Trusted repeater, key encryption method, device and system for quantum communication network

A technology of key encryption and quantum key, which is applied in the key encryption method and system field of quantum communication network, and can solve the hidden dangers of relay key leakage and other problems

Active Publication Date: 2020-12-22
QUANTUMCTEK +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, the above method has the following security defects:
[0013] In step 2, the trusted relay B receives the first relay key K R ⊕K AB After that, first use the relay decryption key K BA Decrypt to get the relay key K R ; while in step 3 for the relay key K R Before secondary encryption, the relay key K R is saved in the form of plain text, which leads to the leakage of the relay key K in the trusted relay R security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted repeater, key encryption method, device and system for quantum communication network
  • Trusted repeater, key encryption method, device and system for quantum communication network
  • Trusted repeater, key encryption method, device and system for quantum communication network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0116] The embodiment of the present invention proposes a key encryption method for a trusted repeater. In order to make the whole process more clear, such as image 3 , Figure 4 Shown is a schematic diagram of the application of the trusted repeater in the quantum communication network. image 3 , Figure 4 Shown are the application of the above scheme on a trusted relay and multiple trusted relays ( Figure 4 Where n is a positive integer, n≥2) the above scheme is applied. Depend on image 3 , Figure 4 It can be seen that, compared with the prior art, a preset key encryption key is added to each trusted repeater for encrypting the key stored in the key cache module. Since the workflow of each trusted relay is the same, the image 3 Specifically shown are:

[0117] Step 101, the trusted relay B receives the first relay key K sent by the previous node R ⊕K AB Afterwards, decrypt the key K through the encrypted relay BA ⊕K B For the first relay key K R ⊕K AB Dec...

Embodiment 2

[0126] At the same time, the embodiment of the present invention also proposes a key encryption device of a trusted repeater corresponding to the aforementioned embodiment 1, the structure of which is as follows Figure 5 As shown, it includes a key encryption module, a key relay and forwarding module, and a key cache module;

[0127] The key encryption module is used to store the preset key encryption key K B , and encrypt the key K with a preset key B Decryption key K for relay BA Encrypt to obtain the encrypted relay decryption key K BA ⊕K B ; Also used to encrypt the key K through the preset key B To the relay encryption key K BC Encrypt to obtain the encrypted relay encryption key K BC ⊕K B ;

[0128] A key relay forwarding module, configured to receive the first relay key K from the previous node R ⊕K AB Afterwards, decrypt the key K through the encrypted relay BA ⊕K B For the first relay key K R ⊕K AB Decrypt to obtain the encrypted relay key K R ⊕K B ; ...

Embodiment 3

[0133] At the same time, the embodiment of the present invention also proposes a key encryption method for a quantum communication network, such as image 3 with Figure 4 One or more trusted relays are shown. Compared with the prior art, a preset key encryption key is added to each trusted repeater for encrypting the relay encryption key and the relay decryption key. Since the workflow of each trusted relay is the same, the image 3 Specifically, the method shown is:

[0134] Step 701, sending the relay key K that quantum terminal A will need to send R Send encryption key K using AB Obtain the first relay key K after encryption R ⊕K AB , and then the first relay key K R ⊕KAB Send to the next node; wherein the sending encryption key K AB with the relay decryption key K at the next node BA Corresponding;

[0135] Step 702, the trusted relay B receives the first relay key K sent by the previous node R ⊕K AB Afterwards, decrypt the key K through the encrypted relay B...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key encryption method, apparatus and system of a trusted repeater and a quantum communication network. The key encryption method of the trusted repeater comprises the following steps: the trusted repeater receives a first relay key sent by a previous node and decrypts the first relay key through an encrypted relay decryption key to obtain an encrypted relay key, wherein the encrypted relay decryption key is generated by encrypting a relay decryption key by using a preset encryption key; and when the trusted repeater sends the encrypted relay key to a next node, the trusted repeater encrypts the encrypted relay key by using the encrypted relay decryption key to obtain a second relay key, wherein the encrypted relay decryption key is generated by encrypting the relay decryption key by using a preset key encryption key. The key encryption method, apparatus and system disclosed by the invention are wide in application range, small in influence to the application range of the trusted repeater and are able to enhancing the security of the trusted repeater on the premise of ensuring the scalability of the original network.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a key encryption method and device for a trusted repeater, and a key encryption method and system for a quantum communication network. Background technique [0002] In the quantum communication network, due to the limitation of channel deployment cost and distance, it is impossible to realize the establishment of quantum channels between any nodes in the network and direct quantum key distribution (QKD). Therefore, in order to share quantum keys between any nodes in the network, it is necessary to use key relay to realize key distribution between two nodes that cannot directly distribute quantum keys. [0003] The key relay method was first proposed by Elliott of BBN. ​​Its basic idea is to use the quantum key shared between adjacent nodes to encrypt and decrypt the relay key, so that the relay key can be transferred between one or more relay nodes. Encrypted trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0855
Inventor 王学富武宏宇
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products