Model and method for user authentication for quantum key distribution network

A quantum key distribution and network technology, applied in the field of quantum key distribution, can solve problems such as limited experimental conditions, inability to accurately clone quantum states, and difficulty in realizing entangled states.

Active Publication Date: 2013-02-27
BEIJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The third is the quantum non-cloning theorem, that is, an unknown quantum state cannot be accurately cloned
Most of the existing research programs are based on entangled particles for user verification. Due to various reasons such as limited experimental conditions, there are still great difficulties in the realization of entangled states.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Model and method for user authentication for quantum key distribution network
  • Model and method for user authentication for quantum key distribution network
  • Model and method for user authentication for quantum key distribution network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. It should be understood that the specific examples described here are only used to explain the present invention, not to limit the present invention.

[0021] This example is a multi-user-based network model, and identity authentication needs to be performed between any two users in the network. Under the model and method designed by the present invention, any two communication users in the network can successfully complete the distribution of the pre-shared authentication key and the establishment of the secure quantum channel.

[0022] The completion of user identity authentication is based on the user obtaining the pre-shared key. A secure quantum channel can be established between any two nodes in the network. Take Alice and Bob as an example. A...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a model and a method for user authentication based on a trusted center in a quantum key distribution network, specifically, a user authentication model based on the trusted center is provided and an implementation method is described in detail, in order to realize the communication security between any two users in the network and prevent a man-in-the-middle attack. Based on the model, the invention further provides a method for user authentication, which comprises the following steps that: 1, any user requesting for communication in the network sends a connection request to the trusted center; 2, the trusted center sends a pre-shared key to the two communication parties respectively; 3, the two communication parties set up a quantum channel and are authenticated; and 4, the two parties are authenticated regularly or irregularly in the subsequent communication process. According to the invention, by fully considering the development status of the current quantum key distribution network and by combining with the actual requirement, a quantum communication channel can be set up securely between any two nodes in the network, so that the communication security between users can be realized.

Description

technical field [0001] The invention belongs to the field of quantum key distribution, and is a user authentication model and method designed for realizing the security of keys in a quantum key distribution network. Background technique [0002] Quantum key distribution is the use of quantum channels to transmit qubits (single photons or weak light signals); it provides an absolutely secure random sequence for both legal communication parties, and the security of quantum keys has been proved to be absolutely safe in theory. This is determined by the following fundamental laws of quantum mechanics. The first is Heisenberg's certainty principle, also known as the uncertainty principle, that is, two asymmetric physical quantities cannot be accurately measured at the same time. The second is the principle of measurement collapse, that is, the measurement of a quantum state will inevitably collapse the quantum state to an eigenstate. The third is the quantum non-cloning theorem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 孙咏梅张明纪越峰
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products