Quantum authorization management method based on EPR pair and entanglement swapping

A technology of authorization management and entanglement exchange, applied in the field of authorization service management, can solve the problems of introducing third parties, security risks, and rough division of authority

Active Publication Date: 2017-08-18
CHENGDU UNIV OF INFORMATION TECH
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a quantum authorization management method based on EPR pair and entanglement exchange. security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum authorization management method based on EPR pair and entanglement swapping
  • Quantum authorization management method based on EPR pair and entanglement swapping
  • Quantum authorization management method based on EPR pair and entanglement swapping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0027] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0028] Such as figure 1 As shown, the quantum authorization management method based on EPR pair and entanglement exchange provided by the embodiment of the present invention includes the following steps:

[0029] S101: Bob (resource owner) first verifies the legitimacy of Alice (user);

[0030] S102: Then share the permission key for resource access with Alice.

[0031] The application principle of the present invention will be further described below in combination with specific em...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum authorization management method based on EPR pair and entanglement swapping. Bob, a resource owner, firstly verifies validity of a user Alice, and then shares a permission key applied to resource access with Alice; the permission division is the finely grained permission division. According to the protocol in the method provided by the invention, identity authentication and finely grained permission division are achieved without the existence of a semi-trusted third party. In addition, as checking of CHSH inequality violation during a checking period is eavesdropped, even Eve controls or provides a quantum carrier source and measurement equipment, Eve cannot acquire any secret information, and thus side channel attacks from Eve can be defended. According to the method provided by the invention, authorized division is extended to finely grained permission division. According to the method provided by the invention, identity authentication is achieved, and permission of accessing some resources is granted to legal users. The protocol in the method provided by the invention can also defend side channel attacks from Eve.

Description

technical field [0001] The invention belongs to the technical field of authorization service management, and in particular relates to a quantum authorization management method based on EPR pairs and entanglement exchange. Background technique [0002] Authorization Management Infrastructure (PMI) is an application that provides authorization service management. In a classic network, authorization is to verify whether a user is allowed to access a certain resource, or to confirm whether a user has permission to perform an action, such as accessing a specific network resource. In fact, rights management (or authorization management) includes authentication and authorization. Authentication is verifying the identity of the user. Authorization is the process of verifying whether an authenticated user has permission to perform an operation, and it is a finer-grained authorization. In most classical schemes, the Authorization Management Center (AMC) is responsible for managing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/085H04L9/0852H04L9/32
Inventor 昌燕张仕斌
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products