Efficient generic Hash function authentication scheme suitable for quantum cryptography system

A quantum cryptography and scheme technology, which is applied in user identity/authority verification and key distribution, can solve the problems of large number of keys, reduced security, and low implementation efficiency, and achieves low resource consumption, guaranteed security, and novel design methods Effect

Active Publication Date: 2015-01-07
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the two in terms of security and implementation efficiency, the latter is more efficient but requires more keys. In practice, key expansion is often used, which in turn reduces security; the former is not efficient and secure The parameter is related to the length of the authentication message, which is not suitable for high-speed and large authentication data environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient generic Hash function authentication scheme suitable for quantum cryptography system
  • Efficient generic Hash function authentication scheme suitable for quantum cryptography system
  • Efficient generic Hash function authentication scheme suitable for quantum cryptography system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings.

[0039] The present invention is an identity authentication scheme. The scheme adopts a word-based design method. After the scheme completes the initialization of the shared key and the word linear feedback shift register, the authentication message is converted to Carry out vector multiplication with the register state in turn, and accumulate through the accumulator, and finally XOR with the random number to obtain the message authentication code, and then send the authentication message and the message authentication code to the other party to achieve the function of identity authentication.

[0040] Describe technical scheme of the present invention in detail below

[0041] 1. The overall framework of the program

[0042] The overall framework of the program is divided into three parts:

[0043]Component A: a word-based σ-linear feedback ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient generic Hash function authentication scheme suitable for a quantum cryptography system. In the scheme, a word-based design way is adopted. The scheme comprises the following steps: initializing a shared key of both parties and a word linear feedback shift register; performing vector multiplication on an authentication message and a register state in sequence by using an iteration and vector multiplier of the word linear feedback shift register; performing accumulation through an accumulator; performing exclusive or processing on a random number to obtain a message authentication code; and transmitting an authentication message and the message authentication code to the other party to realize an identity authentication function. The authentication scheme disclosed by the invention is clear in design principle, a design way is open, and any manual security defect does not exist; through the authentication scheme, an ideal safety security attribute can be achieved, and an efficient identity authentication function can be provided for the quantum cryptography system; and the authentication scheme has the characteristics of low occupation of resources, high portability and high platform adaptability.

Description

technical field [0001] The invention relates to an identity authentication scheme in the field of information security, in particular to an efficient pan-Hash function authentication scheme suitable for quantum cryptography systems. Background technique [0002] Quantum communication is a new interdisciplinary subject developed in the past two decades, and it is the product of the combination of quantum theory and information theory. It mainly uses the quantum entanglement effect for information transmission, and its research mainly involves quantum cryptography communication, quantum teleportation and quantum dense coding. Among them, quantum cryptography communication is actually a key distribution (QKD) process, and its security mainly depends on the Heisenberg uncertainty principle in quantum mechanics, the single quantum non-cloning theorem and the indivisibility of quantum, making the eavesdropper Any information-obtaining operation of , will be detected by destroying...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 曾光马智魏正超杨阳王洪
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products