Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-quantum computing asymmetric key management method and system based on asymmetric key pool and implicit certificate

An asymmetric key and implicit certificate technology, applied in the field of anti-quantum computing asymmetric key management, can solve the problems of server-side key storage pressure, large key capacity, large capacity, etc., and can not be quickly updated online. , the effect of reducing storage costs and ensuring communication security

Active Publication Date: 2019-12-13
RUBAN QUANTUM TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1. The existing key management scheme based on the symmetric key pool, the symmetric key pool is used between the server and the client, and its capacity is huge, which puts pressure on the key storage of the server;
[0012] 2. Existing key management schemes based on symmetric key pools. Due to the huge capacity of symmetric key pool keys, the server has to encrypt and store the keys in ordinary storage media such as hard disks, and cannot store the keys in the server’s encryption. inside the key fob;
[0013] 3. The existing scheme of key management based on symmetric key pool, due to the huge capacity of symmetric key pool key, causes troubles for online key update

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing asymmetric key management method and system based on asymmetric key pool and implicit certificate
  • Anti-quantum computing asymmetric key management method and system based on asymmetric key pool and implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application. The servers in this application are all quantum communication servers unless otherwise specified, and the names in this application are based on the combination of letters and numbers, such as Q, server Q, and server have the same meaning below , that is, the server Q; another example is the first key KR1, KR1, the true random number KR1, the first key has the same meaning hereinafter, that is, the first key KR1, and the other names are the same.

[0046] This application discloses an anti-quantum computing asymmetric key management method based on an asymmetric key pool...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum computing asymmetric key management method and a system based on an asymmetric key pool and an implicit certificate. According to the method and the system, the secret key management method based on the implicit certificate is improved, and the asymmetric secret key pool is used for ensuring that the acquisition and updating of the asymmetric secret key canonly be obtained by the client with the asymmetric secret key pool and cannot be obtained by any other people. Because the asymmetric secret keys are not disclosed, and the secret keys cannot be obtained in the disclosed user information, the asymmetric secret key using mode has the characteristic of quantum computing resistance.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a quantum computing-resistant asymmetric key management method and system based on an asymmetric key pool and an implicit certificate. Background technique [0002] The rapid development of the Internet has brought great convenience to people's life and work. People can send and receive e-mails, make phone calls, do online shopping, and bank transfers while sitting at home. At the same time, network information security has gradually become a potentially huge problem. Generally speaking, network information faces the following security risks: network information theft, information tampering, attackers forging information, malicious damage, etc. [0003] Among them, identity authentication is one of the means to protect people's network information. Identity authentication, also known as "identity verification" or "identity identification", refers to the p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0897H04L9/0869H04L9/0825H04L9/0643
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD