Classical channel message authentication method and device for quantum key distribution system

A technology of quantum key distribution and message authentication, applied in the field of classical channel message authentication

Inactive Publication Date: 2013-01-30
INST OF INFORMATION ENG CAS
View PDF3 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0026] In order to solve the problem that the QKD system cannot work normally in the case of errors in the classical channel in the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Classical channel message authentication method and device for quantum key distribution system
  • Classical channel message authentication method and device for quantum key distribution system
  • Classical channel message authentication method and device for quantum key distribution system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0069] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0070] In this field, CRC-based MAC is a proven message authentication code with information theory security, and its security meets our requirements for the required authentication mechanism. In this system, the hash value of the authenticated message is obtained by using a general hash function, and then the hash value is filled with the one-time pad key as MAC and sent to the receiver together with the authenticated message. An authentication scheme based on cyclic check code CRC such as image 3 As shown, after receiving the message from the channel, the receiver first extracts the original message bit string M and the n-bit MAC value appended to it, and calculates the MAC value of M and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a classical channel message authentication method for a quantum key distribution (QKD) system. The method comprises the following steps of: generating a message authentication code (MAC) value of an original message M, and interpolating the MAC value into the original message M according to a preset position to form an original data bit string; performing an appointed number of grades of error correction on the data bit string, sending the data bit string to a receiver through a classical channel, and performing a corresponding number of grades of decoding on the data by the receiver according to a preset decoding method; extracting the message M and the corresponding MAC value from the decoded data string, and calculating the MAC value of the message M extracted by decoding according to a preset calculation method; and comparing the calculated MAC with the MAC extracted by encoding by the receiver, if the MAC values are the same, determining that the extracted original message M is from a sender and is not modified, otherwise, determining that the original message M does not pass through the authentication. By the method, a necessary cryptology scheme is supplied to the QKD system.

Description

technical field [0001] The invention relates to the technical field of data communication, in particular to a classical channel message authentication method and device for a quantum key distribution system. Background technique [0002] The currently used cryptographic system is usually based on an unsolved mathematical problem (such as the factorization of large numbers), and its communication security often relies on the mathematical assumption that "existing computer capabilities cannot be solved" to ensure that it cannot be deciphered in theory possibility has not been proven. In addition, it is impossible to effectively detect the attacker's eavesdropping behavior in the classical channel. After the key is distributed, there is no sufficient reason to prove that the key has not been tampered with or exchanged during transmission. Therefore, the key distribution problem in the classical cryptosystem has always been It is a more difficult question. The quantum computer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 杨理周瑞瑞李昭
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products