Supercharge Your Innovation With Domain-Expert AI Agents!

Quantum database access control and two-way identity authentication method based on bell state

A two-way identity authentication and identity authentication technology, applied in the field of Bell state quantum database access control and two-way identity authentication, can solve the problems of lack of equivalence and equality of identity authentication protocols, and achieve resistance to external attacks and good noise tolerance performance. , low-complexity effects

Active Publication Date: 2020-08-04
荆州市铭智工业自动化控制有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] (2) The current identity authentication protocol lacks equivalence and equality
Since most of the identity authentication protocols are one-way, it cannot satisfy multi-user network or distributed network, and multi-party users perform two-way and multi-way identity authentication at the same time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum database access control and two-way identity authentication method based on bell state
  • Quantum database access control and two-way identity authentication method based on bell state
  • Quantum database access control and two-way identity authentication method based on bell state

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0055] According to the protocol description of the present invention, when the first communication party and the second communication party establish an asymmetric QKD association, the first communication party knows 1 / 4 of the entire key key, while the second communication party knows all of it. A specific example of QPQ is as follows:

[0056] The second communication party encrypts the entire database using a one-time pad (OTP). At this time, if the key string in the hands of the first communication party is the sixth key, and she wants to query the content of the database at the eleventh position, the first communication party A conversion value s=11-6=5 is published. The second communication party of the database manufacturer performs an XOR operation on the key in hand according to the value of s, and encrypts the database with the generated new key. At this time, the first communication party can query the corresponding content of the database according to the key val...

Embodiment

[0099] Such as figure 2As shown, the database manufacturer Bob provides data resources, and users 1 to n can query the database. The usage scenarios of this agreement are described in detail below:

[0100] Assume that user 1 (set as Alice) requests to query the data content in the database manufacturer Bob, and the query process of other users is similar.

[0101] First, Alice initiates a query request, and Alice prepares 2N pairs of Bell state particles to Bob. By using this protocol, Alice and Bob establish an asymmetric QKD connection. At this time, Bob and Alice use the contents of the two-way identity authentication part of the protocol to perform Two-way authentication. After confirming that both parties are legitimate communication participants, execute this agreement again to re-establish the asymmetric QKD relationship. After XOR and other operation steps, Alice can only query the data content she purchased. At this point, the database query process is also comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of quantum database resources, and discloses a quantum database resource access control and two-way identity authentication method based on the Bell state. Based on the Bell state, asymmetric QKD is performed; quantum privacy query: the first communication party and the second communication party share a pair The generated key string performs post-processing operations to obtain the final shared key string key; the second communication party uses the one-time pad method to encrypt the entire database, and the second communication party performs an XOR operation on the key in the hand according to the value of s, and uses The generated new key encrypts the database; the first communication party queries the corresponding content of the database according to its own key value and s; two-way identity authentication: the second communication party verifies the identity of the first communication party, and the first communication party verifies the second The identity of the communicating party. The present invention uses Bell state particles, and compared with the QPQ protocol based on single photon, this protocol also has better noise tolerance performance in the collective noise channel.

Description

technical field [0001] The invention belongs to the field of quantum database resources, and in particular relates to a Bell state-based quantum database resource access control and two-way identity authentication method. Based on the idea of ​​asymmetric QKD, this protocol realizes a safe and effective QPQ query scheme. In order to improve the utilization efficiency of quantum resources , after completing the asymmetric QKD process, this protocol can complete a two-way quantum identity authentication. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] In the past thirty years, with the rapid development of computer technology, people need various more secure and efficient communication and encryption protocols. In 1984, Bennett and Brassard proposed the first quantum cryptography protocol, that is, the BB84 protocol. Researchers have developed a large number of quantum cryptography protocols and quantu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/3273
Inventor 张仕斌郑涛
Owner 荆州市铭智工业自动化控制有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More