Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Identity authentication method during quantum secret key application process

A quantum key and identity authentication technology, which is applied in the field of identity authentication in the quantum key application process, can solve the problems that the quantum state cannot be copied, and the quantum state cannot be accurately measured, so as to reduce the difficulty and strongly resist replay attacks , the effect of improving safety

Active Publication Date: 2016-07-13
ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The quantum uncertainty principle shows that an unknown quantum state cannot be accurately measured, and the quantum non-cloning principle shows that people cannot copy an unknown quantum state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method during quantum secret key application process
  • Identity authentication method during quantum secret key application process
  • Identity authentication method during quantum secret key application process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described in detail below in conjunction with the accompanying drawings and examples, but the protection scope of the present invention is not limited thereto.

[0030] refer to Figure 1-4 , the present invention a kind of identity authentication method in quantum key application process, comprises the following steps:

[0031] S1. Quantum network deployment stage; the present invention includes a client, a server, and a quantum network connecting the two. The quantum network includes two channels, namely, a quantum channel and a classical channel. The quantum channel is used to distribute quantum keys , the classical channel is used to transmit classical information other than quantum keys. The client and server have their own quantum gateways, encryption algorithm libraries, and hash algorithm libraries. The server also has a data storage server. At the beginning, the operation is carried out by trusted staff as follows: the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication method during a quantum secret key application process. The identity authentication method includes the steps: a quantum network deployment phase, a preparation initial phase, a secret key preparation phase, an identity authentication phase and a secret key application phase. During an abstract extraction process, as the identity authentication method uses a quantum secret key and the quantum secret key is provided with true randomness, the difficulty for performing reverse operation on the abstract can be further reduced and the safety for information transmission can be improved; and at the same time, after accomplishment of one time of session identity authentication, only a device for identity authentication is allowed to apply for a secret key, so that the safety is further improved through verification of the device information, and during the process, a session ID is in continuous changing state and depends on a plurality of factors, so that a large amount of impersonation attack can be timely eliminated through verification of the session ID. For the identity authentication method during a quantum secret key application process, the secret key is applied to the quantum secret key application process to verify the legal identity between two parties for communication, so that verification of the legal identity of the opposite side between the two parties for communication can be realized and the required data for verification has absolute safety during the transmission process in the network.

Description

technical field [0001] The invention belongs to the field of quantum communication, and in particular relates to an identity authentication method in a quantum key application process. Background technique [0002] As human society enters into informatization, people communicate more and more frequently, people's demand for information is increasing day by day, and the acquisition and release of information has penetrated into everyone's daily life. But at the same time, various incidents of information leakage and illegal access to information continue to occur, which makes information security increasingly the focus of attention. [0003] Communication security is not only the primary concern of both communication parties, but also the most prominent security issue in the information society. Verifying the legal identity of both parties in communication is the first guarantee to ensure communication security. The existing identity authentication mechanism generally adopt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/0847H04L9/0852H04L63/0869
Inventor 夏从俊喻斌陈忠杰张鑫
Owner ZHEJIANG SHENZHOU QUANTUM NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products