Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum communication service station key agreement method and system based on one-time asymmetric key pair and QKD

An asymmetric key, quantum communication technology, applied in key distribution, can solve the problem of key storage pressure of quantum communication service stations, increase the cost of client key cards, and cannot store key cards, etc., to improve system security. , the effect of reducing storage costs and ensuring security

Pending Publication Date: 2019-11-29
RUBAN QUANTUM TECH CO LTD
View PDF5 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. The existing identity authentication scheme based on the symmetric key pool, the symmetric key pool is used between the quantum communication service station and the quantum key card, and its capacity is huge, which puts pressure on the key storage of the quantum communication service station;
[0011] 2. The existing identity authentication scheme based on the symmetric key pool, due to the huge capacity of the symmetric key pool key, the quantum communication service station has to encrypt and store the key in an ordinary storage medium such as a hard disk, and cannot store it in the quantum communication in the key fob at the service station;
[0012] 3. The existing identity authentication scheme based on the symmetric key pool causes troubles for key backup due to the huge key capacity of the symmetric key pool;
[0013] 4. In the existing identity authentication scheme based on a symmetric key pool, each clients key card needs to store a large number of keys, which has a large storage requirement for the clients key card, which increases the cost of the clients key card

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum communication service station key agreement method and system based on one-time asymmetric key pair and QKD
  • Quantum communication service station key agreement method and system based on one-time asymmetric key pair and QKD
  • Quantum communication service station key agreement method and system based on one-time asymmetric key pair and QKD

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. The service stations in this application are all quantum communication service stations unless otherwise specified. The names in this application are based on the combination of letters and numbers, such as Q, service station Q, and service stations below indicate the same meaning , that is, the service station Q; another example is the one-time private key SKQA, SKQA, the service station private key SKQA has the same meaning below, that is, the one-time private key SKQA, and the rest of the names are the same.

[0041] The realization scenario of the present invention is to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a quantum communication service station key agreement method and system based on a one-time asymmetric key pair and QKD. A key card used in the method and system is independent hardware isolation equipment. The public key, the private key and other related parameters are all stored in the data security area in the key card, so that the possibility of stealing the key by malicious software or malicious operation is greatly reduced, and the key cannot be acquired and cracked by the quantum computer. Since the transmission of public and private keys and algorithm parameters is not involved in the classical network, the risk that the asymmetric key is cracked is very low, and in addition, the QKD is adopted between the service stations for key sharing, so that the security of the message is greatly guaranteed. The secret key card guarantees the communication safety of two communication parties, and also greatly improves the safety of identity authentication.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a quantum communication service station key agreement method and system based on a one-time asymmetric key pair and QKD. Background technique [0002] The rapid development of the Internet has brought great convenience to people's life and work. People can sit at home to send and receive e-mails, make phone calls, conduct online shopping, bank transfers and other activities through the Internet. At the same time, network information security has gradually become a potential huge problem. Generally speaking, network information faces the following security risks: network information is stolen, information is tampered with, attackers fake information, malicious damage, etc. [0003] Among them, identity authentication is one of the means to protect people's network information. Identity authentication, also known as "identity verification" or "identity auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L9/32
CPCH04L9/0852H04L9/0838H04L63/067H04L63/08H04L9/3247
Inventor 富尧钟一民杨羽成邱雅剑
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products