Verifiable quantum key negotiation method

A quantum key agreement and quantum technology, applied to key distribution, can solve the problems of lack of legal identity of participants and correctness verification of session keys, difficulty in ensuring fairness of participants, etc.

Active Publication Date: 2020-03-27
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to solve the problem that it is difficult to ensure the fairness of participants in the existing quantum key distribution scheme, and the existing quantum key agreement lacks the correctness check of the legal identity of the participants and the session key, and provides a safe, An efficient quantum key agreement method with v...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0083] In this implementation case, a verifiable quantum key agreement method is applied to two participants, Alice and Bob, and a public network connecting the two participants, where the public network includes public quantum channels and public The classical channel, the classical channel is proposed relative to the quantum channel; the verifiable quantum key agreement method is carried out according to the following steps:

[0084] Step 1: Initialization phase:

[0085] Participant Alice and participant Bob share a 2m-bit master key k face-to-face (offline) AB =k AB [1]||k AB [2]||…||k AB [i]||…||k AB [m], where k AB [i] represents the master key of the i-th bit, and k AB [i]∈{00, 01, 10, 11}, 1≤i≤m, || represents a string connector, for example, assuming that the master key share of the first bit is 00, then k AB [1]=00, the purpose of this step is to realize the initialization of the whole verification process;

[0086] Step 2: Participant Alice and participant B...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a verifiable quantum key agreement method. Two participants Alice and Bob exist and are interconnected through public quantum and classic channels; participants respectively prepare n groups of EPR particle pairs, and exchange half of the particles through the quantum channels; the participants randomly select m groups of EPR particle pairs to implement Pauli operation through a pre-appointed master key so as to verify the legality of the identity of each participant; each participant implements Bell-based measurement so as to obtain a shared session key; and the participant exchanges half of the particles again, and the correctness of the final session key and the legality of the identity of the participant are confirmed through Bell-based measurement. According tothe invention, the problems that the existing quantum key negotiation lacks a mechanism for verifying the legality of the identity of the participant and the correctness of the agreed key, the existing quantum key distribution lacks fairness and the like can be solved, and the verification efficiency is improved on the premise of ensuring the security.

Description

technical field [0001] The invention belongs to the application field of modern cryptography, in particular to a verifiable quantum key agreement method. Background technique [0002] Key management is one of the most critical issues in modern cryptography, involving key generation, distribution, storage, application, etc. At present, many security applications on the Internet use public key encryption algorithms to distribute session keys. However, with the introduction of quantum computers and quantum fast algorithms, classical cryptographic algorithms, including symmetric encryption algorithms (such as DES, AES) and public key encryption algorithms (such as RSA, ECC), are facing huge security challenges. [0003] On the other hand, the emergence of quantum cryptography has brought a new dawn to the field of security. Quantum cryptography is the product of the combination of quantum mechanics and modern cryptography. Its security is guaranteed by the basic principles of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852
Inventor 石润华李坤昌石泽苟湘淋
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products