Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-collusion quantum key negotiation method, computer terminal and storage device

A quantum key agreement and key agreement technology, which is applied in the field of collusion-resistant quantum key agreement, can solve the problems that the quantum key distribution protocol cannot resist external attackers and internal attacks of dishonest participants.

Active Publication Date: 2019-10-22
SHENZHEN POLYTECHNIC
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a collusion-resistant quantum key agreement method, which aims to solve the problem that the existing quantum key distribution protocol cannot resist external attackers and internal attacks by dishonest participants

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] In the key negotiation process of multiple users in the present invention, it is assumed that both the classical channel and the quantum channel have been authenticated, and there is no noise and loss of information. N participants respectively communicate through N negotiation terminals P i (0≤i≤N-1), perform key negotiation. The semi-honest third party (Third Party, TP) faithfully helps N participants complete the agreement process in accordance with the agreement process through the third-party interactive terminal. The so-called semi-honest third party means that the third-party TP is allowed to deduce the partici...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an anti-collusion quantum key negotiation method, a computer terminal and a storage device. The method comprises a third-party interaction terminal TP and N negotiation interaction terminals Pi. The method comprises: preparing N message sequences {S0,and the like, SN-1} by a TP, each message sequence Si comprising m ordered quantum bits, and the TP correspondingly sending each Si to the corresponding Pi; encoding own secret information Ki into a message sequence Si by the N negotiation interaction ends according to an encoding rule, randomly generating m quantum decoy states by the Pi, randomly inserting the m quantum decoy states into the encoded message sequence to obtain a new sequence Pi, and sending the new sequence Pi to the Pi + 1; performing eavesdropping detection until the Nth round of circulation is completed, sending quantum base information of each quantum bit in the Si to Pi-1 by TP, measuring the message sequence Si under a corresponding base by Pi-1, and calculating a final negotiation key. The method can prevent an internal colluder from acquiring key exclusive OR information of other legal negotiation interaction terminals in a key stealingstage, and further controls a final shared key in a key overturning stage.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a collusion-resistant quantum key agreement method. Background technique [0002] Quantum Key Agreement (Quantum Key Agreement, QKA) is to use the theory of quantum mechanics to achieve key agreement tasks. As an emerging research field of quantum cryptography, quantum key agreement solves the key sharing problem of group organization activities in the network. [0003] Under different security definitions, QKA can be divided into two categories. One is the QKA protocol under the weak security definition, where two or more parties negotiate a key through an open channel. Under this weak security definition, the QKA protocol is the well-known Quantum Key Distribution (Quantum Key Distribution, QKD) protocol. Under the definition of strong security, QKA not only requires all users to participate in the key generation process through an open channel, but also must ge...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0838
Inventor 孙志伟成荣
Owner SHENZHEN POLYTECHNIC