Identity authentication system implementation method based on a quantum key distribution technology

A quantum key distribution and quantum key technology, which is applied in the fields of quantum cryptography and Internet user identity authentication and trust, can solve problems such as abnormality and inability to modify signatures, and achieves an increase in the number of key updates, and the difficulty of key cracking. safety effect

Inactive Publication Date: 2019-05-28
BEIJING INFORMATION SCI & TECH UNIV +1
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A third party trying to eavesdrop on the password has to measure it in some way, and those measurements introduce perceptible anomalies
[0010] The digital signature algorithms commonly used by CAs include RSA and ECDSA. Taking RSA as an example, RSA uses the private key to sign the certificate. Others can use the public key to view the signature, but they cannot modify the signature.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication system implementation method based on a quantum key distribution technology
  • Identity authentication system implementation method based on a quantum key distribution technology
  • Identity authentication system implementation method based on a quantum key distribution technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] The case where the public key infrastructure system (PKI) and the quantum key distribution (QKD) are tightly coupled, this embodiment includes two end users Alice (initiator) and Bob (responder), and the quantum keys they belong to Management terminal. This embodiment will provide a method of using the quantum key as the session key in the communication between the two users. The method includes two assumptions: Assumption 1: All users can use quantum channels, regardless of the photon energy Attenuation in the transmission case. Assumption 2: Do not consider destructive attacks such as denial of service attacks. The method includes:

[0047] Step 1. Alice and Bob perform two-way authentication.

[0048] Step 2. If the two-way authentication of Alice and Bob passes, the two parties exchange the parameters required to distribute the quantum key, and then start the distribution of the quantum key.

[0049] Step 3. After Alice and Bob obtain the quantum key, they adjus...

Embodiment 2

[0055] Communication between users in different trust domains in the case of a partially coupled structure. This embodiment includes two end users Alice (initiator) and Bob (responder), and digital certificate certification authorities QCA1 and QCA2 using quantum keys. QCA nodes have quantum key management terminals, QCA nodes use quantum channels for communication, and general user nodes can only use classical channels for communication. This embodiment provides a method for using a quantum key as a session key in two-way communication between users. The method is based on two assumptions: Assumption 1: The attenuation of photon energy in the case of long-distance transmission is not considered; Assumption 2: Rejection is not considered Destructive attacks such as service attacks. The method includes:

[0056] Step 1. The active communication party Alice and QCA1 perform two-way verification to prove their identities to each other.

[0057] Step 2. QCA1 and QCA2 perform au...

Embodiment 3

[0073] In the case of a partially coupled structure, communication between users within the same trust domain. This embodiment includes two end users Alice (initiator) and Bob (responder), and a digital certificate certification authority QCA using quantum keys. QCA nodes have quantum key management terminals, and general user nodes use classical channels for communication. This embodiment provides a method for using a quantum key as a session key in communication between two users. This method is based on an assumption that destructive attacks such as denial of service attacks are not considered. The method includes:

[0074] Step 1. Alice, the active communication party, and QCA conduct two-way verification to prove their identities to each other.

[0075] Step 2. QCA sends Alice's communication request to Bob, and at the same time conducts two-way identity authentication with Bob.

[0076] Step 3. If the above steps are all successful, it means that the authentication i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity authentication system implementation method based on a quantum key distribution (QKD) technology. The identity authentication system implementation method comprisesa public key infrastructure system (PKI) and a quantum key distribution (QKD). By introducing a QKD system and adding a true random key brought by the QKD, communication processes between users, between the users and the CA and between the CA and the CA are modified, so that the QKD can be combined with a PKI system; By introducing the quantum technology, the updating frequency and the cracking difficulty of the private key are improved, so that the security of the whole PKI architecture is improved, and by combining quantum key distribution (QKD) and a public key infrastructure system (PKI),the user identity of data communication based on the Internet is confirmed, and the network security is improved. The QKD-driven authentication platform designed by the invention has the potential ofproviding credit service, and the provided credit service gets rid of the influence of subjective factors and forms a brand new credit guarantee system depending on objective physical characteristics.

Description

[0001] technical domain of trust [0002] The invention relates to quantum cryptography and Internet user identity authentication trust domain, in particular to an identity authentication system realization method based on quantum key distribution technology. Background technique [0003] Quantum key distribution (QKD) uses the properties of quantum mechanics to ensure communication security. It enables communicating parties to generate and share a random, secure key to encrypt and decrypt messages. [0004] One of the most important and unique properties of QKD is that if a third party attempts to eavesdrop on the password, both parties of the communication will be aware. This property is based on a fundamental principle of quantum mechanics: Any measurement of a quantum system creates a disturbance in the system. For a third party to attempt to eavesdrop on a password, it must be measured in some way, and those measurements will introduce perceptible anomalies. Communicat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 孟坤马骁施运梅宋莹刘旭红郑晓博高劢豪王宁
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products