A quantum authentication method with triple security mechanism

A technology of authentication method and security mechanism, applied in secure communication devices, photon quantum communication, user identity/authority verification, etc., can solve problems such as hidden dangers, inability to know hackers' quantum keys, illegal snooping, and limited detection accuracy of authentication systems. Achieving the effect of security protection and improving security and credibility

Inactive Publication Date: 2020-12-11
INST OF ELECTRONICS ENG CHINA ACAD OF ENG PHYSICS
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the currently proposed quantum authentication method based on the dual security mechanism still has certain security risks. For example, once the PUF entity of the quantum key is illegally obtained and a large number of stimulus-response characteristics are studied, if the security threshold of the authentication system If the setting is not high or the detection accuracy is limited, there is still a certain probability in theory that the authentication database can be cracked to perform impersonation authentication
In addition, current quantum key users are often unable to know whether hackers have illegally snooped on the quantum key to collect the internal information of the quantum key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum authentication method with triple security mechanism
  • A quantum authentication method with triple security mechanism
  • A quantum authentication method with triple security mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] A quantum authentication method based on the triple security mechanism of fluorescent anti-spy PUF, such as figure 2 As shown, the authentication process is as follows:

[0023] First, an attenuation of the quantum light source by a pulsed laser produces excitation light in an unclonable quantum state. Different excitation states can be generated by adjusting the spatial intensity or spatial phase of the quantum excitation source.

[0024] Secondly, the excitation light in the quantum state passes through the physically unclonable function (PUF) entity composed of disordered micro-nano structures, and a long-lasting luminescent warning material is added to the PUF entity. When the PUF is peeped by an external illegal excitation light, it will emit light to warn, so that the authentication cannot pass; otherwise, continue to the next step.

[0025] Finally, the detector decodes and detects the generated disordered scattering response signal, and compares it with the s...

Embodiment 2

[0027] A quantum authentication method based on the triple security mechanism of reconfigurable PUF, such as image 3 As shown, the authentication process is as follows:

[0028] First, an unclonable quantum state of excitation light is generated by a quantum dot single-photon source. Different excitation states can be generated by adjusting the spatial intensity or spatial phase of the quantum excitation source.

[0029] Secondly, the excitation light of the quantum state passes through the physical unclonable function (PUF) entity composed of disordered micro-nano structure, and the reconfigurable material is added to the PUF entity by adding low melting point metal nanoparticles. When the PUF is spied on by external illegal excitation light, if the wavelength is inconsistent with the set wavelength, it will generate localized heating to the low-melting point metal nanoparticles to melt and deform, so that the disordered micro-nano structure is reconstructed, so that the ex...

Embodiment 3

[0033] A quantum authentication method based on fluorescent anti-spying and reconfigurable PUF triple security mechanism, such as Figure 4 As shown, the authentication process is as follows:

[0034] A fluorescent anti-spying and reconfigurable PUF is used, so on the basis of Embodiment 1 and Embodiment 2, if someone spy on the quantum excitation state, the excitation photon will collapse due to the collapse of the quantum state during the measurement of the excitation state. If the PUF cannot be reached or the number of photons decreases, the authentication will fail and play a role of security protection.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum authentication method of a triple security mechanism, which particularly relates to a quantum unclonable mechanism, a physical unclonable mechanism and an anti-peeping protection mechanism. The method comprises the following steps: firstly, quantum light is adopted as excitation, a collapse principle is measured according to a quantum state, an eavesdropper cannotknow the excitation state under an unchanging condition, and the quantum unclonable mechanism is followed; secondly, a quantum key composed of millions of disordered nano particles is adopted, cloning cannot be realized on a technology, and physical no-cloning is realized; a light-emitting warning or a reconfigurable material is added into the quantum key, illegal copying or tampering can enablethe quantum key to give out a warning or structure reconstruction, so that a legal user can be known, and timely abandon is realized to ensure the security of the legal user to form the anti-peeping protection mechanism. The quantum authentication method based on the triple security mechanism can be widely applied to the fields with extremely high requirements on identity authentication such as security authentication, quantum encryption, banks, finance and the like.

Description

technical field [0001] The invention relates to fields with high requirements for identity authentication, such as security authentication, quantum encryption, banking and finance, and specifically refers to a quantum authentication method with a triple security mechanism. Background technique [0002] With the great development of information technology and manufacturing technology, malicious threats such as hacking and identity counterfeiting have brought serious threats to commerce, finance, communications, the Internet of Things, and other fields that have extremely high requirements for identity authentication and authorization security. huge challenge. How to achieve absolutely safe identity authentication and prevent attackers from illegally cloning, stealing, fraudulently using and other behaviors are key issues that related industries urgently need to solve. [0003] Quantum authentication is a brand-new security authentication technology proposed in recent years, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04B10/70
CPCH04B10/70H04L9/3271H04L9/3278
Inventor 李沫陈飞良李倩张丽君王丕东姚尧张健
Owner INST OF ELECTRONICS ENG CHINA ACAD OF ENG PHYSICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products