Quantum authentication method for access control among three elements of cloud computing

A technology of access control and authentication method, which is applied in the field of collar security communication, can solve the problem of no secret, etc., and achieve the effect of high communication efficiency and reliable security guarantee

Active Publication Date: 2017-02-22
QINGDAO TECHNOLOGICAL UNIVERSITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the data in cloud computing is confidential to users other than the data owner, but there is really no secret at all to the commercial organizations that provide cloud computing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum authentication method for access control among three elements of cloud computing
  • Quantum authentication method for access control among three elements of cloud computing
  • Quantum authentication method for access control among three elements of cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with accompanying drawing and embodiment, the present invention will be further described:

[0035] In this embodiment, set {|0>, |1>} to be a set of orthonormal basis, denoted as C x ;{|i>,|j>} is a set of orthonormal basis, denoted as C y ;C x with C y There is the following relationship between the two:

[0036]

[0037] Equivalent to:

[0038]

[0039] C x with C y Satisfy the following formula:

[0040]

[0041] The two photon EPR entangled pairs in the quantum entangled photon pair are in the following entangled states:

[0042]

[0043] likefigure 1 As shown, the mutual quantum authentication process between CSP and DUser in the cloud model is as follows:

[0044] (1) Both CSP and DUser establish a shared secret key:

[0045] A shared secret key K needs to be established between the sender CSP (Alice) and the receiver DUser (Bob). AB , the establishment of the key can be achieved through the quantum distribution protoco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum authentication method for access control between three elements of cloud computing, the three elements of cloud computing are data owner DOwner, data user DUser and cloud service provider CSP, including setting CSP and DUser as ERP entanglement pair and legally have the same ID number, conduct mutual quantum authentication between CSP and DUser; set DOwner and CSP as ERP entangled pairs and legally have the same ID number, and perform mutual quantum authentication between DOwner and CSP; when CSP and CSP When the mutual quantum authentication between DUser and the mutual quantum authentication between DOwner and CSP is successful, the quantum authentication between DOwner, DUser and CSP is successful; otherwise, the quantum authentication between DOwner, DUser and CSP fails .

Description

technical field [0001] The invention relates to the field of collar security communication, in particular to a quantum authentication method for access control between three elements of cloud computing. Background technique [0002] Cloud computing is an Internet-based model for the addition, use, and delivery of related services, often involving the provision of dynamically scalable and often virtualized resources over the Internet. Cloud is a metaphor for the network and the Internet. In the past, the cloud was often used to represent the telecommunication network in the diagram, and later it was also used to represent the abstraction of the Internet and the underlying infrastructure. Therefore, cloud computing can even allow you to experience the computing power of 10 trillion operations per second. With such powerful computing power, you can simulate nuclear explosions, predict climate change and market trends. Users access the data center through computers, notebooks,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/08
CPCH04L9/0852H04L9/3273H04L67/10H04L9/08H04L9/32H04L65/40
Inventor 肖淑芬董玉民马鸿洋陈立波
Owner QINGDAO TECHNOLOGICAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products