Secure quantum fog computing model based on blind quantum computation

被引:0
作者
Zhiguo Qu
Kunyi Wang
Min Zheng
机构
[1] Nanjing University of Information Science and Technology,Engineering Research Center of Digital Forensics, Ministry of Education
[2] Nanjing University of Information Science and Technology,Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology
[3] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[4] Nanjing University of Information Science and Technology,School of Computer and Software
[5] Hubei University of Science and Technology,undefined
来源
Journal of Ambient Intelligence and Humanized Computing | 2022年 / 13卷
关键词
Fog computing; Blind quantum computation; Quantum secret sharing; Quantum identity authentication;
D O I
暂无
中图分类号
学科分类号
摘要
As a computing service platform closer to users, fog computing has many advantages such as extremely low latency, good mobility, accurate location perception and wide distribution. It has developed rapidly in recent years. However, due to the wide distribution of fog nodes, complex network environments, and limited resources, the security of fog nodes is vulnerable to a variety of attacks, such as denial of service and abuse of resources. In order to effectively deal with these attacks, this paper proposes a quantum fog computing model based on blind quantum computation and verifiable quantum secret sharing. The model mainly relies on blind quantum computation to realize the security joint operation characteristics of multiple fog nodes, and the identity verifiable and channel detection protection features provided by the quantum secret sharing protocol, which can not only efficiently perform the functions of the classic fog computing, but also guarantee the security of information transmission and data calculation. Through the complete security analysis, the new quantum fog computing model proposed in this paper can effectively resist on a variety of fog computing attacks, thus achieving information security protection in both the content and process of fog computing.
引用
收藏
页码:3807 / 3817
页数:10
相关论文
共 87 条
[11]  
Sleator T(2018)Blind quantum computation with identity authentication Phys Rev A 382 938-2521
[12]  
Smolin JA(2012)Multiparty quantum secret sharing protocol with authentication J Chin Comput Syst 33 2518-223
[13]  
Weinfurter H(2018)Full-blind delegating private quantum computation CMC Comput Mater Contin 56 211-1037
[14]  
Barz S(2012)Continuous-variable blind quantum computation Phys Rev Lett 109 230502-59
[15]  
Kashefi E(2012)Blind topological measurement-based quantum computation Nat Commun 3 1036-624
[16]  
Broadbent A(2013)Secure entanglement distillation for double-server blind quantum computation Phys Rev Lett 111 020502-5189
[17]  
Fitzsimons JF(2018)A novel quantum stegonagraphy based on brown states CMC Comput Mater Contin 56 47-199
[18]  
Zeilinger A(2019)Analysis and improvement of steganography protocol based on bell states in noise environment CMC Comput Mater Contin 59 607-227
[19]  
Walther P(2001)A one-way quantum computer Phys Rev Lett 86 5188-503
[20]  
Briegel HJ(2007)Topological fault-tolerance in cluster state quantum computation New J Phys 9 199-32