Quantum communication service station digital signcryption method and system based on asymmetric key pool

A technology of quantum communication and service station, which is applied in the field of digital signcryption system of quantum communication service station, which can solve the problems of huge key capacity of symmetric key pool, pressure of key storage, inability to store key cards, etc.

Active Publication Date: 2019-07-23
RUBAN QUANTUM TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. A symmetric key pool is used between the quantum communication service station and the quantum key card, and its capacity is huge, which puts pressure on the key storage of the quantum communication service station
[0011] 2. Due to the huge capacity of the symmetric key pool key, the q

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum communication service station digital signcryption method and system based on asymmetric key pool
  • Quantum communication service station digital signcryption method and system based on asymmetric key pool
  • Quantum communication service station digital signcryption method and system based on asymmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0137] Example 1:

[0138] Assume that there are two quantum communication service stations QA and QB, client A (signcryption party) belonging to QA and client B (cryptographic verification party) belonging to QB. The ID of A contains the ID of QA, and the ID of A is denoted as IDA; the ID of B contains the ID of QB, and the ID of B is denoted as IDB, indicating the affiliation.

[0139] 1. A has file F, generate signcryption file

[0140] 1.1. A takes the random number ria, and uses the function FA (for example, splits a number into three segments according to the length of 2:3:5) to act on ria to obtain three numbers ria1, ria2 and ria3, and then use ria1 to encrypt from the client Take kia1 / Kia1 from the client asymmetric key pool (private key pool / public key pool) of the key card, and use ria2 to take Kia2 from the asymmetric key pool (public key pool) of the service station of the client key card. Among them, the parameters "kia1", "Kia1", "Kia2", etc. represent the value of t...

Example Embodiment

[0174] Example 2:

[0175] Assuming that there is a quantum communication service station Q, both client A (signcryption party) and client B (cryptography party) belong to Q. The ID of A is IDA, and the ID of B is IDB.

[0176] 1. A has file F, generate signcryption file

[0177] 1.1. A takes the random number ria, and uses the function FA (for example, splits a number into three segments according to the length of 2:3:5) to act on ria to obtain three numbers ria1, ria2 and ria3, and then use ria1 to encrypt from the client Take kia1 / Kia1 from the client asymmetric key pool (private key pool / public key pool) of the key card, and use ria2 to take Kia2 from the asymmetric key pool (public key pool) of the service station of the client key card.

[0178] Let xa=ria3, according to the formula ka=Kia2 xa mod p calculates the value of ka, and then uses the function fa1 (for example, splitting a number into two segments according to a length of 1:1) to apply to ka to obtain two numbers: th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a quantum communication service station digital signcryption method and system based on an asymmetric key pool. A quantum communication service station is provided with a service station key card; each participant is provided with a client key card; the method comprises the following steps: at a signcryption party, extracting a parameter Kia1 from an asymmetric public keypool of a client by utilizing a random number, extracting a parameter Kia1 from an asymmetric private key pool of the client, extracting a parameter Kia2 from an asymmetric key pool of a service station, and performing calculating by utilizing the parameter Kia2 to obtain a first intermediate parameter and a second intermediate parameter; encrypting the first original text by using the first intermediate parameter to obtain a first ciphertext; using a Hash function to act on the first original text and the second intermediate parameter to obtain a parameter ra; performing calculating by usingthe parameter ra and the parameter kia1 to obtain a parameter sa; calculating the parameter Kia2 and the parameter Kia1, using a Hash function to act on the calculation result and the parameter ra toobtain a parameter rka, and using the parameter rka to encrypt the parameter sa to obtain a parameter srka; and sending the first ciphertext, the parameter ra and the parameter srka as signatures to apassword verification party for signature verification.

Description

Technical field [0001] The invention relates to the field of secure communication, in particular to a quantum communication service station digital signcryption system realized by using key fob technology. Background technique [0002] Cryptography is the core of the discipline of information security. The cryptographic primitives used to provide information security services in cryptography are called cryptosystems. The basic security services provided by the cryptographic system include confidentiality, integrity, authentication and non-repudiation. Confidentiality means that information is only used by authorized users and cannot be disclosed to unauthorized users. Integrity refers to the characteristics of information that cannot be accidentally or deliberately deleted, modified, forged, replayed, inserted, etc., damaged or lost during transmission or storage. Authentication is to ensure that the identity of the communicating party is authentic. Confirming the identity of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3247H04L9/0852
Inventor 富尧钟一民汪仲祥
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products