| 研究生: |
曾新益 Tseng, Hsin-Yi |
|---|---|
| 論文名稱: |
量子私密比較協定 Quantum Private Comparison Protocols |
| 指導教授: |
黃宗立
Hwang, Tzone-Lih |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Department of Computer Science and Information Engineering |
| 論文出版年: | 2011 |
| 畢業學年度: | 99 |
| 語文別: | 英文 |
| 論文頁數: | 43 |
| 中文關鍵詞: | 量子密碼學 、量子私密比較協定 、量子糾纏態 |
| 外文關鍵詞: | Quantum Cryptography, Quantum Private Comparison, Quantum Entanglement state |
| 相關次數: | 點閱:150 下載:2 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來,電腦資訊技術發展蓬勃,其中量子電腦的發展將扮演一個重要的角色,由於量子電腦具有強大的平行處理及運算能力。因此,一旦量子電腦研發成功,現有的近代密碼系統將會面臨被破解的危機。現今的密碼學系統均是基於數學計算上的難題來達到其安全性,也就是以目前的電腦技術欲破解需花費相當多的時間。然而,由於量子電腦的能力,這些數學上的難題將於短時間內被破解,目前已有研究指出可在多項式時間內破解因數分解問題。這表示現今常用的RSA加密系統在量子電腦下將失去其安全性。因此要如何在量子電腦上設計一個安全的量子密碼技術,也成為近年來密碼學家研究的重要領域。
量子密碼學與近代密碼學不同的是,它是利用量子的物理特性來設計達成其安全性。因此要如何利用這些量子特性來設計一個安全的密碼技術便是量子密碼學的研究重點,而現今也已有許多量子密碼技術被提出,如:量子金鑰分配協定、量子秘密分享協定和量子私密比較協定等。
量子私密比較協定(Quantum Private Comparison)為量子密碼學上一個重要的研究。經由量子的糾纏特性及一semi-honest第三方的協助,讓雙方使用者能在彼此不知道對方私密訊息的情況下,仍然能夠比較彼此的私密訊息是否相同。近年來,許多量子私密比較協定被提出,這些協定植基於量子貝爾態的么正算子或是GHZ糾纏態量子的量測特性等來達到其需求。
現今的量子私密比較協定可能為了避免一些常見的攻擊而導致效率低落,且部分可能還存在一些安全性上的問題。因此,本論文首先針對最近一篇利用GHZ糾纏態量子所設計的量子私密協定比較提出一個攔截重送攻擊,接著提出一個基於利用量子貝爾態來設計一個有效率的量子私密比較協定。
The recent years have witnessed considerable development in computers and the field of information science. The development of the quantum computer is expected to play a key role in the future because it is capable of computation and parallel processing. Further, the current cryptography system would be prone to security breaches by the quantum com-puter. The security of modern cryptography systems is based on the complexity of calcula-tions of mathematical problems involved in different cryptography techniques. These mathematical problems can be solved more efficiently by using the quantum computer (e.g., Shor proposed an efficient quantum algorithm for the factorization of numbers in polynomial time). This implies that the RSA encryption system can be broken by a quantum computer. Therefore, at present, designing a secure quantum cryptography system is an important research topic.
Quantum cryptography differs from modern cryptography in that it achieves its secu-rity by adopting the physical properties of quantum mechanics. Consequently, the basis of quantum cryptography lies in the application of these physical properties in designing se-cure cryptography techniques. Many quantum cryptography protocols have been proposed, such as the quantum key distribution (QKD) protocols, quantum secret sharing (QSS), and quantum private comparison (QPC).
The concept of private comparison has already been a topic of discussion in conven-tional cryptography. Yao proposed a protocol [17] to solve the millionaires’ problem in which two millionaires, Alice and Bob, are interested in knowing which of them is richer without revealing their actual wealth. On the basis of Yao’s millionaires’ problem, Boudot subsequently proposed a protocol [18] to determine whether the two millionaires are equal-ly rich. However, Lo [19] indicated that the equality function used to determine this cannot be securely evaluated in a two-party scenario. Therefore, some additional assumptions (e.g., a semi-honest third party (TP)) should be considered to successfully achieve private com-parison.
Quantum voting [20, 21] and quantum auction [22-24] have necessitated the applica-tion of private comparison in the past. On the basis of quantum mechanics, evaluation functions have been designed to calculate the summation of the votes in quantum voting and determine the winner of a quantum auction. Recently, researchers have been able to re-alize this concept by using the quantum computer and have proposed some QPC protocols.
The concept of QPC is important in the field of quantum cryptography. By introduc-ing the concept of quantum entanglement and involving a semi-honest TP, two users can compare undisclosed information for equality. Several QPC protocols that involve unitary operations to set the Bell state or the entangled quantum GHZ state have been proposed to achieve the goal of comparison for equality between the undisclosed information of both parties.
In order to prevent some common attacks, current QPC protocols suffer from low ef-ficiency. Moreover, many other protocols have security loopholes. This thesis aims to demonstrate the intercept–resend attacks on a QPC protocol, which is designed using the GHZ state, and present a more efficient QPC protocol based on the Bell state.
[1] P. W. Shor, “Polynomial-time algorithms for prime factorization and discrete loga-rithms on a quantum computer,” SIAM, vol. 26, no. 5, pp.1484-1509, 1999.
[2] L. K. Grover, “Quantum mechanics helps in searching for a needle in a haystack,” Physical Review Letters, vol. 79, no. 2, pp. 325, 1997.
[3] W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature, vol. 299, no. 5886, pp. 802-803, 1982.
[4] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing (invited paper),” in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175-179, Dec. 1984.
[5] L. Vaidman, “Teleportation of quantum states,” Arxiv preprint hep-th/9305062, 1993.
[6] M. Hillery, V. Bu ek and A. Berthiaume, “Quantum secret sharing,” Physical Review A, vol. 59, no. 3, p. 1829, 1999.
[7] F.-G. Deng, G. L. Long and X.-S. Liu, “Two-step quantum direct communication pro-tocol using the Einstein-Podolsky-Rosen pair block,” Physical Review A, vol. 68, no. 4, p. 042317, 2003.
[8] Y. G. Yang and Q. Y. Wen, “An efficient two-party quantum private comparison pro-tocol with decoy photons and two-photon entanglement,” Journal of Physics A: Mathematical and Theoretical, vol. 42, p. 055305, 2009.
[9] X.-B. Chen, G. Xu, X.-X. Niu, Q.-Y. Wen and Y.-X. Yang, “An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement,” Optics Communications, vol. 283, no. 7, pp. 1561-1565, 2010.
[10] F.-G. Deng, X.-H. Li, H.-Y. Zhou and Z.-j. Zhang, “Improving the security of multi-party quantum secret sharing against Trojan horse attack,” Physical Review A, vol. 72, no. 4, p. 044302, 2005.
[11] Q.-Y. Cai, “Eavesdropping on the two-way quantum communication protocols with invisible photons,” Physics Letters A, vol. 351, no. 1-2, pp. 23-25, 2006.
[12] S.-K. Chong, Y.-P. Luo and T. Hwang, “On “Arbitrated quantum signature of classi-cal messages against collective amplitude damping noise”,” Optics Communications, vol. 284, no. 3, pp. 893-895, 2011.
[13] A. Alain, D. Jean and R. Gérard, “Experimental test of Bell’s inequalities using time varying analyzers,” Phyical Review Letter, vol. 49, no. 25, pp. 1804-1807, 1982.
[14] Z. Y. Ou, S. F. Pereira, H. J. Kimble and K. C. Peng, “Realization of the Einstein-Podolsky-Rosen paradox for continuous variables,” Phyical Review Letter, vol. 68, no. 25, pp. 3663-3666, 1992.
[15] E. Rieffel and W. Polak, “An introduction to quantum computing for non-physicists,” ACM Computing Surveys, vol. 32, no. 3, pp. 300-335, 2000.
[16] A. Einstein, B. Podolsky and N. Rosen, “Can quantum-mechanical description of physical reality be considered complete?” Physical review, vol. 47, no. 10, p. 777, 1935.
[17] A. C. Yao, “Protocols for secure computations,” in Proceedings of 23rd IEEE Sympo-sium on Foundations of Computer Science (FOCS’ 82), Washington, DC, USA, p.160, 1982.
[18] F. Boudot, B. Schoenmakers and J. Traor´e, “A fair and efficient solution to the so-cialist millionaires’ problem”, Discrete Applied Mathematics, (Special issue on coding and cryptology), vol. 111, no. 1-2, pp. 23-36, 2001.
[19] H. K. Lo, “Insecurity of quantum secure computations”, Physical Review A, vol. 56, no. 2, pp. 1154-1162, 1997.
[20] M. Hillery, M. Ziman, V. Bužek and M. Bieliková, “Towards quantum-based privacy and voting,” Physical Review A, vol. 349, no. 1-4, pp. 75-81, 2006.
[21] J. A. Vaccaro, J. Spring and A. Chefles, “Quantum protocols for anonymous voting and surveying,” Physical Review A, vol. 75, no. 1, id. 012333, 2007.
[22] T. Hogg, P. Harsha and K. Y. Chen, “Quantum auctions,” International Journal of Quantum Information, vol. 5, pp. 751-780, 2007.
[23] Y. G. Yang, M. Naseri and Q.Y. Wen, “Improved secure quantum sealed-bid auction,” Optics Communications, vol. 282, no. 20, pp. 4167-4170, 2009.
[24] Z. Zhao, M. Naseri and Y. Zheng, “Secure quantum sealed-bid auction with post con-firmation,” Optics Communications, vol. 283, no. 16, pp. 3194-3197, 2010.
[25] T. Hwang and K. Lee, IET Information Security 1 (1), Full Text via CrossRef| View Record in Scopus| Cited By in Scopus (4): p. 43, Mar. 2007.
[26] J. H. Chen, K. C. Lee and T. Hwang, “The Enhancement of Zhou et al.'s Quantum Secret Sharing Protocol,” International Journal of Modern Physics C, vol. 20, no. 10 pp. 1531-1535, 2009.
[27] H. C. Shih, K. C. Lee, and T. Hwang, “New efficient three-party quantum key distri-bution protocols,” Selected Topics in Quantum Electronics, IEEE Journal of, 2009. 15(6): p. 1602-1606.
[28] J. Lin and T. Hwang, “An enhancement on Shi et al.'s multiparty quantum secret shar-ing protocol,” Optics Communications, vol. 284, no.5, pp. 1468-1471, 2010.
[29] M. A. Nielsen, “Quantum computation by measurement and quantum memory,” Physics Letters A, vol. 308, no. 2-3, pp. 96-100, 2003.
[30] E. Jeffrey, M. Brenner and P. Kwiat, “Delayed-choice quantum cryptography,” Pro-ceedings of SPIE, vol. 5161, pp. 269-279, 2004.
[31] E. Jeffrey, J. Altepeter and P. Kwiat, “Relativistic quantum cryptography,” Frontiers in Optics, OSA Technical Digest (CD) (Optical Society of America, 2006), paper FWB1.
[32] E. Jeffrey, J. Altepeter and P. Kwiat, “Relativistic quantum cryptography with optical storage,” International Conference on Quantum Information, OSA Technical Digest (CD) (Optical Society of America, 2007), paper IFE1.
[33] X. H. Li, F. G. Deng and H. Y. Zhou, “Efficient quantum key distribution over a col-lective noise channel,” Physical Reviews A, vol. 78, no. 2, p. 022321, 2008.
[34] X. H. Li, B. K. Zhao, Y. B. Sheng, F. G. Deng and H. Y. Zhou, “Fault tolerant quan-tum key distribution based on quantum dense coding with collective noise,” Interna-tional Journal of Quantum Information, vol. 7, no. 8, pp. 1479-1489, 2009.
[35] P. Zanardi and M. Rasetti, “Noiseless quantum codes,” Physical Review Letter, vol. 79, no. 17, pp. 3306-3309, 1997.
[36] J. Kempe, D. Bacon, D. A. Lidar and K. B. Whaley, “Theory of decoherence-free fault-tolerant universal quantum computation,” Physical Reviews A, vol. 63, no. 4, p. 042307, 2001.
[37] E. Knill, R. Laflamme and L. Viola, “Theory of quantum error correction for general noise”, Physical Review Letter, vol. 84, no. 11, pp. 2525-2528, 2000.
[38] N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, “Quantum cryptography,” Reviews of Modern Physics, vol. 74, pp. 145-190, 2002.
[39] W. T. Buttler, S. K. Lamoreaux, J. R. Torgerson, G. H. Nickel, C. H. Donahue and C. G. Peterson, “Fast, efficient error reconciliation for quantum cryptography”, Physical Reviews A, vol. 67, no. 5, p. 052303, 2003.
[40] J. Wang, Q. Zhang and C. J. Tang, “Multiparty quantum secret sharing of secure di-rect communication using teleportation”, Communications in Theoretical Physics, vol. 47, no. 3, pp. 454-458, 2007.
[41] J. Wang, Q. Zhang and C. J. Tang, “Multiparty quantum secret sharing of secure di-rect communication using teleportation,” Communications in Theoretical Physics, vol. 47, no. 3, pp. 454-458, 2007.
[42] L. Dong, X. M. Xiu, Y. J. Gao, Y. P. Ren and H. W. Liu, “Controlled three-party communication using GHZ-like state and imperfect Bell-state measurement,” Optics Communications, vol. 284, no. 3, pp. 905-908, 2011.
[43] T. Jennewein, C. Simon, G. Weihs, H. Weinfurter and A. Zeilinger, “Quantum cryp-tography with entangled photons,” Physical Review Letter, vol. 84, no. 20, pp. 4729-4732, 2000.
[44] R. J. Hughes, J. E. Nordholt, D. Derkacs and C. G. Peterson, “Practical free-space quantum key distribution over 10 km in daylight and at night,” New Journal of Phys-ics, vol. 4, pp. 43.1-43.14, 2002.
[45] C. Gobby, Z. L. Yuan and A. J. Shields, “Quantum key distribution over 122 km of standard telecom fiber,” Applied Physics Letters, vol. 84, no. 19, pp. 3762-3764, 2004.
[46] T. Hwang and K.C. Lee, “EPR quantum key distribution protocols with 100% qubit efficiency,” IET Information Security, vol. 1, no. 1, pp. 43-45, 2007.
[47] J. H. Chen, K. C. Lee and T. Hwang, “The enhancement of Zhou et al.’s quantum se-cret sharing protocol,” International Journal of Modern Physics C, vol. 20, no. 10, pp. 1531-1535, 2009.
[48] H. C. Shih, K. C. Lee and T. Hwang, “New efficient three-party quantum key distri-bution protocols,” IEEE Journal of Selected Topics in Quantum Electronics, vol. 15, no. 6, pp. 1602-1606, 2009.
[49] S. K. Chong and T. Hwang, “Quantum key agreement protocol based on BB84,” Op-tics Communications, vol. 283, no. 6, pp. 1192-1195, 2010.
[50] C. R. Hsieh, C. W. Tsai and T. Hwang, “Quantum secret sharing using GHZ-like state,” Communications in Theoretical Physics, vol. 54, no. 6, pp. 1019-1022, 2010.
[51] S. K. Chong and T. Hwang, “The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs,” Optics Communications, vol. 284, no. 1, pp. 515-518, 2011.
[52] F. G. Deng, X. H. Li, H. Y. Zhou and Z. J. Zhang, “Improving the security of multi-party quantum secret sharing against Trojan horse attack,” Physcal Review A, vol. 72, no. 4, p. 044302, 2005.
[53] Q. Y. Cai, “Eavesdropping on the two-way quantum communication protocols with invisible photons,” Physics Letters A, vol. 351, no. 1-2, pp. 23-25, 2006.
[54] X. H. Li, F. G. Deng and H. Y. Zhou, “Improving the security of secure direct com-munication based on the secret transmitting order of particles,” Physcal Review A, vol. 74, no. 5, p. 054302, 2006.