Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

QKD network authentication key generation method and system based on alliance chain and implicit certificate

An implicit certificate and network authentication technology, applied in the field of consortium chain, can solve the problem of low anti-tampering and anti-repudiation ability, and achieve the effect of improving security and reducing workload

Active Publication Date: 2020-03-13
RUBAN QUANTUM TECH CO LTD +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The key management center records the key usage of the QKD network for billing and other business activities, but the record's anti-tampering and anti-repudiation capabilities are not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • QKD network authentication key generation method and system based on alliance chain and implicit certificate
  • QKD network authentication key generation method and system based on alliance chain and implicit certificate
  • QKD network authentication key generation method and system based on alliance chain and implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0055] In order to better describe and illustrate the embodiments of the present application, reference may be made to one or more drawings, but the additional details or examples used to describe the drawings should not be considered as invention-creations, presently described implementations of the present application A limitation of the scope of any one of the examples or preferred modes.

[0056] It should be understood that, unle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a QKD network authentication key generation method and system based on an alliance chain and an implicit certificate. The method is implemented among alliance chain members communicating with each other. The alliance chain members comprise client members and server members; it is characterized in that each member is configured with a key fob; a server public key pool, a server secret sharing private key pool and a client public key pool are stored in the server secret key card; client private keys, private key parameters, server public keys and client public key pointer random numbers are stored in the client secret key cards, and the server public keys comprise a first public key and a second public key; public key units in one-to-one correspondence with the client members are stored in the client public key pool, and identity identifiers and implicit certificates are stored in the public key units. During communication of each party, encryption communicationis carried out by using the key fob based on the alliance chain and the implicit certificate, so that the security is further improved.

Description

technical field [0001] The present application relates to the field of consortium chains, in particular to a method and system for generating QKD network authentication keys based on consortium chains and implicit certificates. Background technique [0002] Blockchain is a brand-new distributed infrastructure and computing paradigm. It uses an orderly chained data structure to store data, uses consensus algorithms to update data, and uses cryptography to ensure data security. In blockchain-based transactions, ensuring the data security of transactions and the privacy of customers is a necessary condition for the further development of blockchain. For this reason, cryptography, especially public key cryptography, has been widely used in blockchain. The alliance chain is a branch of the blockchain, so it is also a distributed and decentralized public database. The difference from other chains is that it is aimed at members of specific groups and limited third parties. Each p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0852H04L9/0861H04L9/0897H04L9/3236H04L9/3265H04L63/06H04L63/0823H04L63/0853H04L63/0876
Inventor 富尧钟一民杨羽成汪仲祥
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products