[go: up one dir, main page]

CN114640449A - A multi-user high-dimensional quantum privacy block query method - Google Patents

A multi-user high-dimensional quantum privacy block query method Download PDF

Info

Publication number
CN114640449A
CN114640449A CN202210320072.9A CN202210320072A CN114640449A CN 114640449 A CN114640449 A CN 114640449A CN 202210320072 A CN202210320072 A CN 202210320072A CN 114640449 A CN114640449 A CN 114640449A
Authority
CN
China
Prior art keywords
quantum
user
bob
sequence
alice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210320072.9A
Other languages
Chinese (zh)
Other versions
CN114640449B (en
Inventor
宋秀丽
胡思文
李福彦
何兴平
吴煜铮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Digital Cloud Information Technology Co ltd
Hefei Shenzhou Kuntai Information Technology Co ltd
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN202210320072.9A priority Critical patent/CN114640449B/en
Publication of CN114640449A publication Critical patent/CN114640449A/en
Application granted granted Critical
Publication of CN114640449B publication Critical patent/CN114640449B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

本发明属于量子计算和量子信息领域,具体涉及一种多用户的高维量子隐私块查询方法,该方法包括:构建多用户量子隐私块查询系统,该系统包括查询用户、数据库持有者以及半可信量子服务器;采用量子密钥分配方法分别对隐私块查询系统中的查询用户和数据库持有者分配量子密钥;数据库持有者和查询用户采用分配的量子密钥对数据库中的数据进行加密,得到密文数据库;查询用户采用Grover量子搜索算法对密文数据库进行搜索,得到密文;查询用户根据量子密钥对密文进行解密,得到明文;本发明通过应用Grover量子搜索算法来提高用户查询想要密文的速度。

Figure 202210320072

The invention belongs to the fields of quantum computing and quantum information, and in particular relates to a multi-user high-dimensional quantum privacy block query method. The method includes: constructing a multi-user quantum privacy block query system, the system including query users, database holders and semi-private blocks. Trusted quantum server; using quantum key distribution method to distribute quantum keys to query users and database holders in the privacy block query system respectively; Encryption to obtain the ciphertext database; the query user uses the Grover quantum search algorithm to search the ciphertext database to obtain the ciphertext; the query user decrypts the ciphertext according to the quantum key to obtain the plaintext; the invention improves the performance by applying the Grover quantum search algorithm. The speed at which the user queries the desired ciphertext.

Figure 202210320072

Description

一种多用户的高维量子隐私块查询方法A multi-user high-dimensional quantum privacy block query method

技术领域technical field

本发明属于量子计算和量子信息领域,具体涉及一种多用户的高维量子隐私块查询方法。The invention belongs to the field of quantum computing and quantum information, in particular to a multi-user high-dimensional quantum privacy block query method.

背景技术Background technique

隐私信息检索旨在保护用户的个人隐私,当用户访问数据库时,数据库并不知道Alice感兴趣的是哪个数据条目。同样对于数据库来说,数据库不想让用户获得更多的隐私信息。对于经典对称隐私信息检索(Symmetrical Private Information Retrieval,SPIR),该协议不仅能保护用户隐私,还能保证Alice除了能访问感兴趣的那个数据条目以外不能访问其它任何信息。The purpose of private information retrieval is to protect the user's personal privacy. When the user accesses the database, the database does not know which data item Alice is interested in. Similarly for databases, databases do not want users to obtain more private information. For classical Symmetrical Private Information Retrieval (SPIR), this protocol can not only protect user privacy, but also ensure that Alice cannot access any other information except the data item she is interested in.

Giovannetti等人将经典的对称私有信息检索协议(SPIR)拓展到量子世界,提出了第一个基于酉操作的量子隐私查询协议(GLM)。在该协议中,使用酉操作将数据信息编码到检索态上。用户访问数据库使用两个量子态,一个量子态用于信息查询,另外一个量子态用于查询数据库是否存在欺骗行为,用来保证两方的隐私和安全。GLM协议使用了欺骗敏感策略检测数据库Bob是否窃取了用户Alice的隐私信息。Extending the classical symmetric private information retrieval protocol (SPIR) to the quantum world, Giovannetti et al. propose the first quantum privacy query protocol (GLM) based on unitary operations. In this protocol, data information is encoded into the retrieval state using unitary operations. Users access the database using two quantum states, one quantum state is used for information query, and the other quantum state is used to query the database for fraudulent behavior, which is used to ensure the privacy and security of both parties. The GLM protocol uses a deception-sensitive strategy to detect whether the database Bob has stolen the private information of user Alice.

Jakobi等人提出了使用SARG04量子密钥分配协议的实用性QPQ协议。这个协议主要有三个步骤:首先,Alice和Bob协商出不对称的初始密钥,即Alice仅知道密钥的一部分,Bob知道所有密钥;然后,通过按位加对密钥进行稀释,旨在减少Alice对密钥知道的信息,得到最终密钥;最后,用户方通过最终密钥查询到自己想要的信息。Jakobi et al. proposed a practical QPQ protocol using the SARG04 quantum key distribution protocol. There are three main steps in this protocol: first, Alice and Bob negotiate an asymmetric initial key, that is, Alice only knows part of the key, and Bob knows all the keys; then, the key is diluted by bitwise addition, aiming at Reduce the information that Alice knows about the key to obtain the final key; finally, the user can query the information he wants through the final key.

综上可知,量子隐私查询协议主要分为两类:一种是基于酉操作的量子隐私查询协议,一种是基于量子密钥分配的量子隐私查询协议。但是第一种协议的难以应用在大型数据库当中,因为高维的酉操作在量子计算机中难以实现。第二种协议大多数只考虑了单用户和单比特数据信息的查询,实用性和效率性差。In summary, quantum privacy query protocols are mainly divided into two categories: one is a quantum privacy query protocol based on unitary operations, and the other is a quantum privacy query protocol based on quantum key distribution. However, the first protocol is difficult to apply to large databases, because high-dimensional unitary operations are difficult to implement in quantum computers. Most of the second protocols only consider the query of single-user and single-bit data information, which is poor in practicability and efficiency.

发明内容SUMMARY OF THE INVENTION

为解决以上现有技术存在的问题,本发明提出了一种多用户的高维量子隐私块查询方法,该方法包括:构建多用户量子隐私块查询系统,该系统包括查询用户{Alice1,Alice2,...,Alicen}、数据库持有者Bob以及半可信量子服务器Charlie,Alicen表示第n个查询用户;采用量子密钥分配方法分别对隐私块查询系统中的查询用户和数据库持有者分配量子密钥;数据库持有者和查询用户采用分配的量子密钥对数据库中的数据进行加密,得到密文数据库;查询用户采用Grover量子搜索算法对密文数据库进行搜索,得到密文;查询用户根据量子密钥对密文进行解密,得到明文。In order to solve the above problems in the prior art, the present invention proposes a multi-user high-dimensional quantum privacy block query method, the method includes: constructing a multi-user quantum privacy block query system, the system includes query users {Alice 1 , Alice 2 ,...,Alice n }, the database holder Bob, and the semi-trusted quantum server Charlie, Alice n represents the nth query user; the quantum key distribution method is used to query the query user and database in the privacy block query system respectively The holder distributes the quantum key; the database holder and the query user use the distributed quantum key to encrypt the data in the database to obtain the ciphertext database; the query user uses the Grover quantum search algorithm to search the ciphertext database to obtain the encrypted data. The query user decrypts the ciphertext according to the quantum key to obtain the plaintext.

优选的,采用量子密钥分配方法对查询用户和数据库持有者分配量子密钥的过程包括:Preferably, the process of distributing quantum keys to query users and database holders using the quantum key distribution method includes:

S1:初始化系统,并构建密钥编码规则;S1: Initialize the system and build key encoding rules;

S2:半可信量子服务器Charlie构建d维单光子乘积态序列S,该序列长度为N=n+q+χ+δ,其中n表示数据库大小,q表示Bob与Charlie之间交互所需要的单光子乘积态的数量,χ表示查询用户与Charlie之间交互所需要的单光子乘积态的数量,δ表示Bob与查询用户之间交互所需要的单光子乘积态的数量;根据d维单光子乘积态序列S构建子序列S1和子序列S2,其中子序列S1的长度为n+q+δ,子序列S2的长度为χ;在子序列S2中依次选出第i列,将选出第i列作为子序列

Figure BDA0003571279510000021
Charlie将子序列S1发送给数据库持有者Bob,将子序列
Figure BDA0003571279510000022
发送给对应的查询用户;S2: The semi-trusted quantum server Charlie builds a d-dimensional single-photon product state sequence S, the length of which is N=n+q+χ+δ, where n represents the size of the database, and q represents the single photon required for the interaction between Bob and Charlie. The number of photon product states, χ represents the number of single-photon product states required for the interaction between the query user and Charlie, and δ represents the number of single-photon product states required for the interaction between Bob and the query user; according to the d-dimensional single-photon product state The state sequence S constructs a subsequence S1 and a subsequence S2, wherein the length of the subsequence S1 is n+q + δ, and the length of the subsequence S2 is χ ; Select the i-th column as the subsequence
Figure BDA0003571279510000021
Charlie sends the subsequence S 1 to the database holder Bob, the subsequence
Figure BDA0003571279510000022
Send to the corresponding query user;

S3:查询用户记录子序列

Figure BDA0003571279510000023
的初始位置和该序列对应的测量基,并对子序列
Figure BDA0003571279510000024
进行重新排列,得到新序列SCA;查询用户将测量基和序列SCA发送给Charlie;S3: Query user record subsequence
Figure BDA0003571279510000023
The initial position of the sequence and the corresponding measurement base of the sequence, and the subsequence
Figure BDA0003571279510000024
Perform rearrangement to obtain a new sequence S CA ; the query user sends the measurement base and sequence S CA to Charlie;

S4:Charlie根据测量基对序列SCA进行测量,并将测量结果反馈给AliceiS4: Charlie measures the sequence S CA according to the measurement base, and feeds back the measurement result to Alice i ;

S5:Alicei根据子序列

Figure BDA0003571279510000025
的初始位置对测量结果进行恢复;Charlie和Alicei通过序列SCA中的粒子执行第一次安全检测;S5: Alice i according to the subsequence
Figure BDA0003571279510000025
recover the measurement results from the initial position of ; Charlie and Alice i perform the first safety detection through the particles in the sequence S CA ;

S6:Bob记录子序列S1的初始位置和该序列对应的测量基,并对子序列S1进行重新排列;在重新排列的子序列中随机选取q个序列中的粒子构成安全检测序列SBC,其他粒子构成序列SBAS6: Bob records the initial position of the subsequence S1 and the measurement base corresponding to the sequence, and rearranges the subsequence S1 ; randomly selects particles in the q sequences from the rearranged subsequence to form the safety detection sequence S BC , and other particles form the sequence S BA ;

S7:Bob将SBC和测量机发送给Charlie,Charlie根据测量基对序列SBC中的粒子进行测量,并将测量结果反馈给Bob;S7: Bob sends S BC and the measuring machine to Charlie, Charlie measures the particles in the sequence S BC according to the measurement base, and feeds back the measurement results to Bob;

S8:Bob根据子序列S1的初始位置对测量结果进行恢复;Bob和Alicei通过序列SBC中的粒子执行第二次安全检测;S8: Bob recovers the measurement result according to the initial position of the subsequence S1; Bob and Alice i perform the second safety check through the particles in the sequence SBC ;

S9:Bob从序列SBA中抽取n个粒子,构成序列

Figure BDA0003571279510000031
获取序列SBA中δ个位置上粒子的测量基,将δ个位置上粒子的测量基和序列
Figure BDA0003571279510000032
发送给查询用户;查询用户对序列
Figure BDA0003571279510000033
中的qudit进行重排,得到序列
Figure BDA0003571279510000034
并将序列
Figure BDA0003571279510000035
转换为单光子乘积态S′BA序列;查询用户将S′BA中δ个粒子和测量基发送给Charlie;其中,qudit表示高维量子态;S9: Bob extracts n particles from the sequence S BA to form the sequence
Figure BDA0003571279510000031
Obtain the measurement basis of the particles in the δ positions in the sequence S BA , and combine the measurement basis of the particles in the δ positions with the sequence
Figure BDA0003571279510000032
Sent to the querying user; the querying user pairs the sequence
Figure BDA0003571279510000033
qudit in the rearrangement to get the sequence
Figure BDA0003571279510000034
and sequence
Figure BDA0003571279510000035
Convert to single-photon product state S′ BA sequence; the query user sends the δ particles and measurement basis in S′ BA to Charlie; where qudit represents high-dimensional quantum state;

S10:Charlie根据测量基对S′BA中的粒子进行测量,并将测量结果返回给查询用户;查询用户和Bob对S′BA中的δ个粒子进行第三次安全检测;S10: Charlie measures the particles in S' BA according to the measurement base, and returns the measurement results to the querying user; the querying user and Bob perform the third safety inspection on the δ particles in S'BA;

S11:将SBA中的其余n个粒子进行排序,形成序列S″BA;Charlie对S″BA中的粒子进行测量,并将测量结果反馈给Alicei;Alicei对测量结果的位置进行恢复,得到恢复序列

Figure BDA0003571279510000036
其中,
Figure BDA0003571279510000037
表示测量结果,该结果为十进制数值;S11: Sort the remaining n particles in S BA to form a sequence S"BA; Charlie measures the particles in S" BA and feeds back the measurement result to Alice i ; Alice i restores the position of the measurement result, get recovery sequence
Figure BDA0003571279510000036
in,
Figure BDA0003571279510000037
Indicates the measurement result, which is a decimal value;

S12:Bob将非正交qudit对

Figure BDA0003571279510000038
公布到系统中,其中|q>为Bob手中的qudit,|q>与
Figure BDA0003571279510000039
均为非正交的量子态,
Figure BDA00035712795100000310
表示经过量子傅里叶变换的量子态符号,| >表示量子中的Dirac符号;S12: Bob puts non-orthogonal qudit pairs
Figure BDA0003571279510000038
Publish to the system, where |q> is the qudit in Bob's hand, and |q> is the same as the
Figure BDA0003571279510000039
are non-orthogonal quantum states,
Figure BDA00035712795100000310
represents the quantum state symbol after quantum Fourier transform, | > represents the Dirac symbol in quantum;

S13:Alicei根据Bob公布的非正交qudit对

Figure BDA00035712795100000311
和恢复序列SM采用密钥编码规则进行密钥推测;S13: Alice i according to the non-orthogonal qudit pair announced by Bob
Figure BDA00035712795100000311
and recovery sequence S M using key encoding rules for key guessing;

S14:对推理出的密钥进行分发。S14: Distribute the deduced key.

优选的,密钥编码规则包括:Bob和n个查询用户Alicei(i=1,2,...,n)协商对应的密钥编码规则,编码规则包括:Preferably, the key encoding rule includes: Bob negotiates a corresponding key encoding rule with n query users Alice i (i=1,2,...,n), and the encoding rule includes:

Figure BDA0003571279510000041
Figure BDA0003571279510000041

其中,|0>表示量子态0,

Figure BDA0003571279510000042
表示对量子态0执行量子傅里叶变换后得到的量子态,其中量子傅里叶变换是指量子领域中对量子态的操作,
Figure BDA0003571279510000043
表示的是对量子态d-1执行量子傅里叶变换后的量子态,d表示维数。where |0> represents quantum state 0,
Figure BDA0003571279510000042
Represents the quantum state obtained by performing the quantum Fourier transform on quantum state 0, where the quantum Fourier transform refers to the operation of the quantum state in the quantum field,
Figure BDA0003571279510000043
represents the quantum state after performing the quantum Fourier transform on the quantum state d-1, where d represents the dimension.

优选的,测量基包括Zd和Xd;Zd的表达式为:Preferably, the measurement base includes Z d and X d ; the expression of Z d is:

Figure BDA0003571279510000044
Figure BDA0003571279510000044

Xd的表达式为:The expression for Xd is:

Figure BDA0003571279510000045
Figure BDA0003571279510000045

其中,Zd表示d维下的测量基,d表示维数,|j>表示量子态j,j表示为十进制的数值,Xd表示经过量子傅里叶变换的测量基,

Figure BDA0003571279510000046
表示量子态j经过量子傅里叶变化得到的量子态,k为十进制数值。Among them, Z d represents the measurement basis in the d dimension, d represents the dimension, |j> represents the quantum state j, j represents the decimal value, X d represents the measurement basis after the quantum Fourier transform,
Figure BDA0003571279510000046
Represents the quantum state obtained by quantum Fourier transformation of quantum state j, and k is a decimal value.

优选的,Charlie根据测量基对序列进行测量的过程包括:Preferably, the process that Charlie measures the sequence according to the measurement base includes:

Charlie获取量子系统的状态|q>,并构建测量算子{Mm}={M0,M1,...,Md-1};Charlie obtains the state |q> of the quantum system, and constructs the measurement operator {M m }={M 0 , M 1 ,...,M d-1 };

根据测量算子计算测量结果为m=ν的概率,概率计算的表达式为:Calculate the probability that the measurement result is m=ν according to the measurement operator, and the expression for the probability calculation is:

Figure BDA0003571279510000047
Figure BDA0003571279510000047

Figure BDA0003571279510000048
Figure BDA0003571279510000048

其中,Md-1表示测量算子,其中

Figure BDA0003571279510000049
d表示维数;m为十进制数值,v为十进制数值,p(v)表示测量结果为m=ν的概率,
Figure BDA00035712795100000410
表示Mv的共轭转置,Mv表示测量算子,<q|表示量子态q,|q>表示量子态q;Among them, M d-1 represents the measurement operator, where
Figure BDA0003571279510000049
d is the dimension; m is a decimal value, v is a decimal value, p(v) is the probability that the measurement result is m=ν,
Figure BDA00035712795100000410
represents the conjugate transpose of M v , M v represents the measurement operator, <q| represents the quantum state q, |q> represents the quantum state q;

经过测量后,量子系统的状态为:After measurement, the state of the quantum system is:

Figure BDA0003571279510000051
Figure BDA0003571279510000051

其中,

Figure BDA0003571279510000052
表示测量后的量子态
Figure BDA0003571279510000053
in,
Figure BDA0003571279510000052
Represents the quantum state after measurement
Figure BDA0003571279510000053

优选的,执行安全检测的过程包括:设置错误阈值τ,将Charlie和Alicei分别作为实体A和B;获取待安全检测序列中粒子的数量l;实体B根据初始粒子信息对实体A发送的测量结果进行对比,并根据待安全检测序列中粒子的数量l计算序列的错误率;若错误率高于设置的错误阈值,则检测终止,否则继续进行检测,直到所有的粒子检测完成。Preferably, the process of performing the security detection includes: setting an error threshold τ, and taking Charlie and Alice i as entities A and B respectively; acquiring the number l of particles in the sequence to be security detection; entity B sending a measurement to entity A according to the initial particle information The results are compared, and the error rate of the sequence is calculated according to the number l of particles in the sequence to be safely detected; if the error rate is higher than the set error threshold, the detection is terminated, otherwise the detection continues until all particles are detected.

优选的,进行密钥推测的过程包括:获取Bob的量子态|q>,并将量子态发送给Alicei;Alicei随机选取测量基,将测量基合接收到的量子态发送给Charlie;Charlie根据测量基对量子态进行测量,得到测量结果

Figure BDA0003571279510000054
并将测量结果返回给Alicei;从
Figure BDA0003571279510000055
中随机选择一个
Figure BDA0003571279510000056
Figure BDA0003571279510000057
和|q>组成布qudit对
Figure BDA0003571279510000058
Bob公布qudit对
Figure BDA0003571279510000059
其中
Figure BDA00035712795100000510
表示对|κ>执行量子傅里叶变换的量子态
Figure BDA00035712795100000511
Alicei采用选取的测量基分别对|q>和
Figure BDA00035712795100000512
进行测量,分别得到|q>和
Figure BDA00035712795100000513
的测量结果,根据测量结果确定Bob的量子态|q>,采用编码转换规则将|q>转化为十进制,得到q,该q为Alicei得到的密钥。Preferably, the process of performing key guessing includes: acquiring Bob's quantum state |q>, and sending the quantum state to Alice i ; Alice i randomly selects a measurement basis, and sends the quantum state received by the measurement basis to Charlie; Charlie Measure the quantum state according to the measurement basis to obtain the measurement result
Figure BDA0003571279510000054
and return the measurement result to Alice i ; from
Figure BDA0003571279510000055
randomly choose one
Figure BDA0003571279510000056
Will
Figure BDA0003571279510000057
and |q> form a cloth qudit pair
Figure BDA0003571279510000058
Bob announces qudit pair
Figure BDA0003571279510000059
in
Figure BDA00035712795100000510
represents a quantum state that performs a quantum Fourier transform on |κ>
Figure BDA00035712795100000511
Alice i uses the selected measurement basis to measure |q> and
Figure BDA00035712795100000512
Take measurements to get |q> and
Figure BDA00035712795100000513
According to the measurement result, Bob's quantum state |q> is determined, and |q> is converted into decimal using the coding conversion rule to obtain q, which is the key obtained by Alice i .

优选的,对推理出的密钥进行分发的过程包括:查询用户与Bob共享一组非对称密钥Kr={k0,k1,...,kn-1},其中,ki表示Kr中的第i个密钥;在非对称密钥中Bob知道所有的非对称密钥,查询用户知道自己对应的密钥;Bob对每一个ki计算

Figure BDA00035712795100000514
其中,
Figure BDA00035712795100000515
其中Qi为十进制数值,ι为十进制数值;根据Qi计算Qi′=Qimodd,其中,mod为求余符号;将所有的Q′i进行集合,得到Bob的最终密钥Kf={Q′0,Q′1,...,Q′n-1};查询用户执行和Bob相同的操作,判断查询用户中的密钥数,若密钥数小于1,则重新计算查询用户中的密钥,否则查询用户得到不同位置的密钥
Figure BDA0003571279510000061
0≤i0,i1,...,in-1≤n-1,其中下标i0,i1,...,in-1表示位置。Preferably, the process of distributing the inferred key includes: the query user and Bob share a set of asymmetric keys K r ={k 0 ,k 1 ,...,k n-1 }, where k i Represents the i-th key in K r ; in the asymmetric key, Bob knows all asymmetric keys, and the query user knows his corresponding key; Bob calculates for each k i
Figure BDA00035712795100000514
in,
Figure BDA00035712795100000515
Wherein Q i is a decimal value, ι is a decimal value; according to the calculation of Q i '=Q i modd , where mod is the remainder symbol; all Q' i are collected to obtain Bob's final key K f = {Q′ 0 ,Q′ 1 ,...,Q′ n-1 }; the query user performs the same operation as Bob, and determines the number of keys in the query user. If the number of keys is less than 1, recalculate the query user key in, otherwise query the user to get the key in a different location
Figure BDA0003571279510000061
0≤i 0 ,i 1 ,...,in -1 ≤n-1, where the subscripts i 0 ,i 1 ,...,in -1 denote positions.

优选的,采用量子密钥对数据库中的数据进行加密的过程包括:Alicei获取Kf中第i0,i1,...,in-1个位置的密钥

Figure BDA0003571279510000062
并检索第j0,j1,...,jn-1个项目
Figure BDA0003571279510000063
其中0<=j0,j1,...,jn-1<=n-1;Alicei分别计算移位数s0,s1,...sn-1,其中sλ=jλ-iλ,其中λ为十进制数值,范围在{0,1,...,n-1};把计算出的位移数s0,s1,...sn-1发送给Bob,Bob通过s0,s1,...sn-1分别对密钥Kf进行移位,形成n个
Figure BDA0003571279510000064
采用n个
Figure BDA0003571279510000065
分别对数据库中的数据进行加密,形成密文数据库ED0,ED1,...,EDn-1,其中
Figure BDA0003571279510000066
Figure BDA0003571279510000067
表示第i个密文数据库中的第n-1个密文。Preferably, the process of encrypting the data in the database by using the quantum key includes: Alice i obtains the key at the i 0 , i 1 ,..., i n- 1th position in K f
Figure BDA0003571279510000062
and retrieve the j 0 , j 1 ,...,j n-1 items
Figure BDA0003571279510000063
where 0<=j 0 , j 1 ,...,j n-1 <=n-1; Alice i calculates the shift numbers s 0 , s 1 ,...s n-1 respectively, where s λ =j λ -i λ , where λ is a decimal value in the range of {0,1,...,n-1}; send the calculated displacement numbers s 0 , s 1 ,...s n-1 to Bob, Bob shifts the key K f through s 0 , s 1 ,...s n-1 , respectively, to form n
Figure BDA0003571279510000064
use n
Figure BDA0003571279510000065
Encrypt the data in the database respectively to form a ciphertext database ED 0 ,ED 1 ,...,ED n-1 , where
Figure BDA0003571279510000066
Figure BDA0003571279510000067
Represents the n-1th ciphertext in the ith ciphertext database.

优选的,查询用户采用Grover量子搜索算法搜索密文的过程包括:Preferably, the process that the query user uses the Grover quantum search algorithm to search for ciphertext includes:

步骤1:获取密文数据库中的元素个数;Step 1: Obtain the number of elements in the ciphertext database;

步骤2:计算初始量子态|υ>,初始量子态的计算公式为:Step 2: Calculate the initial quantum state |υ>, the calculation formula of the initial quantum state is:

Figure BDA0003571279510000068
Figure BDA0003571279510000068

其中,H表示的是量子门,

Figure BDA0003571279510000069
表示σ个H门进行张量积,σ表示比特数,
Figure BDA00035712795100000610
表示量子中的张量积符号,|x>表示量子态x,n表示密文数据库中的元素个数;Among them, H represents the quantum gate,
Figure BDA0003571279510000069
represents σ H gates for tensor product, σ represents the number of bits,
Figure BDA00035712795100000610
represents the tensor product symbol in quantum, |x> represents the quantum state x, and n represents the number of elements in the ciphertext database;

步骤3:对初始量子态|υ>进行k次G迭代,得到当前数据库的状态;其计算公式为:Step 3: Perform k times of G iterations on the initial quantum state |υ> to obtain the current state of the database; the calculation formula is:

Figure BDA00035712795100000611
Figure BDA00035712795100000611

Figure BDA00035712795100000612
Figure BDA00035712795100000612

其中,G表示的是Grover算法中的一个酉算子,k表示迭代次数,θ表示角度,|j0>表示量子态j0,j0是查询用户所要找的索引下标;Among them, G represents a unitary operator in Grover algorithm, k represents the number of iterations, θ represents the angle, |j 0 > represents the quantum state j 0 , and j 0 is the index subscript that the query user is looking for;

步骤4:根据数据库的状态得到查询用户的索引下标j0Step 4: obtain the index subscript j 0 of the query user according to the state of the database;

步骤5:根据索引下标得到查询用户待查询的密文。Step 5: Obtain the ciphertext to be queried by the query user according to the index subscript.

本发明的有益效果:Beneficial effects of the present invention:

1)本发明在只需要用户方和数据库方具备近乎经典的量子能力(量子重排,接入量子信道),由第三方量子服务器Charlie提供完全量子能力。通过半量子技术大大减少用户方和数据库方的量子成本;1) The present invention only requires the user side and the database side to have near-classical quantum capabilities (quantum rearrangement, access to quantum channels), and the third-party quantum server Charlie provides full quantum capabilities. The quantum cost of the user side and the database side is greatly reduced through semi-quantum technology;

2)本发明通过应用Grover量子搜索算法来提高用户查询想要密文的速度,查询时间复杂为

Figure BDA0003571279510000071
大大提高整个方法的效率;2) The present invention improves the speed at which the user queries the desired ciphertext by applying the Grover quantum search algorithm, and the query time complexity is:
Figure BDA0003571279510000071
Greatly improve the efficiency of the whole method;

3)本发明可以支持多用户访问数据库不同位置上的一整块信息,使得本方法具有更好的实用性和高效性。3) The present invention can support multiple users to access a whole piece of information in different positions of the database, so that the method has better practicability and efficiency.

附图说明Description of drawings

图1为本发明的多用户量子隐私块查询方法流程图;1 is a flowchart of a multi-user quantum privacy block query method of the present invention;

图2为本发明中的单光子乘积态序列结构图。FIG. 2 is a structural diagram of a single-photon product state sequence in the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

一种多用户的高维量子隐私块查询方法的具体实施方式,该方法具体如下:构建多用户量子隐私块查询系统,该系统包括查询用户{Alice1,Alice2,...,Alicen}、数据库持有者Bob以及半可信量子服务器Charlie,Alicen表示第n个查询用户;采用量子密钥分配方法分别对隐私块查询系统中的查询用户和数据库持有者分配量子密钥;数据库持有者和查询用户采用分配的量子密钥对数据库中的数据进行加密,得到密文数据库;查询用户采用Grover量子搜索算法对密文数据库进行搜索,得到密文;查询用户根据量子密钥对密文进行解密,得到明文。A specific implementation of a multi-user high-dimensional quantum privacy block query method, the method is as follows: constructing a multi-user quantum privacy block query system, the system includes querying users {Alice 1 ,Alice 2 ,...,Alice n } , the database holder Bob, and the semi-trusted quantum server Charlie, Alice n represents the nth query user; the quantum key distribution method is used to respectively distribute quantum keys to the query users and database holders in the privacy block query system; the database The holder and the inquiring user encrypt the data in the database with the distributed quantum key to obtain the ciphertext database; the inquiring user uses the Grover quantum search algorithm to search the ciphertext database to obtain the ciphertext; the inquiring user uses the quantum key pair Decrypt the ciphertext to get the plaintext.

本发明中的多用户量子隐私块查询系统主要包括3类实体,即n个查询用户{Alice1,Alice2,...,Alicen},数据库D的持有者Bob,半可信量子服务器Charlie。在数据库D中存储着n个明文{D0,D1,…,Dn-1},其中Di(i=0,1,...,n-1)是一个二进制比特串,Di(i=0,1,...,n-1)的比特串长度l取决维数d,即

Figure BDA0003571279510000081
其中,
Figure BDA0003571279510000082
表示向上取整;{Alice1,Alice2,...,Alicen}和Bob只具备接入量子信道和重排量子态的能力。The multi-user quantum privacy block query system in the present invention mainly includes three types of entities, namely n query users {Alice 1 , Alice 2 ,..., Alice n }, the holder of the database D, Bob, and a semi-trusted quantum server. Charlie. There are n plaintexts {D 0 , D 1 ,...,D n-1 } stored in the database D, where D i (i=0,1,...,n-1) is a binary bit string, D i The bit string length l of (i=0,1,...,n-1) depends on the dimension d, that is
Figure BDA0003571279510000081
in,
Figure BDA0003571279510000082
Represents rounding up; {Alice 1 ,Alice 2 ,...,Alice n } and Bob only have the ability to access quantum channels and rearrange quantum states.

Charlie具备全量子能力,用于量子制备和量子测量,Charlie制备的量子态为d维单光子态集合M1和M2;其表达式为:Charlie has full quantum capability and can be used for quantum preparation and quantum measurement. The quantum states prepared by Charlie are d-dimensional single-photon state sets M 1 and M 2 ; its expression is:

Figure BDA0003571279510000083
Figure BDA0003571279510000083

Figure BDA0003571279510000084
Figure BDA0003571279510000084

其中,d表示维数,|j>表示量子态j,j表示为十进制的数值,

Figure BDA0003571279510000085
表示量子态j经过量子傅里叶变化得到的量子态,k为十进制数值Among them, d represents the dimension, |j> represents the quantum state j, and j represents the decimal value,
Figure BDA0003571279510000085
Represents the quantum state obtained by quantum Fourier transformation of quantum state j, and k is a decimal value

将d维单光子态集合M1和M2中的每个元素相互正交。Charlie执行测量操作所使用的测量基为:Each element in the d-dimensional single - photon state sets M1 and M2 is orthogonal to each other. The measurement base used by Charlie to perform the measurement operation is:

Figure BDA0003571279510000086
Figure BDA0003571279510000086

Figure BDA0003571279510000087
Figure BDA0003571279510000087

其中,Zd表示d维下的测量基,Xd表示经过量子傅里叶变换的测量基。Among them, Z d represents the measurement basis in the d dimension, and X d represents the measurement basis after the quantum Fourier transform.

采用量子密钥分配方法对查询用户和数据库持有者分配量子密钥的过程包括:The process of distributing quantum keys to query users and database holders using the quantum key distribution method includes:

S1:初始化系统,并构建密钥编码规则;S1: Initialize the system and build key encoding rules;

S2:半可信量子服务器Charlie构建d维单光子乘积态序列S,该序列长度为N=n+q+χ+δ,其中n表示数据库大小,q表示Bob与Charlie之间交互所需要的单光子乘积态的数量,χ表示查询用户与Charlie之间交互所需要的单光子乘积态的数量,δ表示Bob与查询用户之间交互所需要的单光子乘积态的数量;根据d维单光子乘积态序列S构建子序列S1和子序列S2,其中子序列S1的长度为n+q+δ,子序列S2的长度为χ;在子序列S2中依次选出第i列,将选出第i列作为子序列

Figure BDA0003571279510000091
Charlie将子序列S1发送给数据库持有者Bob,将子序列
Figure BDA0003571279510000092
发送给对应的查询用户;S2: The semi-trusted quantum server Charlie builds a d-dimensional single-photon product state sequence S, the length of which is N=n+q+χ+δ, where n represents the size of the database, and q represents the single photon required for the interaction between Bob and Charlie. The number of photon product states, χ represents the number of single-photon product states required for the interaction between the query user and Charlie, and δ represents the number of single-photon product states required for the interaction between Bob and the query user; according to the d-dimensional single-photon product state The state sequence S constructs a subsequence S1 and a subsequence S2, wherein the length of the subsequence S1 is n+q + δ, and the length of the subsequence S2 is χ ; Select the i-th column as the subsequence
Figure BDA0003571279510000091
Charlie sends the subsequence S 1 to the database holder Bob, the subsequence
Figure BDA0003571279510000092
Send to the corresponding query user;

S3:查询用户记录子序列

Figure BDA0003571279510000093
的初始位置和该序列对应的测量基,并对子序列
Figure BDA0003571279510000094
进行重新排列,得到新序列SCA;查询用户将测量基和序列SCA发送给Charlie;S3: Query user record subsequence
Figure BDA0003571279510000093
The initial position of the sequence and the corresponding measurement base of the sequence, and the subsequence
Figure BDA0003571279510000094
Perform rearrangement to obtain a new sequence S CA ; the query user sends the measurement base and sequence S CA to Charlie;

S4:Charlie根据测量基对序列SCA进行测量,并将测量结果反馈给AliceiS4: Charlie measures the sequence S CA according to the measurement base, and feeds back the measurement result to Alice i ;

S5:Alicei根据子序列

Figure BDA0003571279510000095
的初始位置对测量结果进行恢复;Charlie和Alicei通过序列SCA中的粒子执行第一次安全检测;S5: Alice i according to the subsequence
Figure BDA0003571279510000095
recover the measurement results from the initial position of ; Charlie and Alice i perform the first safety detection through the particles in the sequence S CA ;

S6:Bob记录子序列S1的初始位置和该序列对应的测量基,并对子序列S1进行重新排列;在重新排列的子序列中随机选取q个序列中的粒子构成安全检测序列SBC,其他粒子构成序列SBAS6: Bob records the initial position of the subsequence S1 and the measurement base corresponding to the sequence, and rearranges the subsequence S1 ; randomly selects particles in the q sequences from the rearranged subsequence to form the safety detection sequence S BC , and other particles form the sequence S BA ;

S7:Bob将SBC和测量机发送给Charlie,Charlie根据测量基对序列SBC中的粒子进行测量,并将测量结果反馈给Bob;S7: Bob sends S BC and the measuring machine to Charlie, Charlie measures the particles in the sequence S BC according to the measurement base, and feeds back the measurement results to Bob;

S8:Bob根据子序列S1的初始位置对测量结果进行恢复;Bob和Alicei通过序列SBC中的粒子执行第二次安全检测;S8: Bob recovers the measurement result according to the initial position of the subsequence S1; Bob and Alice i perform the second safety check through the particles in the sequence SBC ;

S9:Bob从序列SBA中抽取n个粒子,构成序列

Figure BDA0003571279510000096
获取序列SBA中δ个位置上粒子的测量基,将δ个位置上粒子的测量基和序列
Figure BDA0003571279510000097
发送给查询用户;查询用户对序列
Figure BDA0003571279510000098
中的qudit进行重排,得到序列
Figure BDA0003571279510000099
并将序列
Figure BDA00035712795100000910
转换为单光子乘积态S′BA序列;查询用户将S′BA中δ个粒子和测量基发送给Charlie;其中,qudit表示高维量子态;S9: Bob extracts n particles from the sequence S BA to form the sequence
Figure BDA0003571279510000096
Obtain the measurement basis of the particles in the δ positions in the sequence S BA , and combine the measurement basis of the particles in the δ positions with the sequence
Figure BDA0003571279510000097
Sent to the querying user; the querying user pairs the sequence
Figure BDA0003571279510000098
qudit in the rearrangement to get the sequence
Figure BDA0003571279510000099
and sequence
Figure BDA00035712795100000910
Convert to single-photon product state S′ BA sequence; the query user sends the δ particles and measurement basis in S′ BA to Charlie; where qudit represents high-dimensional quantum state;

S10:Charlie根据测量基对S′BA中的粒子进行测量,并将测量结果返回给查询用户;查询用户和Bob对S′BA中的δ个粒子进行第三次安全检测;S10: Charlie measures the particles in S' BA according to the measurement base, and returns the measurement results to the querying user; the querying user and Bob perform the third safety inspection on the δ particles in S'BA;

S11:将SBA中的其余n个粒子进行排序,形成序列S″BA;Charlie对S″BA中的粒子进行测量,并将测量结果反馈给Alicei;Alicei对测量结果的位置进行恢复,得到恢复序列

Figure BDA0003571279510000101
其中,
Figure BDA0003571279510000102
表示测量结果,该结果为十进制数值;S11: Sort the remaining n particles in S BA to form a sequence S"BA; Charlie measures the particles in S" BA and feeds back the measurement result to Alice i ; Alice i restores the position of the measurement result, get recovery sequence
Figure BDA0003571279510000101
in,
Figure BDA0003571279510000102
Indicates the measurement result, which is a decimal value;

S12:Bob将非正交qudit对

Figure BDA0003571279510000103
公布到系统中,其中|q>为Bob手中的qudit,|q>与
Figure BDA0003571279510000104
均为非正交的量子态,
Figure BDA0003571279510000105
表示经过量子傅里叶变换的量子态符号,|>表示量子中的Dirac符号;S12: Bob puts non-orthogonal qudit pairs
Figure BDA0003571279510000103
Publish to the system, where |q> is the qudit in Bob's hand, and |q> is the same as the
Figure BDA0003571279510000104
are non-orthogonal quantum states,
Figure BDA0003571279510000105
Represents the quantum state symbol after quantum Fourier transform, |> represents the Dirac symbol in quantum;

S13:Alicei根据Bob公布的非正交qudit对

Figure BDA0003571279510000106
和恢复序列SM采用密钥编码规则进行密钥推测;S13: Alice i according to the non-orthogonal qudit pair announced by Bob
Figure BDA0003571279510000106
and recovery sequence S M using key encoding rules for key guessing;

S14:对推理出的密钥进行分发。S14: Distribute the deduced key.

一种多用户的高维量子隐私块查询方法的具体实施方式,该方法如图1所述,在图1中(1.1)-(8.1)和协议过程中的序号一一对应,其中实线表示量子信道,虚线表示经典信道,G代表Grover算法。A specific implementation of a multi-user high-dimensional quantum privacy block query method, the method is described in Figure 1, in Figure 1 (1.1)-(8.1) correspond to the sequence numbers in the protocol process one-to-one, where the solid line represents Quantum channel, dotted line represents classical channel, G represents Grover algorithm.

Step1:系统初始化Step1: System initialization

(1.1)协商编码规则(1.1) Negotiate encoding rules

在系统初始化过程中,数据库持有者Bob,n个查询用户Alicei(i=1,2,...,n)和量子服务器Charlie协商传输错误率τ。Bob和n个查询用户Alicei(i=1,2,...,n)之间一开始协商对应的密钥编码规则:During the system initialization process, the database holder Bob, n query users Alice i (i=1,2,...,n) and the quantum server Charlie negotiate the transmission error rate τ. Bob and n query users Alice i (i=1,2,...,n) negotiate the corresponding key encoding rules at the beginning:

Figure BDA0003571279510000107
Figure BDA0003571279510000107

其中,|0>表示量子态0,

Figure BDA0003571279510000108
表示对量子态0执行量子傅里叶变换后得到的量子态,其中量子傅里叶变换是指量子领域中对量子态的操作;
Figure BDA0003571279510000109
表示的是对量子态d-1执行量子傅里叶变换后的量子态,d表示维数。where |0> represents quantum state 0,
Figure BDA0003571279510000108
Represents the quantum state obtained by performing the quantum Fourier transform on the quantum state 0, where the quantum Fourier transform refers to the operation of the quantum state in the quantum field;
Figure BDA0003571279510000109
represents the quantum state after performing the quantum Fourier transform on the quantum state d-1, where d represents the dimension.

(1.2)发送序列S1和S2 (1.2) Sending sequences S 1 and S 2

Charlie制备长度为N=n+q+χ+δ的d维单光子乘积态序列S,其中n+q+δ个单光子乘积态按照Bob要求进行制备,χ个单光子乘积态按照{Alice1,Alice2,...,Alicen}要求进行制备,单光子乘积态从

Figure BDA0003571279510000111
中随机选择;。其中,n表示数据库的大小;χ表示在第一次安全检测中{Alice1,Alice2,...,Alicen}与Charlie之间交互所需要的单光子乘积态的数量;q表示在第二次安全检测中Bob与Charlie之间交互所需要的单光子乘积态的数量;δ表示在第三次安全检测中Bob与{Alice1,Alice2,...,Alicen}之间交互所需要的单光子乘积态的数量。Charlie prepares a d-dimensional single-photon product state sequence S with length N=n+q+χ+δ, where n+q+δ single-photon product states are prepared according to Bob's requirements, and χ single-photon product states are prepared according to {Alice 1 ,Alice 2 ,...,Alice n } requires preparation, the single-photon product state is
Figure BDA0003571279510000111
Randomly selected from; . Among them, n represents the size of the database; χ represents the number of single-photon product states required for the interaction between {Alice 1 ,Alice 2 ,...,Alice n } and Charlie in the first security check; q represents the The number of single-photon product states required for the interaction between Bob and Charlie in the second security detection; δ represents the interaction between Bob and {Alice 1 ,Alice 2 ,...,Alice n } in the third security detection The number of single-photon product states required.

如图2.a所示,将序列S中的n+q+δ个单光子乘积态组成序列S1;如图2.b所示,χ个单光子乘积态组成序列S2,从S2中依次选出第i(i=1,2,...,n)列,生成子序列

Figure BDA0003571279510000112
Charlie将序列S1发送给Bob,将子序列
Figure BDA0003571279510000113
分别发送给Alicei(i=1,2,...,n)。As shown in Fig. 2.a, n+q+δ single-photon product states in the sequence S form a sequence S 1 ; as shown in Fig. 2.b, χ single-photon product states form a sequence S 2 , starting from S 2 Select the i-th (i=1,2,...,n) column in turn to generate a subsequence
Figure BDA0003571279510000112
Charlie sends sequence S 1 to Bob, subsequence
Figure BDA0003571279510000113
Send to Alice i (i=1,2,...,n) respectively.

Step2:粒子重排和发送Step2: Particle rearrangement and sending

(2.1)发送重排后序列SCA和SBC和SBA (2.1) Send the rearranged sequences S CA and S BC and S BA

对于序列S2中每一个成功到达Alicei(i=1,2,...,n)处的子序列

Figure BDA0003571279510000114
Alicei(i=1,2,...,n)首先记录其对应的初始位置并选择对应的测量基,然后各个Alicei(i=1,2,...,n)共同选择一个随机数重排粒子
Figure BDA0003571279510000115
中的qudit,形成序列SCA。并将SCA和测量基发送给Charlie,Charlie根据Alicei(i=1,2,...,n)告知的测量基对SCA中的粒子进行测量,并将测量结果反馈给Alicei(i=1,2,...,n),Alicei(i=1,2,...,n)将测量结果恢复至重排前位置。Charlie和Alicei(i=1,2,...,n)通过序列SCA中的粒子执行第一次安全检测,调用安全检测过程。For each subsequence in sequence S2 that successfully reaches Alice i ( i=1,2,...,n)
Figure BDA0003571279510000114
Alice i (i=1,2,...,n) first records its corresponding initial position and selects the corresponding measurement base, and then each Alice i (i=1,2,...,n) jointly selects a random Number of rearranged particles
Figure BDA0003571279510000115
qudit in , forming the sequence S CA . Send S CA and measurement base to Charlie, Charlie measures the particles in S CA according to the measurement base informed by Alice i (i=1,2,...,n), and feeds back the measurement result to Alice i ( i=1,2,...,n), Alice i (i=1,2,...,n) restores the measurement result to the position before rearrangement. Charlie and Alice i (i=1,2,...,n) perform the first security detection through the particles in the sequence S CA , calling the security detection process.

对于序列S1中每一个成功到达Bob处的单光子乘积态,Bob也记录其对应的初始位置并选择对应的测量基,然后对接收到的n+q+δ个单光子乘积态进行量子重排。其次,Bob从n+q+δ个单光子乘积态中随机选取q个组成安全检测序列SBC,并将SBC和测量基发送给Charlie,Charlie根据Bob告知的测量基对SBC中的粒子进行测量,并将测量结果反馈给Bob。Bob将测量结果恢复至重排前位置。此时Charlie和Bob通过序列SBC中的粒子执行第二次安全检测,调用安全检测过程。For each single-photon product state in the sequence S 1 that successfully reaches Bob, Bob also records its corresponding initial position and selects the corresponding measurement basis, and then performs quantum reassembly on the received n+q+δ single-photon product states. Row. Secondly, Bob randomly selects q ones from the n+q+δ single-photon product states to form the safety detection sequence S BC , and sends the S BC and the measurement base to Charlie, and Charlie pairs the particles in S BC according to the measurement base informed by Bob Take measurements and feed back the measurements to Bob. Bob restores the measurement to the pre-rearrangement position. At this time, Charlie and Bob perform the second security detection through the particles in the sequence S BC , and call the security detection process.

Bob将剩下的n+δ个单光子乘积态组成序列SBA,并将其中δ个位置上单光子乘积态对应的测量基和SBA的第1,2,...,n列形成子序列

Figure BDA0003571279510000121
序列依次发给Alicei(i=1,2,...,n)。每一个用户Alicei(i=1,2,...,n)接收到Bob发送过来的
Figure BDA0003571279510000122
(i=1,2,...,n)和δ个位置上的测量基,每一个用户Alicei(i=1,2,...,n)共同选择一个随机数ζ重排序列
Figure BDA0003571279510000123
中qudit。各个用户将重排后的序列
Figure BDA0003571279510000124
形成单光子乘积态S′BA序列。Alicei(i=1,2,...,n)先将S′BA中δ个位置上的单光子乘积态和测量基发送给Charlie,之后Charlie根据测量基对接收的粒子进行测量,返回测量结果给Alicei(i=1,2,...,n)并恢复到原来的位置上。Alicei(i=1,2,...,n)和Bob通过S′BA序列中δ个单光子乘积态执行第三次安全检测,调用安全检测过程。至此只剩下n个单光子乘积态,形成序列S″BA。Bob composes the remaining n+δ single-photon product states into a sequence S BA , and forms subsequences between the measurement basis corresponding to the single-photon product states at the δ positions and the 1st, 2nd,...,n columns of S BA sequence
Figure BDA0003571279510000121
The sequence is sent to Alice i (i=1,2,...,n) in turn. Each user Alice i (i=1,2,...,n) receives the message sent by Bob
Figure BDA0003571279510000122
(i=1,2,...,n) and the measurement basis at δ positions, each user Alice i (i=1,2,...,n) jointly selects a random number ζ rearrangement sequence
Figure BDA0003571279510000123
in qudit. Each user will rearrange the sequence
Figure BDA0003571279510000124
A sequence of single-photon product states S'BA is formed. Alice i (i=1,2,...,n) first sends the single-photon product states and measurement basis at δ positions in S' BA to Charlie, and then Charlie measures the received particles according to the measurement basis, and returns The measurement result is given to Alice i (i=1,2,...,n) and restored to the original position. Alice i (i=1, 2, . So far, only n single-photon product states remain, forming the sequence S″ BA .

执行安全检测的过程包括:设置错误阈值τ,将Charlie和Alicei分别作为实体A和B;获取待安全检测序列中粒子的数量l;实体B根据初始粒子信息对实体A发送的测量结果进行对比,并根据待安全检测序列中粒子的数量l计算序列的错误率;若错误率高于设置的错误阈值,则检测终止,否则继续进行检测,直到所有的粒子检测完成。即:The process of performing security detection includes: setting the error threshold τ, taking Charlie and Alice i as entities A and B respectively; obtaining the number l of particles in the sequence to be security detection; entity B compares the measurement results sent by entity A according to the initial particle information , and calculate the error rate of the sequence according to the number l of particles in the sequence to be safely detected; if the error rate is higher than the set error threshold, the detection is terminated; otherwise, the detection continues until all particles are detected. which is:

Figure BDA0003571279510000125
Figure BDA0003571279510000125

Figure BDA0003571279510000131
Figure BDA0003571279510000131

Step3:粒子传输与测量Step3: Particle transmission and measurement

(3.1)Charlie对S″BA中的粒子进行测量(3.1) Charlie's measurement of particles in S″ BA

当第三次安全检测完成后,Alicei(i=1,2,...,n)对S″BA中的粒子随机选择Zd或Xd基,之后把S″BA中的n个单光子乘积态和选择的测量基发送给Charlie。然后,Charlie进行相应的测量操作并把对应的测量结果反馈给Alicei(i=1,2,...,n)。最后Alicei(i=1,2,...,n)将测量结果的位置恢复到重排之前的位置,恢复后的测量结果序列为

Figure BDA0003571279510000132
序列的长度为n。When the third security check is completed, Alice i (i=1,2,...,n) randomly selects Z d or X d basis for the particles in S″ BA , and then selects n single particles in S″ BA The photon product state and the chosen measurement basis are sent to Charlie. Then, Charlie performs corresponding measurement operations and feeds back the corresponding measurement results to Alice i (i=1,2,...,n). Finally, Alice i (i=1,2,...,n) restores the position of the measurement result to the position before the rearrangement, and the restored measurement result sequence is
Figure BDA0003571279510000132
The length of the sequence is n.

一种根据测量基对序列进行测量的具体实施方式,该方法包括:d=4,测量基

Figure BDA0003571279510000133
测量算子表示为{Mm}={M0,M1,M2,M3};在测量前量子系统的状态为|2>,则结果m=2发生的可能性为:A specific implementation manner of measuring the sequence according to the measurement base, the method includes: d=4, the measurement base
Figure BDA0003571279510000133
The measurement operator is expressed as {M m }={M 0 , M 1 , M 2 , M 3 }; the state of the quantum system before the measurement is |2>, then the possibility that the result m=2 occurs is:

Figure BDA0003571279510000134
Figure BDA0003571279510000134

其中,p表示概率,

Figure BDA0003571279510000135
表示测量算子M2的共轭转置,M2表示测量算子
Figure BDA0003571279510000136
ω表示
Figure BDA0003571279510000137
相位;则
Figure BDA0003571279510000138
的表达式为:where p is the probability,
Figure BDA0003571279510000135
represents the conjugate transpose of the measurement operator M 2 , where M 2 represents the measurement operator
Figure BDA0003571279510000136
ω means
Figure BDA0003571279510000137
phase; then
Figure BDA0003571279510000138
The expression is:

Figure BDA0003571279510000139
Figure BDA0003571279510000139

测量后的状态为:The state after measurement is:

Figure BDA0003571279510000141
Figure BDA0003571279510000141

Step4:密钥推测Step4: Key guess

(4.1)Alicei(i=1,2,...,n)进行密钥推测(4.1) Alice i (i=1,2,...,n) performs key guessing

每个用户Alicei(i=1,2,...,n)具有n个测量结果序列。Bob将公布非正交qudit

Figure BDA0003571279510000142
其中|q>是Bob手中的qudit,|q>是与
Figure BDA0003571279510000143
非正交的量子态。Alicei(i=1,2,...,n)根据Bob公布的
Figure BDA0003571279510000144
和自己的测量结果序列
Figure BDA0003571279510000145
进行密钥推测。如表1所示,表中列举了d=4维下Alicei具体的密钥推测规则。Each user Alice i (i=1,2,...,n) has n measurement result sequences. Bob will publish a non-orthogonal qudit
Figure BDA0003571279510000142
where |q> is the qudit in Bob's hand, and |q> is the
Figure BDA0003571279510000143
non-orthogonal quantum states. Alice i (i=1,2,...,n) according to Bob's published
Figure BDA0003571279510000144
and its own sequence of measurements
Figure BDA0003571279510000145
Perform key guessing. As shown in Table 1, the table lists the specific key guessing rules of Alice i under d=4 dimension.

假设d=4维,其中假设Bob的量子态为|2>,此时Bob会把量子态发送给Alicei,但是Alicei并不知道量子态的具体状态是什么,所以会要求Charlie对量子态进行测量。此时Alicei会随机选择Z4或X4让Charlie进行测量,假设Alicei选择X4测量基交给Charlie测量,Charlie测量的结果可能是

Figure BDA0003571279510000146
此时Bob会公布qudit对
Figure BDA0003571279510000147
其中|2>是Bob所知道的,Bob从
Figure BDA0003571279510000148
随机选择
Figure BDA0003571279510000149
Figure BDA00035712795100001410
和|2>非正交。Alicei根据自己的测量结果
Figure BDA00035712795100001411
和Bob公布的
Figure BDA00035712795100001412
进行猜测,由于|2>通过X4基进行测量可能得到
Figure BDA00035712795100001413
但是
Figure BDA00035712795100001414
通过X4基测量只能得出
Figure BDA00035712795100001415
不可能得出
Figure BDA00035712795100001416
所以Alicei能肯定知道Bob的量子态为|2>,|2>最终转换成十进制密钥2。Suppose d=4 dimensions, in which it is assumed that Bob's quantum state is |2>, then Bob will send the quantum state to Alice i , but Alice i does not know what the specific state of the quantum state is, so he will ask Charlie for the quantum state. Take measurements. At this time, Alice i will randomly select Z 4 or X 4 for Charlie to measure. Assuming that Alice i chooses X 4 measurement base and hands it over to Charlie for measurement, the result of Charlie's measurement may be
Figure BDA0003571279510000146
At this point Bob will announce the qudit pair
Figure BDA0003571279510000147
where |2> is what Bob knows, and Bob learns from
Figure BDA0003571279510000148
random selection
Figure BDA0003571279510000149
Figure BDA00035712795100001410
and |2> non-orthogonal. Alice i based on her own measurements
Figure BDA00035712795100001411
and Bob announced
Figure BDA00035712795100001412
Take a guess, since |2> measuring through the X4 base might give
Figure BDA00035712795100001413
but
Figure BDA00035712795100001414
Measured by the base of X 4 only
Figure BDA00035712795100001415
impossible to draw
Figure BDA00035712795100001416
So Alice i can definitely know that Bob's quantum state is |2>, and |2> is finally converted into the decimal key 2.

表1 d=4维下的Alicei密钥推测Table 1 Alice i key guess in d=4 dimension

Figure BDA00035712795100001417
Figure BDA00035712795100001417

Figure BDA0003571279510000151
Figure BDA0003571279510000151

Step5:密钥后处理及密文发送Step5: Key post-processing and ciphertext sending

(5.1)密钥后处理(5.1) Key post-processing

经过Step4后,根据密钥编码规则,所有用户Alicei(i=1,2,...,n)与Bob共享一组非对称密钥Kr,其中,Kr中每一个密钥是一个十进制,Kr对于Bob来说完全是已知的,每个用户Alicei(i=1,2,...,n)只知道其中一部份密钥。Kr由k0,k1,...,kn-1组成,ki(i=0,1,...,n-1)表示Kr的第i个密钥。首先,Bob对每一个ki计算

Figure BDA0003571279510000152
其中
Figure BDA0003571279510000153
i=0,1,...,n-1,这里的ι取值可以控制用户所获取的密钥数,然后计算Q′i=Qimod d,最后生成最终密钥Kf,Kf由Q′0,Q′1,...,Q′n-1组成,Bob获取Kf中全部密钥。Alicei(i=1,2,...,n)分别执行和Bob相同的操作,如果Alicei(i=1,2,...,n)中获取密钥数小于1,那么协议重新开始;否则,Alicei(i=1,2,...,n)将分别获得一个不尽相同位置的密钥
Figure BDA0003571279510000154
其中下标i0,i1,...,in-1表示位置,0<=i0,i1,...,in-1<=n-1。After Step4, according to the key coding rules, all users Alice i (i=1,2,...,n) share a set of asymmetric keys K r with Bob, where each key in K r is a In decimal, K r is completely known to Bob, and each user Alice i (i=1,2,...,n) only knows part of the key. K r consists of k 0 , k 1 ,...,k n-1 , and k i (i=0,1,...,n-1) represents the ith key of K r . First, Bob calculates for each k i
Figure BDA0003571279510000152
in
Figure BDA0003571279510000153
i=0,1,...,n-1, the value of ι here can control the number of keys obtained by the user, then calculate Q' i =Q i mod d, and finally generate the final keys K f , K f Composed of Q′ 0 , Q′ 1 ,...,Q′ n-1 , Bob obtains all the keys in K f . Alice i (i=1,2,...,n) performs the same operations as Bob respectively. If the number of keys obtained in Alice i (i=1,2,...,n) is less than 1, then the protocol is re-run. Start; otherwise, Alice i (i=1,2,...,n) will obtain a key in a different position respectively
Figure BDA0003571279510000154
The subscripts i 0 , i 1 ,...,in -1 represent positions, and 0<=i 0 ,i 1 ,...,in -1 <=n-1.

Step6:加密Step6: Encrypt

(6.1)生成密文(6.1) Generate ciphertext

Alicei(i=1,2,...,n)知道Kf中第i0,i1,...,in-1个位置的密钥

Figure BDA0003571279510000155
并试图检索第j0,j1,...,jn-1个项目
Figure BDA0003571279510000156
其中0<=j0,j1,...,jn-1<=n-1。Alicei(i=1,2,...,n)分别计算移位数s0,s1,...sn-1,其中sλ=jλ-iλ(λ=0,1,...,n-1),把s0,s1,...sn-1发送给Bob,Bob通过s0,s1,...sn-1分别对密钥Kf进行移位,移位后的形成n个
Figure BDA0003571279510000157
分别用于加密数据库D,形成密文数据库ED0,ED1,...,EDn-1,其中
Figure BDA0003571279510000158
Alice i (i=1,2,...,n) knows the key at the i 0 ,i 1 ,...,in - 1th position in K f
Figure BDA0003571279510000155
and trying to retrieve the j 0 ,j 1 ,...,j n-1 items
Figure BDA0003571279510000156
where 0 <= j 0 , j 1 , . . . , j n-1 <= n-1. Alice i (i=1,2,...,n) calculates the shift numbers s 0 ,s 1 ,...s n-1 respectively, where s λ =j λ -i λ (λ=0,1, ...,n-1), send s 0 ,s 1 ,...s n-1 to Bob, and Bob shifts the key K f through s 0 ,s 1 ,...s n-1 respectively Bits, the shifted ones form n
Figure BDA0003571279510000157
They are respectively used to encrypt database D to form ciphertext databases ED 0 , ED 1 ,..., ED n-1 , where
Figure BDA0003571279510000158

Step7:量子搜索Step7: Quantum Search

(7.1)Grover算法应用(7.1) Application of Grover Algorithm

Alicei(i=1,2,...,n)分别对密文数据库EDi(i=0,1,...,n-1)进行Grover搜索,密文数据库

Figure BDA0003571279510000161
如果用户Alice1采用经典算法搜索ED0数据库中下标第j0个密文数据
Figure BDA0003571279510000162
其中0<=j0<=n-1,那么搜索的时间复杂度为O(n),这导致搜索效率很差。用户Alice1通过Grover量子搜索算法搜索密文
Figure BDA0003571279510000163
将大大提高搜索效率。Alice1采用Grover算法的具体过程如下:Alice i (i=1,2,...,n) performs Grover search on the ciphertext database ED i (i=0,1,...,n-1) respectively, and the ciphertext database ED i (i=0,1,...,n-1)
Figure BDA0003571279510000161
If user Alice 1 uses the classical algorithm to search the subscript j 0th ciphertext data in the ED 0 database
Figure BDA0003571279510000162
Where 0<=j 0 <=n-1, then the time complexity of the search is O(n), which leads to poor search efficiency. User Alice 1 searches for ciphertext through Grover quantum search algorithm
Figure BDA0003571279510000163
It will greatly improve the search efficiency. The specific process of Alice 1 using Grover's algorithm is as follows:

步骤1:获取密文数据库中的元素个数;Step 1: Obtain the number of elements in the ciphertext database;

步骤2:计算初始量子态|υ>,初始量子态的计算公式为:Step 2: Calculate the initial quantum state |υ>, the calculation formula of the initial quantum state is:

Figure BDA0003571279510000164
Figure BDA0003571279510000164

其中,H表示的是量子门,

Figure BDA0003571279510000165
表示σ个H门进行张量积,σ表示比特数,
Figure BDA0003571279510000166
表示量子中的张量积符号,|x>表示量子态x,n表示密文数据库中的元素个数;Among them, H represents the quantum gate,
Figure BDA0003571279510000165
represents σ H gates for tensor product, σ represents the number of bits,
Figure BDA0003571279510000166
represents the tensor product symbol in quantum, |x> represents the quantum state x, and n represents the number of elements in the ciphertext database;

步骤3:对初始量子态|υ>进行k次G迭代,得到当前数据库的状态;其计算公式为:Step 3: Perform k times of G iterations on the initial quantum state |υ> to obtain the current state of the database; the calculation formula is:

Figure BDA0003571279510000167
Figure BDA0003571279510000167

Figure BDA0003571279510000168
Figure BDA0003571279510000168

其中,G表示的是Grover算法中的一个酉算子,k表示迭代次数,θ表示角度,|j0>表示量子态j0,j0是查询用户所要找的索引下标;Among them, G represents a unitary operator in Grover algorithm, k represents the number of iterations, θ represents the angle, |j 0 > represents the quantum state j 0 , and j 0 is the index subscript that the query user is looking for;

步骤4:根据数据库的状态得到查询用户的索引下标j0Step 4: obtain the index subscript j 0 of the query user according to the state of the database;

步骤5:根据索引下标得到查询用户待查询的密文。Step 5: Obtain the ciphertext to be queried by the query user according to the index subscript.

运行算子G进行k次后,检测出待测的量子态可能性为

Figure BDA0003571279510000169
After running the operator G for k times, the possibility of detecting the quantum state to be measured is:
Figure BDA0003571279510000169

Step8:解密Step8: Decryption

(8.1)解密获取到所要的明文(8.1) Decrypt to obtain the desired plaintext

Alicei(i=1,2,...,n)通过

Figure BDA00035712795100001610
密钥对密文
Figure BDA00035712795100001611
进行解密,获得对应的明文
Figure BDA0003571279510000171
Alice i (i=1,2,...,n) passes
Figure BDA00035712795100001610
key pair ciphertext
Figure BDA00035712795100001611
Decrypt to get the corresponding plaintext
Figure BDA0003571279510000171

以上所举实施例,对本发明的目的、技术方案和优点进行了进一步的详细说明,所应理解的是,以上所举实施例仅为本发明的优选实施方式而已,并不用以限制本发明,凡在本发明的精神和原则之内对本发明所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above-mentioned embodiments further describe the purpose, technical solutions and advantages of the present invention in detail. It should be understood that the above-mentioned embodiments are only preferred embodiments of the present invention, and are not intended to limit the present invention. Any modification, equivalent replacement, improvement, etc. made to the present invention within the spirit and principle of the present invention shall be included within the protection scope of the present invention.

Claims (10)

1. A multi-user high-dimensional quantum privacy block query method is characterized by comprising the following steps: constructing a multi-user quantum privacy block inquiry system, wherein the system comprises inquiry users { Alice1,Alice2,...,Alicen}, database holders Bob and semi-trusted quantum servers Charlie, AlicenRepresenting the nth querying user; quantum key distribution method is adopted to distribute quantum key to inquiry user and database holder in the privacy block inquiry system; the database holder and the inquiry user encrypt data in the database by adopting the distributed quantum key to obtain a ciphertext database; searching the ciphertext database by the inquiry user by adopting a Grover quantum search algorithm to obtain a ciphertext; the inquiry user decrypts the ciphertext according to the quantum key to obtain the plaintextText.
2. The multi-user high-dimensional quantum privacy block query method according to claim 1, wherein the process of distributing quantum keys to query users and database holders by using a quantum key distribution method comprises:
s1: initializing a system and constructing a key coding rule;
s2: the semi-credible quantum server Charlie constructs a d-dimensional single-photon product state sequence S, wherein the length of the sequence is N + N + q + chi + delta, N represents the size of a database, q represents the number of single-photon product states required by interaction between Bob and Charlie, chi represents the number of single-photon product states required by interaction between a query user and Charlie, and delta represents the number of single-photon product states required by interaction between Bob and the query user; constructing a subsequence S from a d-dimensional single-photon product state sequence S1And subsequence S2In which the subsequence S1Of length n + q + delta, subsequence S2The length of (a) is x; in the subsequence S2Sequentially selecting the ith column, and using the selected ith column as subsequence
Figure FDA0003571279500000011
Charlie will subsequence S1Sending to the database holder Bob, and sending the subsequence
Figure FDA0003571279500000012
Sending the information to a corresponding inquiry user;
s3: querying user record subsequences
Figure FDA0003571279500000013
And the measurement base corresponding to the sequence, and the subsequence
Figure FDA0003571279500000015
Rearranging to obtain a new sequence SCA(ii) a Querying the user' S measurement base and sequence SCASending the information to Charlie;
s4: charlie based on measurement basisFor the sequence SCAMeasuring and feeding back the measurement result to Alicei
S5:AliceiAccording to the subsequence
Figure FDA0003571279500000014
The initial position of the mobile terminal recovers the measurement result; charlie and AliceiBy the sequence SCAPerforming a first security detection on the particles;
s6: bob records a subsequence S1And a measurement base corresponding to the sequence, and a subsequence S1Rearranging is carried out; randomly selecting particles in q sequences from the rearranged subsequence to form a safety detection sequence SBCOther particles constituting the sequence SBA
S7: bob will SBCAnd the measuring machine sends the sequence S to Charlie according to the measured base pairBCThe particles in (1) are measured, and the measurement result is fed back to Bob;
s8: bob according to the subsequence S1The initial position of the mobile terminal recovers the measurement result; bob and AliceiBy the sequence SBCPerforming a second security check on the particles;
s9: bob Slave sequence SBAExtracting n particles to form a sequence
Figure FDA0003571279500000021
Obtaining a sequence SBAMeasuring the base of particles at delta positions, and sequencing the measuring base of particles at delta positions
Figure FDA0003571279500000022
Sending the information to a query user; querying user pair sequences
Figure FDA0003571279500000023
The qudit in (1) is rearranged to obtain a sequence
Figure FDA0003571279500000024
And will sequence
Figure FDA0003571279500000025
Conversion to Single photon product State S'BAA sequence; query user will S'BASending the middle delta particles and the measurement base to Charlie; wherein qudit represents a high-dimensional quantum state;
s10: charlie is according to measured base pair S'BAThe particles in the database are measured, and the measurement result is returned to the inquiry user; query user and Bob to S'BACarrying out safety detection on delta particles for the third time;
s11: will SBAThe remaining n particles in (a) are ordered to form a sequence S ″BA(ii) a Charlie for S ″)BAThe particles in the system are measured, and the measurement result is fed back to Alicei;AliceiThe position of the measurement result is recovered to obtain a recovery sequence
Figure FDA0003571279500000026
Wherein,
Figure FDA0003571279500000027
representing the measurement result, which is a decimal value;
s12: bob couples non-orthogonal qudit
Figure FDA0003571279500000028
Is published into a system where | q>Is qudit, | q in Bob's hand>And
Figure FDA0003571279500000029
are all non-orthogonal quantum states and are,
Figure FDA00035712795000000210
representing symbols of quantum states subjected to quantum Fourier transform>Represents the Dirac symbol in a quantum;
S13:Aliceinon-orthogonal qudit pairs published by Bob
Figure FDA00035712795000000211
And a recovery sequence SMPerforming key speculation by using a key coding rule;
s14: the inferred key is distributed.
3. The multi-user high-dimensional quantum privacy block query method according to claim 2, wherein the key encoding rule comprises: bob and n querying users Alicei(i ═ 1, 2.. times, n) negotiate corresponding key encoding rules, which include:
Figure FDA0003571279500000031
Figure FDA0003571279500000032
......
Figure FDA0003571279500000033
wherein, |0>Which represents the quantum state 0 of the quantum state,
Figure FDA0003571279500000034
representing the quantum state obtained after performing a quantum fourier transform on quantum state 0,
Figure FDA0003571279500000035
the quantum state after performing a quantum fourier transform on quantum state d-1 is represented, d representing the dimension.
4. The multi-user high-dimensional quantum privacy block query method as claimed in claim 2, wherein the measurement basis comprises ZdAnd Xd;ZdThe expression of (a) is:
Figure FDA0003571279500000036
Xdthe expression of (a) is:
Figure FDA0003571279500000037
wherein Z isdRepresents the measurement base under d, d represents the dimension, | j>Indicating quantum state j, j being a decimal number, XdRepresenting a measurement basis subjected to a quantum Fourier transform
Figure FDA0003571279500000038
And k is a decimal value.
5. The method as claimed in claim 2, wherein Charlie measures the sequence according to the measurement basis and comprises:
charlie acquires state | q of quantum system>And construct the measurement operator { Mm}={M0,M1,...,Md-1};
And calculating the probability of the measurement result m-v according to the measurement operator, wherein the probability calculation expression is as follows:
Figure FDA00035712795000000312
Figure FDA0003571279500000039
wherein M isd-1Representing a measurement operator, wherein
Figure FDA00035712795000000310
d denotes the dimension, m and vAre decimal values, p (v) represents the probability that the measurement is m ═ v,
Figure FDA00035712795000000311
represents MvBy conjugate transposition of MvThe representation of the measurement operator is shown as,<q | and | q |>All represent a quantum state q;
after measurement, the state of the quantum system is:
Figure FDA0003571279500000041
wherein,
Figure FDA00035712795000000415
representing measured quantum states
Figure FDA0003571279500000042
6. The multi-user high-dimensional quantum privacy block query method of claim 2, wherein the process of performing security detection comprises: setting an error threshold tau, and combining Charlie and AliceiAs entities a and B, respectively; acquiring the number l of particles in a sequence to be detected safely; the entity B compares the measurement results sent by the entity A according to the initial particle information, and calculates the error rate of the sequence according to the number l of particles in the sequence to be detected safely; if the error rate is higher than the set error threshold, the detection is terminated, otherwise, the detection is continued until all the particle detection is finished.
7. The multi-user high-dimensional quantum privacy block query method according to claim 2, wherein the key estimation process comprises: obtaining the quantum state | q of Bob>And sends the quantum state to Alicei;AliceiRandomly selecting a measurement base, and combining the measurement base with the received quantum state to send to Charlie; charlie measures the quantum state according to the measurement basis to obtain the measurement junctionFruit
Figure FDA0003571279500000043
And returns the measurement results to Alicei(ii) a From
Figure FDA0003571279500000044
In which one is randomly selected
Figure FDA0003571279500000045
Will be provided with
Figure FDA0003571279500000046
And | q>Form a cloth qudit pair
Figure FDA0003571279500000047
Bob publishes the qudit pair
Figure FDA0003571279500000048
Wherein
Figure FDA0003571279500000049
Represents a pair of | κ>Quantum states performing a quantum fourier transform
Figure FDA00035712795000000410
AliceiRespectively pairing | q by using selected measurement bases>And
Figure FDA00035712795000000411
the measurement is carried out to respectively obtain | q>And
Figure FDA00035712795000000412
from which the quantum state | q of Bob is determined>Using transcoding rules to convert | q>Converting into decimal system to obtain q, which is AliceiThe resulting key.
8. The multi-user high-dimensional quantum privacy block of claim 2The query method is characterized in that the process of distributing the inferred key comprises the following steps: inquiring user shares a set of asymmetric keys K with Bobr={k0,k1,...,kn-1In which k isiRepresents KrThe ith key of (1); bob knows all asymmetric keys in the asymmetric keys, and inquires about the corresponding key which the user knows; bob for each kiComputing
Figure FDA00035712795000000413
Wherein,
Figure FDA00035712795000000414
wherein QiIs a decimal numerical value, and iota is a decimal numerical value; according to QiCalculating Q'iQimod d, where mod is the remainder symbol; all Q 'are'iThe key K is collected to obtain the final key K of Bobf={Q′0,Q′1,...,Q′n1}; the inquiry user executes the same operation as Bob, judges the number of keys in the inquiry user, recalculates the keys in the inquiry user if the number of the keys is less than 1, otherwise obtains the keys at different positions
Figure FDA0003571279500000051
0≤i0,i1,...,in-1N-1, wherein the subscript i0,i1,...,in-1Indicating the location.
9. The method of claim 1, wherein the process of encrypting the data in the database by using the quantum key comprises: aliceiObtaining KfMiddle (i) th0,i1,...,in-1Key to a location
Figure FDA0003571279500000052
And retrieve the jth0,j1,...,jn-1An item
Figure FDA0003571279500000053
Wherein 0 < ═ j0,j1,...,jn-1<=n-1;AliceiSeparately calculating the shift s0,s1,...sn-1Wherein s isλ=jλ-iλWherein λ is a decimal value in the range {0, 1.., n-1 }; calculating the calculated displacement number s0,s1,...sn-1Sent to Bob, Bob passes s0,s1,...sn-1Respectively to the secret key KfShifting to form n
Figure FDA0003571279500000054
Using n number of
Figure FDA0003571279500000055
Respectively encrypting the data in the database to form a ciphertext database ED0,ED1,...,EDn-1In which
Figure FDA0003571279500000056
Figure FDA0003571279500000057
Representing the (n-1) th ciphertext in the ith ciphertext database.
10. The multi-user high-dimensional quantum privacy block query method according to claim 1, wherein the process of searching the ciphertext by the query user by adopting a Grover quantum search algorithm comprises the following steps:
step 1: acquiring the number of elements in a ciphertext database;
and 2, step: and calculating an initial quantum state | upsilon >, wherein a calculation formula of the initial quantum state is as follows:
Figure FDA0003571279500000058
wherein, H represents a quantum gate,
Figure FDA0003571279500000059
represents the product of the H gates, σ represents the number of bits,
Figure FDA00035712795000000510
representing tensor product sign, | x, in quanta>Representing the quantum state x, wherein n represents the number of elements in the ciphertext database;
and step 3: performing G iteration on the initial quantum state | upsilon > for k times to obtain the state of the current database; the calculation formula is as follows:
Figure FDA00035712795000000511
Figure FDA0003571279500000061
wherein, G represents a unitary operator in Grover algorithm, k represents iteration times, theta represents angle, | j0>Representing a quantum state j0,j0Index subscript to be searched by the user is inquired;
and 4, step 4: obtaining index subscript j of query user according to state of database0
And 5: and obtaining the ciphertext to be queried of the query user according to the index subscript.
CN202210320072.9A 2022-03-29 2022-03-29 Multi-user high-dimensional quantum privacy block query method Active CN114640449B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210320072.9A CN114640449B (en) 2022-03-29 2022-03-29 Multi-user high-dimensional quantum privacy block query method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210320072.9A CN114640449B (en) 2022-03-29 2022-03-29 Multi-user high-dimensional quantum privacy block query method

Publications (2)

Publication Number Publication Date
CN114640449A true CN114640449A (en) 2022-06-17
CN114640449B CN114640449B (en) 2024-05-28

Family

ID=81951852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210320072.9A Active CN114640449B (en) 2022-03-29 2022-03-29 Multi-user high-dimensional quantum privacy block query method

Country Status (1)

Country Link
CN (1) CN114640449B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5855018A (en) * 1995-10-20 1998-12-29 Yeda Research And Development Co. Ltd. Private information retrieval
CN107992632A (en) * 2017-12-28 2018-05-04 江苏亨通问天量子信息研究院有限公司 Quantum communications secret querying method and system
CN110336775A (en) * 2019-04-24 2019-10-15 重庆邮电大学 A Quantum Swarm Authentication Method Based on Grover Algorithm
CN112036445A (en) * 2020-08-06 2020-12-04 中国人民解放军战略支援部队信息工程大学 Cross-social network user identification method based on neural tensor network
CN113114456A (en) * 2021-03-16 2021-07-13 重庆邮电大学 Multi-user quantum privacy query method with authentication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5855018A (en) * 1995-10-20 1998-12-29 Yeda Research And Development Co. Ltd. Private information retrieval
CN107992632A (en) * 2017-12-28 2018-05-04 江苏亨通问天量子信息研究院有限公司 Quantum communications secret querying method and system
CN110336775A (en) * 2019-04-24 2019-10-15 重庆邮电大学 A Quantum Swarm Authentication Method Based on Grover Algorithm
CN112036445A (en) * 2020-08-06 2020-12-04 中国人民解放军战略支援部队信息工程大学 Cross-social network user identification method based on neural tensor network
CN113114456A (en) * 2021-03-16 2021-07-13 重庆邮电大学 Multi-user quantum privacy query method with authentication

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SIWEN HU: "Quantum Private Query of Blocks Based on D-dimensional Bell State", 《 PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON BIG DATA AND COMPUTING》 *
杨豪: "多用户量子隐私查询", 《硕士电子期刊》 *

Also Published As

Publication number Publication date
CN114640449B (en) 2024-05-28

Similar Documents

Publication Publication Date Title
Kolesnikov et al. Improved garbled circuit building blocks and applications to auctions and computing minima
Lien et al. A novel privacy preserving location-based service protocol with secret circular shift for k-nn search
CN109660555A (en) Content safety sharing method and system based on proxy re-encryption
Cai et al. Multi-party quantum key agreement with five-qubit brown states
Qin et al. Hierarchical quantum secret sharing based on special high-dimensional entangled state
Muruganantham et al. Quantum cryptography for secured communication networks.
CN109474425A (en) A method for obtaining a derivation key of arbitrary specified length based on multiple shared keys
Gao et al. Two-party quantum key agreement protocols under collective noise channel
Xiang et al. Limited resource semi-quantum secret sharing based on multi-level systems
Shi Efficient quantum protocol for private set intersection cardinality
CN105763326A (en) Quantum private comparison method based on five-quantum bit maximally-entangled state
CN106603232A (en) Nearest privacy query method based on careless quantum key distribution
CN114285553A (en) A single-state three-party semi-quantum key agreement method based on three-particle GHZ entangled states
Shi et al. Privacy-preserving range query quantum scheme with single photons in edge-based Internet of Things
Zhou Improvements of quantum private comparison protocol based on cluster states
Yang et al. An efficient identity-based encryption with equality test in cloud computing
CN111291413B (en) Joint noise resistant semi-quantum multi-user privacy query method
CN114640449A (en) A multi-user high-dimensional quantum privacy block query method
CN113872748B (en) A Secure Quantum Network Encoding Method Based on Quantum Homomorphic Encryption
CN116975886A (en) Data query method and device based on privacy protection
CN113468553B (en) Privacy protection analysis system and method for industrial big data
Du et al. Robust high capability QKD-based database private query
CN111049646B (en) Multi-party quantum searchable encryption method based on quantum entrusting calculation
Wang et al. Scheme for cloning an unknown single qutrit state with assistance
CN107332656A (en) Post-processing method for careless quantum key distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20240422

Address after: Room 301, 3rd floor, 9 shangdijiu street, Haidian District, Beijing

Applicant after: Beijing Shenzhou Digital Cloud Information Technology Co.,Ltd.

Country or region after: China

Applicant after: Shenzhou Kuntai (Xiamen) Information Technology Co.,Ltd.

Address before: 400065 Chongwen Road, Nanshan Street, Nanan District, Chongqing

Applicant before: CHONGQING University OF POSTS AND TELECOMMUNICATIONS

Country or region before: China

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20250214

Address after: Room 301, 3rd floor, 9 shangdijiu street, Haidian District, Beijing

Patentee after: Beijing Shenzhou Digital Cloud Information Technology Co.,Ltd.

Country or region after: China

Patentee after: Hefei Shenzhou Kuntai Information Technology Co.,Ltd.

Address before: Room 301, 3rd floor, 9 shangdijiu street, Haidian District, Beijing

Patentee before: Beijing Shenzhou Digital Cloud Information Technology Co.,Ltd.

Country or region before: China

Patentee before: Shenzhou Kuntai (Xiamen) Information Technology Co.,Ltd.

TR01 Transfer of patent right