Quantum key-based authentication method and authentication device

A technology of quantum key and authentication method, applied in the field of authentication method and authentication device based on quantum key, can solve the problems of low authentication efficiency and the like

Active Publication Date: 2018-09-25
CHINA MOBILE COMM LTD RES INST +1
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the technical solution of the present invention is to provide a quantum key-based authentication method and authentication device to solve the problem that the authentication method used in the prior art uses a public key algorithm to make the authentication efficiency low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key-based authentication method and authentication device
  • Quantum key-based authentication method and authentication device
  • Quantum key-based authentication method and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0212] Embodiment 1 of the present invention provides a quantum key authentication method, which is applied to an authentication server, such as figure 2 As shown, the authentication methods include:

[0213]Step S210, receiving the first authentication request sent by the first device, wherein the first authentication request includes the identity of the first device, the identity of the second device, the first key identity, and the identity of the first key. The first authentication ciphertext encrypted by the first quantum key corresponding to the key identifier;

[0214] Step S220, determining the first quantum key according to the pre-stored correspondence between the first key identifier and the first quantum key;

[0215] Step S230, using the first quantum key to decrypt the first authentication ciphertext, and authenticating the decrypted first authentication ciphertext;

[0216] Step S240, when a successful authentication result is obtained, encrypt the identity o...

Embodiment 2

[0236] The quantum key-based authentication method described in Embodiment 2 of the present invention is applied to the first device, such as image 3 As shown, the authentication methods include:

[0237] Step S310, generating a first authentication request, wherein the first authentication request includes the identity of the first device, the identity of the second device, the first key identifier, and the first key identifier corresponding to the first key identifier. A first authentication ciphertext encrypted by a quantum key;

[0238] Step S320, sending the first authentication request to an authentication server.

[0239] In the quantum key authentication method described in the embodiment of the present invention, the quantum key used for authentication is only shared by both communication parties, and the authentication process only requires one round of interaction without using a public key cryptographic algorithm to ensure the execution efficiency of the authenti...

Embodiment 3

[0249] The quantum key-based authentication method described in Embodiment 3 of the present invention is applied to the second device, such as Figure 4 As shown, the authentication methods include:

[0250] Step S410, receiving a second authentication request sent by the authentication server; wherein the second authentication request includes a second key identifier, and the authentication server uses the second quantum key to authenticate the first authentication request sent by the first device The second authentication ciphertext obtained after the authentication result information is encrypted, and the authentication result information includes the identity of the first device;

[0251] Step S420, determining the second quantum key according to the pre-stored correspondence between the second key identifier and the second quantum key;

[0252] Step S430, using the second quantum key to decrypt the second authentication ciphertext to obtain the identity of the first devi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a quantum key-based authentication method and authentication device. The method comprises the steps of receiving a first authentication request sent by a first device, wherein the first authentication request comprises identity of the first device, identity of a second device, first key identity, and a first authentication ciphertext encrypted by using a first quantum key corresponding to the first key identity; determining the first quantum key according to a pre-stored correspondence relationship between the first key identity and the first quantum key; decrypting thefirst authentication ciphertext by using the first quantum key, and authenticating the decrypted first authentication ciphertext; when an authentication success result is received, encrypting the identity of the first device by using a second quantum key, and generating a second authentication request, wherein the second quantum key is a shared key between an authentication server and the second device; and sending the second authentication request to the second device. In the prior art, the authentication efficiency is low due to use of a public key algorithm. The authentication method and authentication device solve the problem in the prior art.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a quantum key-based authentication method and authentication device. Background technique [0002] In network communication, identity authentication refers to the process of confirming the user's identity, and it is also the first gate of network security protection. At present, there are mainly two authentication methods for device identity authentication technologies: pre-shared key and public key certificate. [0003] When the pre-shared key authentication method is used, the authentication parties are required to preset the same root key in advance. In order to protect the root key, a series of cryptographic operations must be performed based on the root key during the authentication process. Multiple interactions are required, and a certain amount of computing resources and network resources are required; when using public key certificate authentication, the authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L63/0428H04L63/083
Inventor 齐旻鹏阎军智
Owner CHINA MOBILE COMM LTD RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products