Quantum key-based authentication method and authentication device
A technology of quantum key and authentication method, applied in the field of authentication method and authentication device based on quantum key, can solve the problems of low authentication efficiency and the like
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0212] Embodiment 1 of the present invention provides a quantum key authentication method, which is applied to an authentication server, such as figure 2 As shown, the authentication methods include:
[0213]Step S210, receiving the first authentication request sent by the first device, wherein the first authentication request includes the identity of the first device, the identity of the second device, the first key identity, and the identity of the first key. The first authentication ciphertext encrypted by the first quantum key corresponding to the key identifier;
[0214] Step S220, determining the first quantum key according to the pre-stored correspondence between the first key identifier and the first quantum key;
[0215] Step S230, using the first quantum key to decrypt the first authentication ciphertext, and authenticating the decrypted first authentication ciphertext;
[0216] Step S240, when a successful authentication result is obtained, encrypt the identity o...
Embodiment 2
[0236] The quantum key-based authentication method described in Embodiment 2 of the present invention is applied to the first device, such as image 3 As shown, the authentication methods include:
[0237] Step S310, generating a first authentication request, wherein the first authentication request includes the identity of the first device, the identity of the second device, the first key identifier, and the first key identifier corresponding to the first key identifier. A first authentication ciphertext encrypted by a quantum key;
[0238] Step S320, sending the first authentication request to an authentication server.
[0239] In the quantum key authentication method described in the embodiment of the present invention, the quantum key used for authentication is only shared by both communication parties, and the authentication process only requires one round of interaction without using a public key cryptographic algorithm to ensure the execution efficiency of the authenti...
Embodiment 3
[0249] The quantum key-based authentication method described in Embodiment 3 of the present invention is applied to the second device, such as Figure 4 As shown, the authentication methods include:
[0250] Step S410, receiving a second authentication request sent by the authentication server; wherein the second authentication request includes a second key identifier, and the authentication server uses the second quantum key to authenticate the first authentication request sent by the first device The second authentication ciphertext obtained after the authentication result information is encrypted, and the authentication result information includes the identity of the first device;
[0251] Step S420, determining the second quantum key according to the pre-stored correspondence between the second key identifier and the second quantum key;
[0252] Step S430, using the second quantum key to decrypt the second authentication ciphertext to obtain the identity of the first devi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com