Multi-party blind quantum computation protocol with mutual authentication in network

来源 :中国科学:信息科学(英文版) | 被引量 : 0次 | 上传用户:xyc76821
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Blind quantum computation (BQC) can ensure a client with limited quantum capability safely delegates computing tasks to a remote quantum server.In order to resist attacks from ignoring identity authentication in BQC protocols,it is necessary to guarantee the legality of both clients and servers in a multi-party BQC network.So we propose a multi-party BQC protocol involving three phases to distribute shared keys and authenticate identities.Firstly,by using the advantages of measurement device independent quantum key distribution (MDI-QKD),the registered client and the assigned server could share the initial key safely in registration phase.Secondly,with the help of semi-honest certificate authority (CA),mutual identity authentication phase realizes the two-way authentication from both sides through the shared key simultaneously.Thirdly,in the blind quantum computing phase,a registered client can complete his comput-ing task by just measuring the qubits from the assigned server rather than preparing the qubits.Moreover,combined with first-in-first-out (FIFO) principle,clients\' authentication and blind quantum computing can be processed in parallel.The protocol can also be applied in other multi-party BQC protocols with the universality of resource states.Compared with other BQC protocols,the reliability of the protocol with identity authentication is guaranteed,and the efficiency will be significantly reflected in real experiments.
其他文献
In this paper,we propose a distributed Kalman filter(DKF)for the dynamical system with general random coefficients.In the proposed method,each estimator shares local innovation pairs with its neighbors to collectively complete the estimation task.Further,
Dear editor,Radio-frequency identification(RFID) can provide data in an energy-efficient and low-cost way for data-driven intelligent decisions in emerging Industrial IoT [1]. In RFID systems, tags st
期刊
Dear editor,rnVarious open source software hosting sites,such as Github,provide support for pull-based development and allow de-velopers to flexibly and efficiently make contributions[1].In GitHub,contributors fork the project\'s main repository of a pr
期刊
Herbaceous marsh is the most widely distributed type of marsh wetland ecosystem,and has important ecological functions such as water conservation,climate regulation,carbon storage and fixation,and sheltering rare species.The carbon sequestration function
Knowing the connectivity patterns in neural circuitry is essential to understand the operating mechanism of the brain,as it allows the analysis of how neural signals are processed and flown through the neural system.With the recent advances in neural reco
This paper proposes a sliding-mode disturbance observer(SMDOB)-based tracking controller for a class of nonlinear systems with modeling uncertainties and external disturbances.The SMDOB is con-structed using an extended state observer embedded by a filter
Cyclist trajectory prediction is of great significance for both active collision avoidance and path planning of intelligent vehicles.This paper presents a trajectory prediction method for the motion intention of cyclists in real traffic scenarios.This met
Dear editor,rnThe classical final size relation of the standard susceptible-infected-recovered(SIR)epidemic model is based on homogeneous-mixing population[1,2].Recent results have demonstrated the generality of the classical SIR final size relation[3].Ho
期刊
This paper focuses on the bumpless transfer fault detection problem for switched systems under state-dependent switching.The goal is to find an effective constraint on filters and an appropriate switching signal to reduce the bumps of residual signals cau
In this paper,an innovative recursive filtering algorithm(RFA)is proposed for a class of nonlinear systems(NSs)subject to multiplicative noises(MNs)and measurement outliers(MOs).Initially,the MNs are employed to formulate the random influence on the NSs w