量子签名协议的设计与分析

Design and analysis of quantum signature protocol

摘要:(摘要内容经过系统自动伪原创处理以避免复制,下载原文正常,内容请直接查看目录。)

数字签名是古代暗码学的一个主要的分支,在信息平安范畴中有着普遍的运用。数字签名可以或许完成身份认证、数据完全性掩护和弗成否定办事的功效。跟着信息赓续面向数字化和收集化的疾速成长,随之而来的信息平安成绩也是我们面对的亟待处理的成绩。传统意义上的信息平安重要依附经典暗码体系体例为其供给平安性保证。但跟着盘算机运算才能的赓续进步,以各类数学困难的盘算庞杂性为基本的经典暗码体系体例,遭受到了史无前例的冲击。融入了量子力学的量子暗码学,绝对于经典暗码的盘算平安而言,可以到达无前提平安,因此遭到了愈来愈多的喜爱和普遍的存眷。个中,量子签名协定融会了量子暗码学和数字签名技巧,填补了通俗数字签名在平安性上的缺乏的地方,普遍运用在电子现金和电子合一致电子付出体系中。在本文中,我们以当下热点的量子签名为研讨偏向,依据分歧的运用场景下的分歧需求,设计和剖析改良了多种量子签名协定,如量子盲签名、量子群签名、带有仲裁的量子签名等详细以下:在量子盲签名方面,我们提出了第一个基于双态向量情势的量子盲签名协定,经由过程双态向量情势,我们可以依据两次丈量的成果,来推想两次丈量之间的量子体系的状况,绝对于通俗的量子态演化的描绘,这类描绘加倍的完美,我们应用这类新的量子体系的描绘,经由过程两次丈量之间量子态的联系关系关系来完成盲签名协定的设计,较之前的协定而言,该协定具有更高的验证效力。以后,我们对Yang等人对此协定的改良协定停止了剖析,发明并指出了其改良协定具有平安性破绽,不克不及抵御介入者进击计划,并依据他们的建议,完美了我们的协定。别的,针对基于会话的盲签名计划中,我们从信息论角度动身,指出了量子签名协定设计中常常疏忽的信息泄漏成绩,特殊是密钥信息的泄漏是很主要的平安性成绩,并在此基本上,我们提出了增长部门不肯定性来弥补信息熵的改良办法,削减进击者对密钥信息的获得。在量子群签名方面,我们对一种基于隐形传态的量子群签名停止了剖析,并指出该类基于隐形传态设计的协定中,共有的平安性成绩,即若何平安地分发初始的量子纠缠态。我们联合今朝较为前沿的量子反直不雅计划,完成在没有光子经由过程量子信道的情形下,三方或许两方可以平安地同享量子纠缠,进步了协定的平安性。在有仲裁的量子签名方面,我们应用量子单向函数改良了一种带有仲裁的量子签名协定。从而防止了进击者都可以随意率性捏造正当的量子签名的成绩,而量子单向函数的运用可以有用地防止今朝已知的带有仲裁的量子签名的模子的不平安性。

Abstract:

Digital signature is one of the main branches of ancient science in information security code, has the widespread use in the category. Digital signature can complete the identity authentication, data integrity protection and undeniable service effect. Follow information continuously for digital and network of rapid growth, followed by information security problems facing us is to be dealt with results. The traditional sense of the information security important attachment classic password system guarantee for the supply security. But follow the ceaseless progress of computing capacity and to various mathematical difficulties of the computing complexity for basic classical cipher systems, subjected to an unprecedented impact. Into the quantum mechanics of quantum cryptography, absolute classic code calculations in Ping An can be reached without safety conditions, so was the increasingly popular and widespread concern. Medium, quantum signature protocol integrating quantum cryptography and digital signature techniques to fill the popular digital signature on the safety of the lack of places, widely used in electronic cash and electronic synthetic consistent electronic payment system. In this paper, we present a hotspot for the research of quantum signature bias, according to the different demand differences using scenarios, design and analysis of a variety of improved quantum signature protocols, such as quantum quantum group signature, blind signature, with arbitration quantum signature with blind signature in the following: quantum, we put forward the first based on the quantum two-state vector form of blind signature protocol, through the process of binary vector form, we can on the basis of the two measurement results, to deduce the quantum system between the two measure of the situation, described relative to the quantum state of popular evolution, this kind of double picture perfect, we describe application of this new class of quantum system two, through the measurement of the quantum state relationship to complete the design of blind signature protocol, compared to the previous agreement, the agreement has a higher potency test. Later, we of Yang et al. This improved protocol of agreement was analyzed, and the invention and pointed out that the improved protocol has security flaws, cannot resist participants onslaught of plans, and on their advice and perfect our agreement. Other, based on the session blind signature scheme, we from the information on angle start, pointed out that the quantum signature protocol design often neglect the information leakage performance, especially the key information of leakage is very important security problems and on this basis, we propose sector growth uncertainty to compensate for the improved method of information entropy, onslaught cuts are the key information obtained. We a group signature schemes based on quantum teleportation are analyzed, and pointed out that the agreement of the class based on Teleportation state design, common security problems, that is how to safely distribution of initial quantum entangled states in quantum group signature. We combined currently more advanced quantum anti intuitive plan, completed in no photons through the process of quantum channel, third party or two parties can safely share quantum entanglement, improve the security agreement. In the arbitration quantum signature, we apply quantum one-way function improved quantum signature with an arbitration agreement. In order to prevent the onslaught can be arbitrary whims of legitimate fabricated quantum signature achievement, and use quantum one-way functions can is useful to prevent current and foregone with arbitration quantum signature model of security.

目录:

摘要5-7
ABSTRACT7-8
第一章 绪论12-18
    1.1 研究背景和意义12-14
    1.2 研究现状14-16
    1.3 论文安排及主要研究成果16-18
第二章 基础知识18-36
    2.1 量子力学基础18-26
        2.1.1 量子比特18-19
        2.1.2 算子19-21
        2.1.3 量子测量21-22
        2.1.4 量子纠缠22-23
        2.1.5 纠缠交换23-24
        2.1.6 隐形传态24-26
    2.2 量子力学基本原理26-28
        2.2.1 测不准原理26
        2.2.2 量子不可克隆定理26-27
        2.2.3 非正交态不可区分定理27-28
    2.3 量子密码学的基础协议28-34
        2.3.1 BB84协议28-30
        2.3.2 ZMWZ协议30-34
    2.4 本章小结34-36
第三章 量子盲签名协议的设计与分析36-60
    3.1 基于双态向量形式的量子盲签名36-48
        3.1.1 双态向量形式36-38
        3.1.2 SHWL协议38-42
        3.1.3 YHL协议42-48
    3.2 基于会话的量子盲签名协议48-58
        3.2.1 KZ协议49-51
        3.2.2 针对KZ协议的攻击策略51-55
        3.2.3 改进协议55-58
    3.3 本章小结58-60
第四章 量子群签名协议的分析与改进60-76
    4.1 基于隐形传态的量子群签名协议——WTJN协议60-63
        4.1.1 初始化阶段61
        4.1.2 签名阶段61-62
        4.1.3 验证阶段62-63
    4.2 对WTJN协议的分析63-66
        4.2.1 Bob的伪造64-66
    4.3 改进的量子群签名协议66-75
        4.3.1 反直观的量子纠缠分发67-72
        4.3.2 初始阶段72-73
        4.3.3 签名阶段73-74
        4.3.4 验证阶段74-75
    4.4 本章小结75-76
第五章 有仲裁的量子签名协议的分析与改进76-86
    5.1 基于单向函数的有仲裁的量子签名协议——LCYY协议76-79
        5.1.1 量子单向函数76-77
        5.1.2 基本协议77-79
    5.2 针对LCYY协议的攻击策略79-82
        5.2.1 初始化和签名阶段80
        5.2.2 验证签名者阶段80
        5.2.3 验证签署信息阶段80-82
    5.3 改进协议82-85
        5.3.1 初始和签名阶段82
        5.3.2 验证签名者阶段82-83
        5.3.3 验证已签署的消息阶段83-84
        5.3.4 安全性分析84-85
    5.4 本章小结85-86
第六章 全文总结与展望86-90
    6.1 全文总结86-87
    6.2 展望87-90
参考文献90-102
致谢102-104
博士在读期间完成的论文104-106
博士在读期间参与完成的项目106