Secure quantum fog computing model based on blind quantum computation

被引:0
作者
Zhiguo Qu
Kunyi Wang
Min Zheng
机构
[1] Nanjing University of Information Science and Technology,Engineering Research Center of Digital Forensics, Ministry of Education
[2] Nanjing University of Information Science and Technology,Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology
[3] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[4] Nanjing University of Information Science and Technology,School of Computer and Software
[5] Hubei University of Science and Technology,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2022年 / 13卷
关键词
Fog computing; Blind quantum computation; Quantum secret sharing; Quantum identity authentication;
D O I
暂无
中图分类号
学科分类号
摘要
As a computing service platform closer to users, fog computing has many advantages such as extremely low latency, good mobility, accurate location perception and wide distribution. It has developed rapidly in recent years. However, due to the wide distribution of fog nodes, complex network environments, and limited resources, the security of fog nodes is vulnerable to a variety of attacks, such as denial of service and abuse of resources. In order to effectively deal with these attacks, this paper proposes a quantum fog computing model based on blind quantum computation and verifiable quantum secret sharing. The model mainly relies on blind quantum computation to realize the security joint operation characteristics of multiple fog nodes, and the identity verifiable and channel detection protection features provided by the quantum secret sharing protocol, which can not only efficiently perform the functions of the classic fog computing, but also guarantee the security of information transmission and data calculation. Through the complete security analysis, the new quantum fog computing model proposed in this paper can effectively resist on a variety of fog computing attacks, thus achieving information security protection in both the content and process of fog computing.
引用
收藏
页码:3807 / 3817
页数:10
相关论文
共 87 条
[1]  
Affleck I(1988)Valence bond ground states in isotropic quantum antiferromagnets Commun Math Phys 115 477-528
[2]  
Kennedy T(1995)Elementary gates for quantum computation Phys Rev A 52 3457-3457
[3]  
Lieb EH(2012)Demonstration of blind quantum computing Science 335 303-308
[4]  
Tasaki H(2001)Persistent entanglement in arrays of interacting particles Phys Rev Lett 86 910-913
[5]  
Barenco A(2016)Fog and iot: an overview of research opportunities IEEE Internet Things 3 854-864
[6]  
Bennett CH(2005)Secure assisted quantum computation Quantum Inf Comput 5 456-466
[7]  
Cleve R(1989)Quantum computational networks Proc R Soc Lond Ser Contain Papers Math Phys Character 425 73-90
[8]  
DiVincenzo DP(2019)Rational non-hierarchical quantum state sharing protocol CMC Comput Mater Contin 58 335-347
[9]  
Margolus N(2016)Multiple-server flexible blind quantum computation in networks Int J Theor Phys 55 3001-3007
[10]  
Shor P(2014)Triple-server blind quantum computation using entanglement swapping Phys Rev A 89 040302-941