Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum identity authentication method and its application method in quantum key distribution process

An identity authentication and quantum technology, applied in key distribution, can solve problems such as security difficulties, and achieve the effect of clear principles, simple implementation methods, and high security

Active Publication Date: 2019-10-22
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of existing classical encryption algorithms is based on some kind of mathematically difficult problem (computational complexity assumption)
With the development of quantum computers and the introduction of quantum algorithms (such as the Shor algorithm), the security of classical cryptosystems based on computational complexity assumptions has been severely challenged

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum identity authentication method and its application method in quantum key distribution process
  • Quantum identity authentication method and its application method in quantum key distribution process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Authentication scheme:

[0018] Such as figure 1 As shown, suppose Alice and Bob are two parties that need mutual identity authentication, and they have shared two strings of s-long secret bit sequence K in advance P and K AB (Here Alice and Bob can be two ordinary users who need to exchange information; one can also be an ordinary user and the other an authentication center). The identity sequence of Alice and Bob is divided into ID A and ID B , and they negotiated a one-way Hash function h:{0,1} in advance * →{0,1} m (The function h can also be selected from a Hash function library shared by both parties through an agreed algorithm). Among the above parameters, K P and K AB is confidential, ID A 、ID B and h is public. The steps for Alice and Bob to authenticate each other are as follows:

[0019] 1. When Alice and Bob need to perform mutual identity authentication, Alice first generates a series of m-bit long messages M A and two random numbers r A and r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum identity authentication method and an application method of the quantum identity authentication method in a quantum key distribution process. Mutual identity authentication between two participants can be realized. The security is based on a quantum mechanics basic principle and is independent of the computation capability of an attacker. When the method is realized, technologies such as quantum storage, quantum entanglement and multiparticle measurement do not need to be used, so the scheme is has the characteristics of simpleness and easiness in realization. Compared with the prior art, the method has the positive effects that the method provided by the invention is clear in principle, a realization method is simple, the security is high, and an entanglement source and multiparticle measurement and quantum storage technologies do not need to be used, so the realization can be achieved under an existing technological condition. Related authentication schemes can be applied to establishment of a high-security quantum identity authentication system with the quantum computation resistance capability and also can be applied to a current mainstream quantum key distribution system, thereby realizing the high-security identity authentication between two communication parties.

Description

technical field [0001] The invention relates to a quantum identity authentication method and its application method in the quantum key distribution process. Background technique [0002] In today's society, information is everywhere, and a large amount of data and information are transmitted on the network every moment. With the development and application of new technologies such as cloud computing, big data, and the Internet of Things, most of the information in people's lives in the future will be transmitted and processed through the network. The information ranges from personal privacy to military secrets and state decisions, all of which are closely related to the national economy and the people's livelihood, which shows that protecting information security has become a key issue that must be solved in the information age. And a country's information security capability has become one of the important indicators to measure its technological level and comprehensive nat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 黄伟徐兵杰何远杭樊矾杨杰刘金璐
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products