Unlock instant, AI-driven research and patent intelligence for your innovation.

A quantum key output method and system

A technology of quantum key and output method, applied in transmission system, digital transmission system, key distribution, can solve the problems of reducing data security, no need for negotiation, hidden danger of data transmission in key negotiation, etc., to avoid security problems , the effect of streamlining hardware configuration and ensuring security

Active Publication Date: 2022-04-12
SHANDONG INST OF QUANTUM SCI & TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. Application layer devices need to participate in key negotiation and synchronous acquisition, which increases the complexity of application layer devices
[0006] 2. Before the business data is encrypted, there are certain security risks in the key negotiation data transmission between the application layer devices, which reduces the security of the data
[0007] 3. In some applications that require high security, application layer device A and application layer device B are not allowed to communicate in plain text. At this time, application layer device A and application layer device B cannot complete encryption according to the original key negotiation mechanism. key negotiation
[0008] Aiming at the above-mentioned security transmission problems existing in the prior art, the present invention proposes a design idea of ​​transmitting key negotiation data in a quantum network. The output method described in this design effectively solves the following problems: application layer devices There is no need to negotiate with each other. The quantum key negotiation is completed by the key management device through the quantum network, and the application layer device does not need to pay attention to it; the key negotiation data is transmitted in the quantum network and is not exposed to the application network. The security of data is ensured; when the application layer devices cannot communicate in plain text, both ends can still complete the key acquisition, and at the same time avoid the security problems that may arise from direct key negotiation between application layer devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum key output method and system
  • A quantum key output method and system
  • A quantum key output method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Such as figure 2 Shown:

[0053] The key management layer device A and the key management layer device B conduct key negotiation through the quantum network, and if they agree, the application layer device A and the application layer device B receive the agreed quantum key respectively, and then they can use the quantum key The key transmits encrypted business data in the application network.

[0054] For the present invention, as long as the quantum key agreement is realized through the quantum network, the methods for obtaining the agreed quantum key without negotiating between the application layer devices all belong to the content protected by the present invention. The method and steps of key agreement are also the content to be protected by the present invention, and are not limited to the method of key agreement described in the listed embodiments of the present invention, and are not exhaustively listed in the present invention.

Embodiment 2

[0056] Such as image 3 , 4 shown.

[0057] A kind of quantum key output method as described in embodiment 1, described carrying out key agreement through quantum network, comprising:

[0058] a) The application layer device A initiates a key acquisition request to the key management layer device A, including the device identification and key amount of the application layer device B;

[0059] b) The key management layer device A finds the relevant key according to the device identification of the application layer device B and obtains a key of corresponding length according to the key amount, and calculates the key checksum;

[0060] c) The key management layer device A sends a key acquisition request notification to the key management layer device B through the quantum network, including the key identifier, the key amount, and the key checksum;

[0061] d) After the key management layer device B receives the key acquisition request notification sent by the key management l...

Embodiment 3

[0066] Such as image 3 , 5 shown.

[0067] A quantum key output method as described in Embodiment 2, the difference is that the key management layer device B sends a key acquisition request failure response threshold to the key management layer device A in advance;

[0068] If the comparison is inconsistent, the key management layer device B sends a key acquisition request failure response to the key management layer device A;

[0069] When the key management layer device B sends the key acquisition request failure response times to the key management layer device A is less than the threshold, repeat steps b)-e), or repeat steps c)-e); when the key management layer When the number of key acquisition request failure responses sent by device B to key management layer device A is equal to the threshold, key management layer device A returns a key acquisition request failure response to application layer device A.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a quantum key output method, which includes: the key management devices corresponding to the sender and the receiver perform key negotiation through the quantum network, and if the negotiation is consistent, the application layer devices of the sender and the receiver respectively A consensus quantum key is received. The invention optimizes the flow of quantum key output, all key negotiation data is carried out in the quantum network, and the application network where the application layer device is located does not transmit any information related to the quantum key, thus ensuring the key negotiation data and encrypted Business data is transmitted separately to ensure the security of business data.

Description

technical field [0001] The invention relates to a quantum key output method and system, belonging to the technical field of quantum communication. Background technique [0002] With the development of network information, the network affects all aspects of people's lives, and the subsequent security requirements are getting higher and higher, and the confidentiality requirements for people's network activities are also getting higher and higher. Encryption or authentication technology guarantees the confidentiality of people's own data and some related materials in network activities. In the traditional quantum key application method, the application layer devices first negotiate and obtain the key, and then use the obtained paired quantum key to encrypt or authenticate the business data; however, before the business data is encrypted or authenticated, There are certain security risks in the transmission of key agreement data (referring to information such as key identifica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852
Inventor 姜胜广高光辉王学富赵波
Owner SHANDONG INST OF QUANTUM SCI & TECH