Multiple identity authentication system and method based on group key pool
An identity authentication and key pool technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as timestamp replay attacks, high system time synchronization requirements, and inability to complete group identity authentication. The effect of reducing the likelihood of key theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0086] Embodiment 1, two client authentications that belong to the same quantum network service station in the local area network and generate session keys by the client
[0087] The quantum key structure of this embodiment is as follows figure 1 Shown: The quantum key card matched by client A participating in identity authentication contains a symmetric key pool K A and group key pool K PA ; The quantum key card matched by client B participating in identity authentication contains a symmetric key pool K B and group key pool K PB ; Both client A and client B belong to the quantum network service station, and client A and client B do not belong to the same group. The quantum network service station contains the symmetric key pool of all members and the group key pool K PA and K PB . The cryptographic modules of client A, client B and the quantum network service station all hold corresponding key pools (including symmetric key pools and group key pools) and various algorit...
Embodiment 2
[0135] Embodiment 2, two client identity authentications that belong to the same quantum network service station in the local area network and generate session keys by the quantum network service station
[0136] The scenario of this embodiment is the same as that of Embodiment 1, the difference lies in the way of generating the session key. The identity authentication process is as Figure 4 As shown, the specific steps are described in text as follows:
[0137] 1. Client A and client B complete identity authentication and key sharing, and apply for a ticket for secondary identity authentication. see Figure 4 .
[0138] 1.1 Client A generates a true random number for identity authentication and sends it to client B: the quantum key card matched by client A generates a true random number R according to the random number generator in the card NA (hereinafter referred to as R NA , and other similarities omit the Chinese character part as the abbreviation). R NA Combining...
Embodiment 3
[0172] Embodiment 3, identity authentication between two client terminals generating a session key by the client terminal in the wide area network
[0173] The identity authentication process of two clients in the WAN is as follows: Figure 5 As shown, when client A and client B do not belong to the same quantum network service station, the quantum key cards involved in the identity authentication process are registered and issued by the quantum network service station to which the client belongs. The difference between the system architecture in this embodiment and Embodiment 1 is that it is applied in a wide area network. The first-level switching center is a quantum network core station in a prefecture-level city or a fairly large area, and the second-level switching center is a county-level city or equivalent. The quantum network core station of a large or small area, the quantum network service station is a quantum communication access site of a fairly large area of a t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


