Speech on quantum encryption technology

xiaoxiao2021-03-06  92

There are two in the development direction of future encryption technology, quantum encryption technology and biochemical technology, the following speech is about quantum encryption technology, it is easy to understand, recommended

On October 18, a large-scale international academic seminar held by the 4th "21st Century Calculation of the 21st Century", which was jointly organized by the Microsoft Asian Institute and the National Natural Science Foundation Committee. This is the grand academic conference in China, and the theme of this meeting is "high letter calculation". Yao Dynasty issued the "New Direction of Quantum Password" topic.

Here is the full text of the speech:

Dear guests, I am very happy, I am very happy to have a chance to meet you today. I want to thank the dean to give me this opportunity, come here.

I came to Beijing for the first time in 1986, I came again this year, I have been over in May. Now, I have seen the impression, my friend I have touched is still as kind, like the year, but the construction of the whole city , The environment and social equipment of the study, there are too many things to make more than before. In the past few years, I have graduated from the students from Beijing and other Chinese elite universities. They are very smart and very excellent, so from all aspects, I have a lot for China's progress in science. Information, I think it is very great.

I have to talk about the problem of quantum password today. This is a new technology, and it is also a development technology. It also attracted many scientists, including physicists, chemists, and information processing, including computer science. Experts to study this area, because it is a relatively new technology, and ultimately this discipline can go far. So today I want to do this, introduce you to my sense of discipline research, and introduce the direction of this discipline further, before the beginning, I want to introduce this proposition and related background, and how this conference is related of.

The first is the calculation of credit. That is, the calculation of high credibility, I think it is very wide, we must study how to make software more reliable, in today's calculation world, we must make communication also high Credibility. It is very difficult for every translation. Don't talk together, and this is also a very deep problem. Everyone has made many years of research work in each of this problem, in-depth at each level. If it is, it is indeed unbearable, it needs to be innovative on the idea. For example, sometimes it is very difficult to reach an agreement on their research or calculation results, in the encryption, sometimes everyone finds a lot of difficulties in mathematics, such as the issue of large decomposition, Here, many mathematical techniques further study how to use, including informationism, complexity of competition, and more. In pure data, including topology, etc., many problems and problems involving high-credibility, we are not eager to solve these problems in a short time, because it is still unclear, final solution What will it be. No matter how we work, we always need a lot of tools, especially we know, no matter what solution, encryption will occupy an important status, we hope that the procedures can be very reliable, able to prevent some deliberate Intrusion procedures, trying to ruin this program to achieve their purpose. The people actually have achieved some achievements in the encryption method. It used to be the field of government monopoly, and the people have more and more procedures for encryption. In the past three decades, there have been a lot of work in the field of encryption, we have learned some in this regard. Lessons, I want to give an example, that is, the method of the so-called public key, basically allow the people to be able to communicate with each other, but no need to pass any central processing system, the people can publish their materials on the Internet, and finally they It is possible to make a variety of meaningful intentional encryption. In addition, it has another very important advantage, that is, the encryption method of the public key, at least in encryption, it can maintain some kind of consistency, because if there is a very powerful example already established If you come out, if you want to reduce the security level of the system, if you think that you think it is very difficult, you don't want to sign the electronic sign, except for this public key encryption, there are some problems, first we want to put In the relatively simple assumption, what do you feel how to do? Is this this in a beach to build a castle? For example, the decomposition is very difficult, even if a good mathematician does not know the large number today, for example, decomposing the large number of five hundred digits, but supplement it is very real, maybe everyone still remember, recently In the New York Times, there is a report in the New York Times, that is, the three Indian scientists have some students, find a way, solve the test, an integer is a problem or a prime number of prime numbers, this problem is excellent in a row The mathematician can not solve it, but some new students will break the ring with a relatively simple approach. This shows that some ways to be safe is not so safe, and I have already found a way in the newspaper tomorrow. We have found a way. Decompose a lot, I will not be surprised.

In addition, there are similar assumptions, in addition to these, these things must be verified by future science and technology, today we can't do this, do not mean that we cannot design different operations, make the decomposition larger It is easy, in fact, since 1994, we have seen it. If we make quantum computers, we can decompose a large number, this is a technical issue. In the next five to ten years, the decomposition is still not allowed to do, but after 15 years, we can safely use this decomposition to make a computer as a safe assumption.

In addition, we encrypt the system, we put it in some unproveed assumptions, we can build them in principle, then in principle, we know that everything can be measured, but actually doing Not only, because we have seen, we want to do a lot of interesting things, but in the field of traditional law, we can't do this, but quantum physics begins for more than 100 years. Now quantum physics can help We better study the objective world, so the latest science and technology think about how to make quantum computers, we all know that this long-term research is very important. I think we have seen many encryption methods in the next few years, just In recent years, we have seen some scientific research results can turn the results of the vision, I feel that the forehead thinking is still very beneficial. I think quantum encryption is a very interesting direction. It is an interesting direction for our encrypted scientists and constructing high-reliability. I want to introduce the quantum encryption, in the usual world calendar, We usually build data into bytes, both parties talk, our goal is to make two between them, we have this ability now, through communication, the exchange of quantum objects, if we have this ability, we do have This ability is between the quantum objects, what we can achieve, what we can do before, or now lower cost than the previous cost, cheaper, there are some good The idea, the process development is generally slow, and it is not a very real way to use quantum physics to engage in electronic information. At that time, I thought of this piece at the time, I thought as a common wish, that is, this allocation, such as two Individuals want to communicate, they have two people to communicate before communicating, they can build secret keys through public channels, others can't hear, so they can pick up each other on public systems. Call, others can't hear, although others know their phone number, they can't hear their phones, this is a comparative early mode. So this is an example, explains the problem of allocating the key, so they find that it can be done, put the quantum object to each other, let everyone calculate the ability, even if they have an enemy, even if the enemy has a lot of blocking, But he still can't break the destruction system, and it is impossible to enter your system, and some other creations, in the past few processes, this process truly take off. And also thinking about the development of different projects, because our time is very limited, I don't want to review the development of the entire technology today, I just want to talk about the assessment of this area, I will spend a little more time to talk about it. Let's talk about what you may see interest. If we compare quantum encryption and public key encryption, it is obvious that the quantum is encrypted. It is far from now on the public key encryption system. Of course, this is not a good thing, because the quantum encryption is not as many public encryption keys, at least We have developed in quantum encryption, because quantum encryption involves mathematical problems, which is not to let you reinvent new physical laws, which is mainly mathematical problems than our traditional data calculations. . Because now is very interesting, simple questions we don't know how to answer, although the problem itself is not difficult to understand, but it is also a good thing for me. If you can make a breakthrough, we can better understand it. This object can also find more purposes.

What is our future development direction? I would like to introduce you to the future development direction. I have two themes. One is that I have said that our primary task is to solve the problem we have to solve now, but we can't do it now, according to the present way, I can't solve these problem. For example, we can study what the public key encryption system can do now, and then take a look at the same thing we can do in the quantum encryption system, we know that the key allocation is a great very important, typical Examples because it is very important, in this field, the problem facing is what we do. The second direction is to take a step away. It is not limited to solving the problem of traditionally faced, but to see that we can make new quantum objects to look at the future world, quantum encryption is very developed, we can Look at the quantum object is very developed, we don't use the quantum object, so we will talk about these two topics according to this order according to this order. Summarize the slide, so for us, a quantum object is a vector, in fact it is two-dimensional, two aspects, every aspect has a complex number, if you don't know the complex number, Change it to a simple number. A highlight of a quantum object is that I will give you a quantum object. For example, I give you a two-dimensional quantum object. If you don't tell you what it is, you don't know what this object is because of the quantum physics Among them, the only way to obtain information is to be measured, so there is a very specific device. By this device, it is understood that the quantum mechanics can accurately measure, and of course there are many measurements, each The measuring method is related to the base, there are two objects, but you can convert them into several angles, so you have to measure quantum objects, what is your measurement? You can predict this result, if you use it as the sum of the sum of the factors, E1 and E2 look into two numbers, this measurement can tell you, you can see 1 or 2. You can see that this total is one. Therefore, it has a feature. For example, this measurement can tell you accurately. What is this object, if I tell you, or e1 either E2, if you measure you, you can accurately know, 100% know what this vector is.

But on the other hand, if you are not E1 or E2, the results of the measurement are difficult to predict. Because they are difficult to calculate, the vector after the measurement can be measured, or may be E1, or E2 may be E2, which is some basic constituent components of quantum encryption. Many quantum encryption can be done according to these two characteristics, and can do more accurate, because I have just raised some examples. First, for example, any quantum object, if there is any quantum object, I am completely arbitrarily measured an object, can be a base, or a few Bases, such as measuring quantum object, I can see, of course I see one or two objects, this is not certain, just a probability, we assume that I have two vectors, these two vectors are not E1 and E2, they have an angle, such words because quantum physics Don't allow you to decide which vector is.

After doing this introduction, I will explain what the quantum encryption is? I picked two people, two people in Alice and Bob, this is an old problem, this question is Professor Brown, because this problem is very famous, according to the traditional theory, we do this in public In the background of the key, we can do this, you can do this, there is a natural problem, this is an encrypted measurement, this question is to say in the quantum-based physical environment, we are two Whether to decide, the result of the throwing curling is not completely accurate. Here we take a look at the funds that can be funds. If we have a better forecast for the results of the throw, any party can't turn around, suppose both parties It is very honest, almost 50%, 50%, if there is an honest, if another dishonest, this result cannot be determined. Now I am talking about the agreement between the throwing currency? I think it is very simple. First, Alice is randomly makes a choice. He thinks of a quantum object in a 50-degree angle, so Alice and Bob accept quantum objects, and he knows one of the four probability, Bob, choose one of the bases, do one By calculating, then get a result, then report these results, and report this base, and report to Alice's base, I think this is the work of the quantum encryption key, the key is that Alice should ensure that Bob is not going on Fraud. For example, Bob wants to choose some ... Alice, choose a base, Alice knows that Bob has some fraudulent behavior from the beginning, which actually has an offset proposition, I think I will not speak Specially detailed, I think just simply use the two results to be fully utilized, and it can also fully realize security protocols. Regardless of what Alice chooses what is the corresponding vector, it is indeed some probability that Bob may choose 0 and 1, so Alice has its control, and Bob will not deceive. If you come to see, if Bob gets 0, Bob will get all the passwords of Alice. Even Alice Height Bob, in this regard, transported him 1, in fact, there are two vectors in the 45-degree angle, and the probability is that Alice may choose one of the two vectors, even if Alice tells it, it is impossible to determine Bob selection. Which one, this, Bob needs to make such a preparation, he must understand Alice to choose that base. So this tells us that if you have a new technology, if we have a quantum object quantum object, we have two angles, we have made the corresponding measuring mathematics, we use it After testing, after finishing the test, you can see that we can further develop, I think this is the meaning of quantum cryptography. At the same time, it is quite simple. I think the mechanics of this quantum is not isolated, so we have to make more calculations in order to guarantee it, because it may be overlapping with other data, actually In my paper, you can also see that this offset is further improved. Through the improving of the offset, we can see that it has two techniques to control the result of its final result. There is also a result that shows that the result shows that the results that can be implemented are indeed limited, and Bob and Alice typical cases tell us that the results of quantum in this regard.

After we set successfully, we won some other results, we need to think about what we need to do. First, one direction is to work hard to do something that can't be done in the past, so in this direction, we can do two things, one thing we will take a look at the real problem, such as I just talk like I just talk. The specific problem, it is indeed that we have a lot of questions, such as the choice of encryption, and we can do a lot of things on the issue of public key. There is another problem that we have different processors, and they all need to do some computational features, but this variable is really not the same, so we can be in the end, every processor knows his own As a result, this processor does not know the result of other processors.

There is another interesting application, which is not a real theory, but in theory, it is likely to apply, for example, you have some of the people of the committee, they hope to get certain results. Get some results, for example, it will determine that some people get a million dollars, and finally you have drawn, you just want to get the result, don't want the people to know the process, because the people may do some adjustments, so In the end, you don't want people to know who I vote for the ticket, who voted against the ticket, so we have a very simple rule on the discussion process, so it can also be specified by quantum encryption.

Another issue called Millionaire, for example, there are two millionaires on the beach, who is more rich. But these two people are very paying great attention to privacy people. Of course they all know the final result, but I don't know how much wealth has, I think this is a very typical case, we can add quantum principle. There is also other problems, is it related to the two quantum objects, they can also be solved. It is indeed a long time, but has not found the answer yet.

First talk about it, we can solve the specific problems, in addition to the quantum encryption, we think it is not too early, we don't even know that it is the basic principle and theory of quantum encryption in many ways, but in the past In a few years, we have achieved some results, first allow me to talk about the most important issue I have been thinking, I think everyone knows, is called zero knowledge concept. For example, I hope to learn a little knowledge from some people, but this person wants to convince your knowledge is true. How can I construct this knowledge, and you can prove that knowledge is confirmed, but not add any subjective Intention, I think the concept of zero knowledge is actually very important in concept, and it provides typical cases in quantum encryption. I think we have just started research in this area, and it is quite difficult, and In the past few years, the people need a lot of courage to truly begin this research, I think this is a considerable topic.

Create a new quantum object idea. We need to build new quantum objects, such as let people be able to successfully copy passwords, and in this case, we can fully use public keys in the public domain. In addition, we have some other questions, suppose you have a quantum object, but it is a secret, such as it is a key, is a number of addresses, how do you let the people share this key? Share, you can re-design the key, only this can be realized, I want him to know, I want to talk about it, I have recently made some work.

In the field of calculation, the actual progress is actually called interactive system. If you want to make a calculation, use a traditional way to talk about it, you need to have a FX input, I think you do this is very complicated. So you need a super computer to help you, but don't truly believe in the supercomputer, you want to have a super computer to talk, and the last super computer can convince your calculation. It is actually completed, and the calculated process can also make You are convinced. In the figure, the people see this is very interesting concept, because it takes a lot of work. So I can think of a very interesting question, is it possible to do some calculations, use this way to calculate some quantum objects, such as I have a small quantum computer, I want to calculate a quantum object, I can make the country The laboratory's computer helps me do some quantum objects, and can convince me, they can do this. I want to do this according to the principle just talking, we can do this. If you have two super quantum computers, even if the intelligence is very low, it can be calculated in this regard. If you only have a good friend, you have no good friend, then what do you do? I think it is also a difficulty, but I show us quantum computational energy and ability. If you have a quantum, I think we can get more help.

Finally, summarize the information passed. Quantum encryptiveness has indeed helpful us in encryption, but it is not developing, so we can do a lot of basic research work. In addition, what I also want to say is what the quantum encrypts the future? What impact we can see in this area? First of all, we can choose not much, because of the people's calculations, I think I may not see the quantum computer production, but I think quantum encryption is really quite important. Second, quantum encryption is actually part of the technique of quantum information processing, not light to do quantum encryption, and quantum information processing and quantum calculation. If the quantum encryptive can become a high performance calculation, we still don't know what the exact answer looks like. I think quantum encryption is determined more than the quantum. In fact, we can see that we can make full use of encryptive schools in this area, I think this technology is relatively viable, but only when I look at the future.

thank you all

转载请注明原文地址:https://www.9cbs.com/read-98379.html

New Post(0)