CN-121984662-A - Homomorphic encryption-based non-local CNOT gate verification method and related device
Abstract
The invention discloses a homomorphic encryption-based non-local CNOT gate verification method and a related device, wherein the method comprises the steps of initializing, namely determining an operation mode A resource layer, namely operating entanglement resource check CHSH, and reserving the first layer when the CHSH passes The entangled particles are entangled, the input layer sends QOTP the encrypted input state to the execution layer, and the execution layer uses the first layer The method comprises the steps of performing local CNOT on entangled particles, performing intermediate verification, namely randomly triggering sampling feedback by a control center, performing logic operation verification, transferring to a measurement layer after the logic operation verification is qualified, performing measurement behavior verification, and obtaining a measurement result after verification by the measurement layer And a correction layer for verifying the measurement result by the control center The data security can be improved by the method and the related device.
Inventors
- ZHU CHANGHUA
- ZHANG JINGHAI
- ZHAO YUAN
- HE XIANDENG
- QUAN DONGXIAO
- ZHAO NAN
- YI YUNHUI
Assignees
- 西安电子科技大学
Dates
- Publication Date
- 20260505
- Application Date
- 20260306
Claims (10)
- 1. The non-local CNOT gate verification method based on homomorphic encryption is characterized by comprising the following steps: initialization, determining a mode of operation ; A resource layer, namely operating entangled resource check CHSH, and reserving the first layer when the CHSH passes For entangled particles; an input layer, which is used for sending QOTP encrypted input states to an execution layer; An execution layer using the first layer Performing a local CNOT on the entangled particles; Intermediate verification, namely randomly triggering sampling feedback by a control center, performing logic operation verification, and transferring to a measurement layer after the logic operation verification is qualified; a measurement layer for performing measurement behavior verification and obtaining the measurement result after verification ; Correction layer the control centre uses the verified measurement result Sending the correction operation to a server to execute the correction operation; And final state processing, namely when the calculation mode is adopted at the moment, the output state of the server is used for the next step, when the verification mode is adopted at the moment, the output state of the server is compared with an expected result, and when the output state of the server and the expected result are not matched, the protocol is considered to be mistaken and stopped.
- 2. The homomorphic encryption-based non-local area CNOT gate verification method according to claim 1, wherein the process of running entanglement resource verification CHSH is: control center request For entangled particles, for the Performing blind replacement on the entangled particles; From the said For entangled particles, the control center randomly extracts The entangled particles are used as a test set; performing a CHSH game for each pair of entangled particles in the test set; the control center sends the entangled particles to the control center And And transmits one bit respectively; selection based on received bits Or (b) A base measurement; selection based on received bits Or (b) A base measurement; collecting measurement results, and calculating CHSH association value according to the measurement results ; According to the CHSH association value Judging whether the entangled resource check is qualified, and outputting the first if the entangled resource check is qualified And entangled particles.
- 3. The homomorphic encryption-based non-local CNOT gate verification method of claim 2, wherein when And (5) considering that the entangled resource is checked to be qualified.
- 4. The homomorphic encryption-based non-local CNOT gate verification method of claim 2, further comprising comparing the two data points to each other The entangled particles are temporarily stored in a quantum memory.
- 5. The homomorphic encryption-based non-local area CNOT gate verification method according to claim 2, wherein the process of performing the logical operation verification is: in the verification mode, true entanglement pairs are not distributed but are injected into a trap state; the server returns partial quantum states at preset time or judges by using measurement results verified by measurement behaviors; after decryption, when the measurement result does not accord with the expected trap value, the logic error or malicious tampering is judged to happen.
- 6. The homomorphic encryption-based non-local area CNOT gate verification method according to claim 2, wherein the process of performing measurement behavior verification is: constructing an encryption function; measuring commitment; The control center sends challenges according to the current mode : When Z-based measurement is needed, then The server performs the Z-based measurement and returns the original image And the measurement result b of the auxiliary bit, the control center verifies Whether or not it is established, when it is established, the measurement result m A ,m A =b after feedback verification; when X-base measurement is needed, then The server executes Hadamard base measurement and returns the measurement result of the original image And the measurement result b of the auxiliary bit, the control center is used for controlling the control center according to m A measurement result m B is obtained, in which, Is that Is a primary image of the image.
- 7. The homomorphic encryption-based non-local CNOT gate verification method of claim 2, wherein the encryption function is constructed by a control center generating NTCF key pairs Defining a function , The function has trapdoor properties and has claw-free properties in quantum superposition.
- 8. The homomorphic encryption-based non-local area CNOT gate verification method according to claim 2, wherein the measurement commitment procedure is: when a measuring link of a non-local CNOT gate is executed, a control center requires a server to construct an overlapped state; Server measurement image register acquisition Will be Returns to the control center as promise, at this time, the image register collapses to Is a superposition of the solutions of (a).
- 9. Computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the homomorphic encryption based non-local CNOT gate verification method according to any one of claims 1-8 when the computer program is executed.
- 10. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the steps of the homomorphic encryption based non-local CNOT gate verification method according to any one of claims 1-8.
Description
Homomorphic encryption-based non-local CNOT gate verification method and related device Technical Field The invention belongs to the field of data transmission protocols, and relates to a homomorphic encryption-based non-local CNOT gate verification method and a related device. Background In the architecture of distributed quantum computing and quantum internet, a non-local quantum logic gate is a core component for realizing cross-node quantum information processing. In particular, controlled not gate (CNOT), as an essential component of general quantum computing, its implementation between spatially isolated nodes typically relies on pre-distributed entangled resources (e.g., bell states) and local operation and classical communication (loc). In a practical distributed environment, quantum nodes (servers) and quantum channels tend to be in an untrusted or hostile state. Existing non-local CNOT gate implementations (such as Eisert protocol) mainly focus on physical feasibility and resource minimization of the implementation, and lack an endogenous security verification mechanism. A verification protocol is therefore required to ensure the integrity of non-local CNOT gate operation. The prior art scheme is as follows: In the prior art, wang et al propose a black box quantum CNOT gate invisible state transmission verification scheme based on Bell non-locality, the scheme aims at an unreliable provider scene, a dual threshold criterion against high average fidelity and CHSH inequality violation is established by analyzing local measurement statistical association after quantum operation, and the aim of distinguishing real quantum non-local operation from potential classical simulated fraud by utilizing a statistical boundary is achieved, so that the reliability of a quantum computing node is evaluated. The prior art relies primarily on statistical boundaries to verify non-local CNOT gates. The method has the main defects that the security is built on a probability model, simulation deception of malicious adversaries through a precise classical algorithm cannot be fundamentally stopped in the aspect of computational complexity, meanwhile, the scheme generally adopts plaintext transmission or lacks a targeted encryption mechanism, the input state and circuit privacy of a user cannot be protected (namely, the method does not have blind computational characteristics), and selective attack on test bits is difficult to effectively defend, so that the security of data is low. Disclosure of Invention The invention aims to overcome the defects of the prior art and provides a non-local CNOT gate verification method and a related device based on homomorphic encryption, wherein the method and the related device can improve the security of data. In order to achieve the above purpose, the invention discloses a non-local CNOT gate verification method based on homomorphic encryption, which comprises the following steps: initialization, determining a mode of operation ; A resource layer, namely operating entangled resource check CHSH, and reserving the first layer when the CHSH passesFor entangled particles; an input layer, which is used for sending QOTP encrypted input states to an execution layer; An execution layer using the first layer Performing a local CNOT on the entangled particles; Intermediate verification, namely randomly triggering sampling feedback by a control center, performing logic operation verification, and transferring to a measurement layer after the logic operation verification is qualified; a measurement layer for performing measurement behavior verification and obtaining the measurement result after verification ; Correction layer the control centre uses the verified measurement resultSending the correction operation to a server to execute the correction operation; And final state processing, namely when the calculation mode is adopted at the moment, the output state of the server is used for the next step, when the verification mode is adopted at the moment, the output state of the server is compared with an expected result, and when the output state of the server and the expected result are not matched, the protocol is considered to be mistaken and stopped. Further, the process of operating the entanglement resource check CHSH is as follows: control center request For entangled particles, for thePerforming blind replacement on the entangled particles; From the said For entangled particles, the control center randomly extractsThe entangled particles are used as a test set; performing a CHSH game for each pair of entangled particles in the test set; the control center sends the entangled particles to the control center AndAnd transmits one bit respectively; selection based on received bits Or (b)A base measurement; selection based on received bits Or (b)A base measurement; collecting measurement results, and calculating CHSH association value according to the measurement results ; According to the CHSH