摘要:
A method of user-authenticated quantum key distribution according to the present invention shares a position having the same basis without making public basis information using previously shared secret keys and authenticates a quantum channel by confirming whether there is the same measured outcome at that position, in order to secure unconditional security of BB84 quantum key distribution (QKD) protocols vulnerable to man-in-the-middle attack.
摘要:
A method and system for performing a quantum bit commitment protocol is provided. The method of performing a quantum bit commitment protocol to send bit information from a first party to a second party includes a pre-commit phase to randomly select and send, by the second party, a quantum state to the first party; a commit phase to perform, by the first party, a unitary transformation on the quantum state to combine the bit information with the quantum state and send the unitary-transformed quantum state to the second party; a hold phase to hold the unitary-transformed quantum state for a predetermined time period; and a reveal phase to provide, by the first party, information about the unitary transformation to the second party to open the bit information to the second party. The reveal phase may include a verification process to check if the opened bit information matches the bit information committed in the commit phase. For example, the verification process may be performed by checking if a quantum state obtained by performing an inverse unitary transformation of the unitary-transformed quantum state matches the quantum state selected in the pre-commit phase.
摘要:
A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths.
摘要:
the present invention provides a method for authenticating a user in a multiparty quantum communication comprising: generating l quantum entangled states with N particles and transmitting each particle of the l quantum entangled states to N users, by a quantum communication server, wherein the N is a natural number larger than 2; determining, by the quantum communication server, whether a disguised attacker exists among N users on the basis of a first error rate calculated by using n quantum states randomly selected from the l quantum states possessed by the users respectively and a previously shared secret key in each of the users; and controlling, by the quantum communication server, each of the users to generate a new secret key using mk quantum states and replace the previously shared secret key with the new secret key.
摘要:
A dynamic multi-dimensional code generation and recognition apparatus in which time information and visual recognition information are combined, and a method thereof are provided. According to the present invention, a dynamic multi-dimensional code or a time-variant code including visual recognition information which is associated with source information and changed over time is provided. Accordingly, users may easily ascertain existence of the multi-dimensional code and intended contents of the source information.
摘要:
A method of user-authenticated quantum key distribution according to the present invention shares a position having the same basis without making public basis information using previously shared secret keys and authenticates a quantum channel by confirming whether there is the same measured outcome at that position, in order to secure unconditional security of BB84 quantum key distribution (QKD) protocols vulnerable to man-in-the-middle attack.
摘要:
A lightweight group signature system and method with short signatures according to the exemplary embodiments of the present invention can provide security characteristics similar to group signature mechanisms providing the existing known controllable linkability but can make a revocation method simple by outputting a short signature and providing excellent operation efficiency at the time of signature generation, signature verification, and revocation on smart terminals, and can be widely applied to various anonymity-based application environments, making by making operation efficiency excellent at the time of signature generation and verification and outputting very short signature lengths.
摘要:
A mobility technology for strengthening safety for an invasion of privacy caused by leakage of contact information is provided. A privacy protection system may include an acquisition attempt detecting unit to detect an external communication terminal that attempts to acquire contact information included in the profile, and an access controller to provide the detected external communication terminal with a right to use the contact information, and to determine whether the contact information is to be provided.
摘要:
A dynamic multi-dimensional code generation and recognition apparatus in which time information and visual recognition information are combined, and a method thereof are provided. According to the present invention, a dynamic multi-dimensional code or a time-variant code including visual recognition information which is associated with source information and changed over time is provided. Accordingly, users may easily ascertain existence of the multi-dimensional code and intended contents of the source information.