摘要:
A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths.
摘要:
A method and system for performing a quantum bit commitment protocol is provided. The method of performing a quantum bit commitment protocol to send bit information from a first party to a second party includes a pre-commit phase to randomly select and send, by the second party, a quantum state to the first party; a commit phase to perform, by the first party, a unitary transformation on the quantum state to combine the bit information with the quantum state and send the unitary-transformed quantum state to the second party; a hold phase to hold the unitary-transformed quantum state for a predetermined time period; and a reveal phase to provide, by the first party, information about the unitary transformation to the second party to open the bit information to the second party. The reveal phase may include a verification process to check if the opened bit information matches the bit information committed in the commit phase. For example, the verification process may be performed by checking if a quantum state obtained by performing an inverse unitary transformation of the unitary-transformed quantum state matches the quantum state selected in the pre-commit phase.
摘要:
the present invention provides a method for authenticating a user in a multiparty quantum communication comprising: generating l quantum entangled states with N particles and transmitting each particle of the l quantum entangled states to N users, by a quantum communication server, wherein the N is a natural number larger than 2; determining, by the quantum communication server, whether a disguised attacker exists among N users on the basis of a first error rate calculated by using n quantum states randomly selected from the l quantum states possessed by the users respectively and a previously shared secret key in each of the users; and controlling, by the quantum communication server, each of the users to generate a new secret key using mk quantum states and replace the previously shared secret key with the new secret key.