022-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:L J LiuFull Text:PDF
GTID:2510306341996799Subject:Telecom Technology
Abstract/Summary:PDF Full Text Request
Quantum cryptography is a new cryptosystem.Different from the traditional cryptosystem which is based on computational complexity,the theoretical basis of it is quantum mechanics.Due to the unconditional security and the ability to detect external interference,the research of quantum cryptography has great significance and broad prospects.And it has aroused widespread attention of scholars.In this paper,quantum key distribution,quantum secret sharing and quantum key agreement in quantum cryptographic protocols are mainly studied.Besides,the design and related analysis of quantum cryptographic protocols are discussed.The concrete contents are as follows:1.In order to guarantee the authenticity of all users identities in the process of quantum key distribution,a multi-party quantum key distribution protocol which can realize identity authentication is proposed.In this protocol,the improved GV95 line is used to realize the mutual identity authentication between the distributor and the first participant,and the multi-party quantum identity authentication of the participants are completed through unitary operation.Then we analyze the correctness and security,and compare it with the existing similar protocols.It can be seen that the protocol has higher quantum efficiency and stronger practicability.2.In this charter,we design a verifiable(t,n)threshold quantum secret sharing scheme which is based on d-dimensional single bit quantum state.In this scheme,the asymmetric binary polynomials of the classical part and the unitary operation of the quantum part which is based on the mutually unbiased bases are combined to realize information transmission.And the secret is recovered through simultaneous public transmission.Furthermore,the correctness,completeness and security of the scheme are analyzed.We can see that this scheme can not only prevent external attacks,but also effectively resist internal fraud.3.For the sake of preventing quantum key agreement from being attacked by the participants,a verifiable quantum key agreement protocol based on six-qubit cluster states is constructed.In this protocol,a distributor who can be verified is introduced to resist internal attacks.And the correctness and simultaneity of the final recovered shared key are guaranteed by the trusted design combiner and homomorphic hash function.In addition,the correctness,security and comparative analysis of it show that this protocol has more advantages.
Keywords/Search Tags:quantum cryptography, quantum key distribution, identity authentication, quantum secret share, multi-party quantum key agreement
PDF Full Text Request
Related items