Font Size: a A A

Research On User Identity Credibility Evaluation Model In Quantum Communication Network

Posted on:2019-09-17Degree:MasterType:Thesis
Country:ChinaCandidate:J X XiongFull Text:PDF
GTID:2430330545956845Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The research project was completed under the support of the National Natural Science Foundation of China(Project No.61572008).The traditional cryptosystem guarantees its security based on computational security.With the rapid increase of computer computing capabilities,especially with the advent of quantum computers,traditional classical cryptosystems based on computational security will no longer be secure.Quantum communication is the result of a combination of quantum mechanics and classical information theory.Quantum communication provides theoretical unconditional security and the ability to detect the presence or absence of eavesdroppers.Quantum communications has achieved milestones in the past more than two decades.Although the universal application of quantum communication seems to be out of reach today,it has already taken the lead in practical stage in the laboratory stage and even some government affairs communication systems.In order for quantum communications to play its due role in various fields,it is imperative to promote the practical use of quantum communications.To promote the practical use of quantum communications,security is a key issue that urgently needs to be addressed.Identity authentication is an important part of ensuring the legitimacy of the users of both communications in all communications.If there is no identity authentication,then there is no guarantee that the two parties are legitimate users,and security cannot be guaranteed.Therefore,in the quantum communication network,not only identity authentication is needed to ensure the security and reliability of the users in the quantum communication network,but also authentication is needed.Improve the security of quantum communications.This thesis mainly introduces the research status and development trends of the user identity credible assessment model in quantum communication networks,and points out the future research directions.The research topic is summarized as follows:(1)Mathematical model for user identity management in quantum communication networksThis Thesis proposes a trusted mathematical model for user identities in quantum communication networks based on intuitionistic fuzzy set theory.Quantum state is used as the carrier to complete the ambiguity and accurate description of the ambiguity of the user's identity and solve the modeling problem of the ambiguity of the user's identity.Aiming at how to safely and effectively control and manage user identities in quantum communication networks,and how to solve the contradiction between the low controllability and security requirements of user identities in quantum communication network environments,design quantum Mechanisms and methods for secure,effective management and control of user identities in a communications network environment.(2)User Identity trust evaluation model in quantum communication networksThis dissertation proposes a credible identity credible evaluation model that does not depend on trusted third parties and uses the entangled state as a quantum carrier to effectively prevent the user's denial in the communication network.,fraudulent and eavesdropping issues,to achieve the fairness,impartiality,and traceability of the user's identity credible assessment,to ensure the authenticity,reliability and security of the user's identity credible assessment.(3)Quantum identity authenticationThis Thesis proposes a new quantum identity authentication protocol,which uses the Bell state as the transmission carrier and uses Bell state entanglement swapping and Bell base measurement to authenticate the users of both parties.The two Bell states do not need to do any unitary transformation in the transmission process,and only Bell basis measurement and bitwise XOR operation are needed to realize the information transmission and the authentication of the identity legitimacy.Only the preparation and measurement of the Bell state are required in the protocol,so it is technically easy to implement.In addition,the correctness of the protocol was verified and the security of the protocol was analyzed.
Keywords/Search Tags:Quantum identity authentication, Entanglement swapping, Bell based measurement, Quantum teleportation, Quantum trust model
PDF Full Text Request
Related items