Method for encrypting and decrypting information based on quantum network

A quantum key and quantum technology, applied in the field of quantum communication, can solve the problems of low security factor and troublesome operation steps, and achieve the effect of improving security

Inactive Publication Date: 2019-04-16
浙江神州量子通信技术有限公司
View PDF12 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, enterprises or individuals have used quantum networks to encrypt and decrypt information. Quantum networks include quantum true random number generators, identity authentication servers, quantum key management servers, and public and private key servers. For example, the existing patent number is 201810020795.0, patent The name is a communication system and communication method based on quantum network to realize information encryption and decryption transmission. The communication system includes a quantum network service station configured on the network side and two clients configured on the user side. Each client is equipped with a quantum key card. When the two clients communicate, they obtain the shared key directly or indirectly through the quantum network service station on the network side; the two clients use the shared key in the corresponding quantum key card to encrypt and decrypt the information for transmission; The encryption and decryption transmission method invented requires the two clients to use the shared key in the quantum key card to encrypt and decrypt the information, so that the encryption and decryption method has the disadvantages of troublesome operation steps and low safety factor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting and decrypting information based on quantum network
  • Method for encrypting and decrypting information based on quantum network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] The present invention will be further described below in conjunction with the accompanying drawings.

[0027] Such as figure 1 , figure 2 As shown, a method for encrypting and decrypting information based on a quantum network described in this embodiment, the steps are as follows:

[0028] Step 1: Receiver B among the two clients participating in the communication first obtains the decryption private key Kb from the public-private key server through the USB-shield, and stores the decryption private key Kb in the USB-shield;

[0029] Step 2: The sender A of the two clients participating in the communication has edited the message M and before sending it to the receiver B, it applies to the quantum key management server, and the quantum key management server sends a message to the quantum true random number generator. Request the key command, the quantum true random number generator generates a random number and returns it to the quantum key management server to obtain...

Embodiment 2

[0035] The present invention will be further described below in conjunction with the accompanying drawings.

[0036] Such as figure 1 , figure 2 As shown, a method for encrypting and decrypting information based on a quantum network described in this embodiment, the steps are as follows:

[0037] Step 1: Receiver B among the two clients participating in the communication first obtains the decryption private key Kb from the public-private key server through the USB-shield, and stores the decryption private key Kb in the USB-shield;

[0038] Step 2: The sender A of the two clients participating in the communication has edited the message M and before sending it to the receiver B, it applies to the quantum key management server, and the quantum key management server sends a message to the quantum true random number generator. Request the key command, the quantum true random number generator generates a random number and returns it to the quantum key management server to obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of the quantum communication, and especially a method for encrypting and decrypting information based on a quantum network. The invention aims at providinga method for encrypting and decrypting the information based on the quantum network, and the method is simple in step and high in safety guarantee; a sender performs encryption through a quantum keyK and edited information M to form information M'K, and then encrypts the quantum key K by using an encryption public key Ka to form a ciphertext key K'Ka, and finally combines the ciphertext key K'Kawith the information M'K to form the information E to send out; a receiver firstly acquires a decryption private key Kb by using a U key, and then performs the identity authentication, and decrypts the encrypted information through the decryption private key Kb when the identity authentication is qualified, thereby guaranteeing that only the personnel successfully passing the identity authentication can decrypt the encrypted information and read the content in the information, and the information security is improved.

Description

technical field [0001] The invention relates to the technical field of quantum communication, in particular to a method for encrypting and decrypting information based on a quantum network. Background technique [0002] With the outbreak of the information revolution in the 21st century and the continuous development of science and technology, how to ensure secure communication between clients is a current research hotspot, to achieve information security such as data encryption, transmission and privacy, whether it is an enterprise that conducts daily business activities Companies, government agencies, banks, etc. all have urgent needs for this, especially in today's globalized economic era, ensuring the unconditional security of information is one of the current focuses of public attention. [0003] At present, enterprises or individuals have used quantum networks to encrypt and decrypt information. Quantum networks include quantum true random number generators, identity a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L29/06
CPCH04L9/0618H04L9/0822H04L9/0825H04L9/0852H04L9/0869H04L63/0435H04L63/0442H04L63/0869H04L63/0876
Inventor 叶健利
Owner 浙江神州量子通信技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products