Bidirectional user authentication and secret information quantum communication transmission method

A secret information and quantum communication technology, applied in the field of two-way user authentication and secret information quantum communication transmission, can solve the problems of cumbersome process, potential security risks, complicated operation, etc., to simplify the information transmission process, reduce deployment costs, and improve security performance Effect

Active Publication Date: 2020-02-21
CHENGDU UNIV OF INFORMATION TECH
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) In order to realize the transmission of secret information, both parties need to obtain a secure key first, and then encrypt the information through the key, and realize the safe transmission of information by transmitting encrypted information. The operation is very complicated
[0005] 2) In order to realize the transmission of secret information between users of both parties, the assistance of a trusted third party is also needed, which increases the complexity of the scheme and increases the risk of secret information being eavesdropped
[0006] 3) In quantum communication, two-step transmission is g...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional user authentication and secret information quantum communication transmission method
  • Bidirectional user authentication and secret information quantum communication transmission method
  • Bidirectional user authentication and secret information quantum communication transmission method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Please refer to figure 1 This embodiment provides a two-way user authentication and secret information quantum communication transfer method. Assuming that Alice is the message sender and Bob is the message receiver, Alice will transmit the secret information M=1100 to Bob, and Alice’s identity ID A = 0110, Bob’s identification ID B = 1010, identification ID B , Identity ID A And the secret information M is a 4-digit machine code. For the security of secret information transmission, the identity must be completely kept secret. Before the transmission, Alice and Bob each save their own identities. In this embodiment, the Z base used for base measurement is |0> And|1> , There are four Bell bases used for base measurement, namely , , with ,among them, , , , .

[0040] The process of Alice passing the secret message M=1100 to Bob is as follows:

[0041] S1. In order to ensure that Alice and Bob can confirm each other’s identities during the transmission of secret informat...

Embodiment 2

[0084] Compared with Embodiment 1, after the value of the secret information is restored in step S7, Alice and Bob reconfirm whether the secret information is correct by publishing part of the secret information, and then further improve the security of the method of the present invention.

[0085] In addition to the above-mentioned implementation exceptions, comparison information can also be added to the secret information to ensure that the secret information sent is exactly the same as the secret information received.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bidirectional user authentication and secret information quantum communication transmission method, and relates to the technical field of quantum communication. By adopting the method, during the secret information transmission process, the assistance of a third party is not needed, and the secret information can transmitted safely from a sending end to a receiving end through just one transmission step, thereby simplifying the information transmission process. During an eavesdropping detection process, if an information sender does not know an identity identifier IDBof an information receiver, the eavesdropping detection cannot be passed; if the information receiver does not know the identity identifier IDA of the information sender, the information receiver cannot restore the secret information, namely, the identities of the information receiver and the information sender can be authenticated in the communication process, and the secret information is transmitted more safely. According to the method, a quantum memory and a unitary operator do not need to be configured, the sending end only needs to prepare the single photon and the Bell state particles,and the receiving end only needs to measure the single photon and the Bell state particles, so that the deployment cost is reduced, and the application of a quantum communication network is promoted.

Description

Technical field [0001] The present invention relates to the field of quantum communication technology, and in particular to a method for transmitting two-way user authentication and secret information quantum communication. Background technique [0002] In the field of communication technology, ensuring the security of secret information transmission is the most basic problem that needs to be solved for information security. [0003] Currently, users of both parties have the following shortcomings when transferring secret information: [0004] 1) In order to realize the transmission of secret information, both parties in communication need to obtain a secure key first, and then encrypt the information with the key, and realize the secure transmission of information through the form of the encrypted information. The operation is very complicated. [0005] 2) In order to realize the transfer of secret information between users of both parties, the assistance of a trusted third party is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0852
Inventor 闫丽丽张仕斌昌燕
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products