Quantum key wireless-distribution method and system used for secure communication of terminal equipment

A quantum key and terminal equipment technology, applied in the field of quantum communication, can solve the problems of low security level of wireless distribution of quantum keys, security dependence of wired distribution of quantum keys, complex project deployment, etc., to achieve simple distribution and easy deployment Convenience, enhanced safety and security level effects

Active Publication Date: 2019-03-26
HENGTONG QASKY QUANTUM INFORMATION RES INST CO LTD +1
View PDF17 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the security of wired distribution of quantum keys depends on physical principles, and the distribution of quantum keys depends on the quantum backbone network, which requires high equipment requirements for the quantum key sending end and quantum key receiving end, and many quantum key networks need to be erected Equipment, high investment cost, complex project deployment
On the other hand, the security level of wirelessly distributing quantum keys is not high, because the seeds used to expand the generated keys mathematically are pseudo-random numbers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key wireless-distribution method and system used for secure communication of terminal equipment
  • Quantum key wireless-distribution method and system used for secure communication of terminal equipment
  • Quantum key wireless-distribution method and system used for secure communication of terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] This embodiment discloses a quantum key wireless distribution method, and the quantum key obtained through distribution is used for secure communication of services by terminal equipment.

[0051] The main hardware devices involved in wireless quantum key distribution in this embodiment include:

[0052] (1) Terminal equipment

[0053] Terminal devices can be mobile terminals such as smartphones, tablet computers, laptops, PDAs (Personal Digital Assistants), or other terminal devices such as set-top boxes and PCs, which are the requesting and receiving ends of quantum key distribution.

[0054] The terminal device is equipped with storage devices and common data interfaces such as USB and Type-C. The terminal device pours the initial quantum key into the internal storage device through common data interfaces such as USB and Type-C.

[0055] (2) Quantum key server

[0056] The quantum key server is the sender of quantum key distribution. The above-mentioned initial q...

Embodiment 2

[0092] This embodiment discloses a quantum key wireless distribution system for secure communication of terminal equipment, including a terminal equipment and a quantum key server.

[0093] Among them, the terminal device can be a mobile terminal such as a smart phone, a tablet computer, a notebook computer, a PDA (Personal Digital Assistant), or other terminal devices such as a set-top box and a PC, which are the requesting end and the receiving end of quantum key distribution.

[0094] The terminal device is equipped with storage devices and common data interfaces such as USB and Type-C. The terminal device pours the initial quantum key into the internal storage device through common data interfaces such as USB and Type-C.

[0095] The quantum key server is the sender of quantum key distribution. The above-mentioned initial quantum key is shared between the quantum key server and the authenticated terminal device. Wherein, the initial quantum key acquired by the terminal d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum key wireless-distribution method used for secure communication of terminal equipment. Seeds of distribution keys used for quantum key distribution are quantum true random numbers. The method comprises the following steps: (1) using a distribution key by a quantum key server to encrypt a quantum key, and sending an encrypted quantum key to terminal equipment through a manner of wireless transmission; and (2) receiving the encrypted quantum key, which is sent by the quantum key server, by the terminal equipment, using the same distribution key to decrypt the encrypted quantum key to obtain the quantum key distributed by the quantum key server. According to the quantum key wireless-distribution method of the invention, distribution of the quantum key and a quantum trunk network are separated, wireless transmission of the quantum key is completed with the only need for means of a traditional communication channel, project deployment is convenient and fast,input costs are low, and a distribution manner is simple; and on the other hand, the seeds used for extending the generated distribution keys are the quantum true random numbers, and security and a security level of wireless distribution of quantum keys can be greatly improved.

Description

technical field [0001] The invention belongs to the technical field of quantum communication, and in particular relates to a quantum key wireless distribution method for secure communication of terminal equipment, and a wireless quantum key distribution system for secure communication of terminal equipment. Background technique [0002] In recent years, traditional encryption methods based on mathematical principles have been proven to have security risks. This confirmation will strengthen people's concerns about the security of classical ciphers. At present, the mathematical cryptographic system that is widely used but has not been fully proved may be deciphered or found to have fatal security holes when people do not expect it. In addition, quantum computing also brings unprecedented potential threats to classical cryptosystems. Because of this, it is imperative to study cryptographic systems that can resist quantum computing attacks. All these factors promote the develop...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0869
Inventor 薛梦驰邱红康沈明赵良圆单常明
Owner HENGTONG QASKY QUANTUM INFORMATION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products