Verifiable quantum key negotiation method
A quantum key agreement and quantum technology, applied to key distribution, can solve the problems of lack of legal identity of participants and correctness verification of session keys, difficulty in ensuring fairness of participants, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0083] In this implementation case, a verifiable quantum key agreement method is applied to two participants, Alice and Bob, and a public network connecting the two participants, where the public network includes public quantum channels and public The classical channel, the classical channel is proposed relative to the quantum channel; the verifiable quantum key agreement method is carried out according to the following steps:
[0084] Step 1: Initialization phase:
[0085] Participant Alice and participant Bob share a 2m-bit master key k face-to-face (offline) AB =k AB [1]||k AB [2]||…||k AB [i]||…||k AB [m], where k AB [i] represents the master key of the i-th bit, and k AB [i]∈{00, 01, 10, 11}, 1≤i≤m, || represents a string connector, for example, assuming that the master key share of the first bit is 00, then k AB [1]=00, the purpose of this step is to realize the initialization of the whole verification process;
[0086] Step 2: Participant Alice and participant B...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com