Quantum key agreement method

A quantum key agreement, the technology of both parties, applied in the field of quantum key agreement, can solve the problems of reduced engineering efficiency and efficiency constraints on the realization of quantum secure communication projects, and achieve the effect of improving efficiency

Inactive Publication Date: 2009-09-23
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current negotiation method includes three aspects: interval division, bit judgment and error correction process. The theoretical efficiency of the Winnow method is very high, but because the method needs to use the map method to determine the parameters, the engineering efficiency of the whole method is greatly reduced. The efficiency of the negotiation method has always constrained the engineering realization of quantum secure communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key agreement method
  • Quantum key agreement method
  • Quantum key agreement method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036]The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.

[0037] Assume that Alice and Bob are in front of terminals in their respective cells, and the two cells are connected by the Internet. like figure 1 As shown, this embodiment includes the following steps:

[0038] Step 1. First, Alice and Bob choose their respective positions in the negotiation. If Alice decides to choose forward negotiation, then Alice chooses herself as the server and Bob as the client. If Alice decides to use reverse negotiation, then Alice chooses herself as the server. In the client, Bob acts as the server; without loss of generality, Alice can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a quantum key agreement method belonging to the technical field of information security, comprising the following steps: 1, two agreement communications users selecting respective positions in the agreement: if one user decides to select forward agreement, the user selects self to be the server end and the other user becomes the client; 2, the server end begins to monitor the network, then the client inputs the IP address of the server end and begins to connect the server end; 3, the two agreement communications users exchange original error rates and agreement data files with each other and undertake negotiation handling by winnow method which contains adaptive interval selection functions; 4, once inputting the bit string length obtained from the eavesdropper after agreement, any user can decide to begin a privacy enhanced process, so as to obtain a safe communication key in the textboxes of the two agreement communications users. The adaptive interval selecting method of the invention improves the rate of Winnow method, thus increasing the rate of the agreement method.

Description

technical field [0001] The present invention relates to a method in the technical field of information processing, in particular to a quantum key agreement method. Background technique [0002] The combination of quantum mechanics and cryptography gave birth to quantum cryptography, which can complete a perfect security system that cannot be completed only by traditional mathematics. Quantum cryptography proposes a brand-new secure communication system based on quantum theory. It fundamentally solves the problem that quantum characteristics cannot be ignored, and measurement action is an integral part of quantum mechanics. Among these laws, the uncertainty principle plays a key role in quantum cryptography, that is, when measuring a quantum system, it will usually cause disturbance to the system and produce incomplete information about the state of the system before measurement, so any Any effort to monitor a channel interferes in some detectable way with the information tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L1/00
Inventor 钱旭东朱俊曾贵华
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products