电子学报 ›› 2020, Vol. 48 ›› Issue (5): 846-853.DOI: 10.3969/j.issn.0372-2112.2020.05.003

• 学术论文 • 上一篇    下一篇

d维(t,n)门限量子同态加密算法的设计与仿真

宋秀丽1,2, 周道洋2, 文爱君2   

  1. 1. 重庆邮电大学网络空间安全与信息法学院, 重庆 400065;
    2. 重庆邮电大学计算机科学与技术学院, 重庆 400065
  • 收稿日期:2019-05-23 修回日期:2019-12-04 出版日期:2020-05-25
    • 通讯作者:
    • 宋秀丽
    • 作者简介:
    • 周道洋 男,1992年出生,在读硕士生.研究方向为量子密码学,主要研究量子同态加密、量子秘密共享相关协议及其仿真实现.E-mail:243486249@qq.com;文爱君 女,1993年出生,在读硕士生.研究方向为量子密码学,主要研究量子计算、量子秘密共享相关协议.E-mail:766705892@qq.com
    • 基金资助:
    • 国家自然科学基金 (No.61772098,No.61772099,No.61802039); 重庆市科学技术委员会基础科学与前沿技术项目 (No.cstc2018jcyjAX0510)

Design and Simulation of d Dimensional (t,n) Threshold Quantum Homomorphic Encryption Algorithm

SONG Xiu-li1,2, ZHOU Dao-yang2, WEN Ai-jun2   

  1. 1. Chongqing University of Posts and Telecommunications, School of Cyber Security and Information Law, Chongqing 400065, China;
    2. Chongqing University of Posts and Telecommunications, College of Computer Science and Technology, Chongqing 400065, China
  • Received:2019-05-23 Revised:2019-12-04 Online:2020-05-25 Published:2020-05-25
    • Corresponding author:
    • SONG Xiu-li
    • Supported by:
    • National Natural Science Foundation of China (No.61772098, No.61772099, No.61802039); Basic and Frontier Research Program of Chongqing Municipal Science and Technology Commission (No.cstc2018jcyjAX0510)

摘要: 量子同态加密对量子态密文直接进行同态评估计算,而不是将密文解密之后再进行计算.基于相位和状态变换的d维通用酉算子,提出了一种d维(t,n)门限量子同态加密算法.在该算法中,客户端将量子态密文传送给n个服务器中的t个,这t个服务器生成评估子密钥,运行评估算法对量子态密文执行同态计算.客户端对解密之后的量子态执行CNOT门操作,t+1个粒子的聚合值就是评估算法对量子态明文计算之后的结果.该算法使用Shamir(t,n)门限机制隐藏了评估密钥,保护了客户端的隐私数据.从理论上证明了算法的正确性,各个阶段操作过程的仿真实现进一步验证了算法的正确性.

关键词: 量子同态加密, d维, (t,n)门限, 通用酉算子, 评估计算

Abstract: Quantum homomorphic cryptography directly evaluates the quantum ciphertext, rather than decrypts the quantum ciphertext and then calculates it. Based on a general d-dimensional unitary operator of phase and state transformation, a d-dimensional (t,n) threshold quantum homomorphic encryption algorithm was proposed. In this algorithm, the client sent the quantum state ciphertext to t of n servers. Each of the t servers generated the evaluation sub-keys, and then run the evaluation algorithm on the quantum state ciphertext to complete the calculation of quantum homomorphism. The client performed CNOT gates on the quantum states after decryption, and the aggregate value of t+1 particles was the result after evaluation calculation on the quantum state plaintext. The algorithm uses Shamir's (t,n) threshold scheme to hide the evaluation keys,so that it protects the client's private data. The theorems prove the correctness of the algorithm theoretically, and the simulations of each stage of the algorithm further verify its correctness.

Key words: quantum homomorphic encryption, d-dimension, (t,n) threshold, general unitary operator, evaluation calculation

中图分类号: