Quantum secret key distribution method with function of bidirectional identity authentication

A technology of quantum key distribution and two-way identity authentication, which is applied in the field of quantum key distribution with two-way identity authentication, can solve the problems of particle efficiency and low efficiency, achieve the effect of easy operation, concise protocol, and information security

Active Publication Date: 2017-05-17
CHENGDU UNIV OF INFORMATION TECH
View PDF5 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a quantum key distribution method with two-way identity authentication, which aims to solve the problem of l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret key distribution method with function of bidirectional identity authentication
  • Quantum secret key distribution method with function of bidirectional identity authentication
  • Quantum secret key distribution method with function of bidirectional identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with embodiments. It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.

[0029] The application principle of the present invention will be described in detail below with reference to the accompanying drawings.

[0030] Such as figure 1 As shown, the quantum key distribution method with mutual identity authentication provided by the embodiment of the present invention includes the following steps:

[0031] S101: First perform eavesdropping detection, identity authentication and key distribution based on the entanglement characteristics of Bell states, and then complete identity authentication and key distribution through a quantum sequence transmission;

[0032] S102: The protocol also has the fea...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum secret key distribution method with a function of bidirectional identity authentication, and the method comprises the steps: carrying out the interception detection, identity authentication and secret key distribution based on Bell state entangle properties, and then completing the identity authentication and secret key distribution through primary quantum sequence transmission; firstly detecting the channel safety, secondly carrying out the identity authentication, and finally carrying out the secret key distribution. According to the invention, the method carries out the interception detection, identity authentication and secret key distribution based on Bell state entangle properties, and then completes the identity authentication and secret key distribution through primary quantum sequence transmission, thereby improving the utilization efficiency of particles and communication efficiency, and enabling a protocol to be more concise. The protocol has the characteristic of zero knowledgeability during identity authentication. Even if a user is simulated, a simulator still cannot obtain any valuable information in the communication, thereby further guaranteeing the information safety of the user. When two sides need to carry out the secret key distribution, the protocol firstly detects the channel safety, secondly carries out the identity authentication, and finally carries out the secret key distribution.

Description

Technical field [0001] The invention belongs to the field of quantum communication technology, and in particular relates to a quantum key distribution method with two-way identity authentication. Background technique [0002] Compared with the classical key distribution, quantum key distribution QKD (Quantum Key Distribution) is that the two communicating parties use quantum states as the carrier of information, and then transmit it through the quantum channel, while using the classical channel as an auxiliary tool, and finally to the communicating parties Distribute keys for confidential communication. The security of QKD is ensured by the Heisenberg uncertainty principle, quantum unclonability theorem, and the relevance and nonlocality of entangled particles in quantum mechanics. As early as 1984, Bennett of the United States and Brassard of Canada jointly developed the world's first QKD (BB84 protocol) using the polarization state of a single photon; in 1992, Bennett also pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0852H04L63/062H04L63/08H04L63/0869
Inventor 张仕斌江英华昌燕杨帆
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products