A network key distribution method and system based on computational associative imaging

A technology for associating imaging and network keys, which is applied in key distribution to achieve the effects of low system cost, good application prospect and low manufacturing cost

Inactive Publication Date: 2017-03-08
NAT SPACE SCI CENT CAS
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there is no solution that is superior to optical encryption based on computational ghost imaging and classical security communication in terms of security, and is easy to implement high-speed networking in terms of application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network key distribution method and system based on computational associative imaging
  • A network key distribution method and system based on computational associative imaging
  • A network key distribution method and system based on computational associative imaging

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0059] Such as figure 1 The scheme diagram of the high-speed network key distribution method based on computational correlation imaging in the present invention is shown, the method includes the following steps:

[0060] 1) The legitimate user uses a part of the initial key to verify the identity of the server. These initial keys are distributed by the server to legitimate users through QKD or other methods. We assume that these keys are completely secure;

[0061] 2) The server uses n initial keys to obtain n light intensities I through the optical system i , and then send the n light intensities to legal users through the public channel.

[0062] 3) Legal users (A, B...N) receive n light intensities I from the server i , and then use the same n initial keys and n light intensities I i Image information is obtained by associative calculation.

[0063] 4) The legal user extracts the gray value of each pixel in the image, and then generates a binary number 0 or 1 accordin...

no. 2 example

[0082] In this embodiment, the scattering medium is used as the object. Figure 4 It is the image of the scattering medium when n=597. To obtain the key sequence, a total of 3582 pairs of data I i and Divided into 6 groups according to n=097, we can get 6 cards with Figure 4Similar pictures, a total of 152600 keys were extracted.

[0083] The key randomness test results are shown in Table 2. Among them, the amount of data is 152600 bits.

[0084] Table 2 The verification results of key sequences generated using scattering media as objects

[0085]

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method and a system for network secret key distribution based on calculation correlated imaging. The method includes that step 101), a server sends light intensity information to legitimate users; step 102), the legitimate users adopt a method of calculation correlated imaging to acquire images through the light intensity information received from the server, extract secret keys according to gray values of pixels and acquire a communication secret key among the legitimate users; the step 102) further includes that step 102-1), the legitimate users utilize n initial secret keys and n light intensity information Ii identical with the server to acquire image information through correlation calculating; step 102-2), the legitimate users extract the gray value of each pixel in the images, generate a binary number 0 or 1 according to parity of a certain bit of each gray value and finally acquire a current secret key formed by a binary bit sequence, a part of the current secret key is taken as a source used for generating the initial secret keys during interaction with the server in the future, and the rest of the current secret key is taken as a communication secret key sequence among the legitimate users.

Description

technical field [0001] The invention relates to the technical field of key distribution, in particular to a high-speed network key distribution method based on computational correlation imaging, which can realize networked key distribution in a high-speed, secure manner. Background technique [0002] As we all know, the one-time pad encryption method is considered to be completely safe in secure communication. But how to securely distribute the key to legitimate users is an important issue. Quantum Key Distribution (QKD for short) can safely distribute keys to legitimate users, and its security is unconditionally guaranteed by quantum mechanics. The first protocol was proposed by Bennett and Brassard known in 1984 and is called the BB84 protocol. Since then, many quantum key distribution protocols have been proposed, such as E91, B92, SARG04 and so on. Although these protocols are considered to be unconditionally secure, they are point-to-point communication methods with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 李申翟光杰吴令安姚旭日俞文凯刘雪峰王超
Owner NAT SPACE SCI CENT CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products