Quantum communication service station key agreement system and method based on secret sharing and timestamps

A technology of quantum communication and secret sharing, which is applied in the field of key agreement system of quantum communication service station, and can solve problems such as user information leakage

Active Publication Date: 2020-03-27
南京如般量子科技有限公司 +1
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 3. In the current mainstream key agreement system, the client ID or other identity information must be disclosed, resulting in leakage of user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum communication service station key agreement system and method based on secret sharing and timestamps
  • Quantum communication service station key agreement system and method based on secret sharing and timestamps
  • Quantum communication service station key agreement system and method based on secret sharing and timestamps

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] Embodiment 1, key agreement between two clients in the LAN:

[0091] In this embodiment, client A and client B belong to the same quantum communication service station Q. Flowchart such as figure 2 shown.

[0092] Step 1: A→B.

[0093] Client A obtains the current timestamp timestampA, let x 0A =timestampA

[0094] Client A reads x from the matching key fob 1A , calculate x′ 1A =HASH(x 1A ||x 0A ), x′ 2A =HASH(x 0A ||x 1A ).

[0095] will x 1A , x' 1A and x' 2A For comparison, if any two are equal, the current timestampA does not meet the conditions for replacing the PID. At this time, it is necessary to obtain timestampA again and replace it to check whether the conditions for replacing the PID are met.

[0096] Order N A = timestampA. Use client A's private key pair N A , x' 1A and x' 2A Sign to get SIGN(N A ||x′ 1A ||x′ 2A ,SK A). SIGN(m, k) means an ID-based cryptographic signature with m as the message and k as the key. The signature proce...

Embodiment 2

[0139] Embodiment 2, the key agreement of two clients in the wide area network:

[0140] Such as image 3 As shown, in this embodiment, client A and client B do not belong to the same quantum communication service station. Among them, client A belongs to quantum communication service station Q A , similarly, client B belongs to quantum communication service station Q B .

[0141] Step 1: A→B.

[0142] Client A obtains the current timestamp timestampA, let x 0A =timestampA

[0143] Client A reads x from the matching key fob 1A , calculate x′ 1A =HASH(x 1A ||x 0A ), x′ 2A =HASH(x 0A ||x 1A ).

[0144] will x 1A , x' 1A and x' 2A For comparison, if any two are equal, the current timestampA does not meet the conditions for replacing the PID. At this time, it is necessary to obtain timestampA again and replace it to check whether the conditions for replacing the PID are met.

[0145] Order N A = timestampA. Use client A's private key pair N A , x' 1A and x' 2A S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum communication service station key negotiation system and method based on secret sharing and timestamps. The system comprises a client A, a client B and a quantum communication service station, the clients and the quantum communication service stations use the secret key cards to store public keys and private keys, the quantum communication service stations and thequantum secret key cards carry out secret sharing on the clients, only current components stored in the secret key cards are hidden in a false mode, and safety is greatly improved. According to the method, the offset is used at the same time, so that the transmission process is safer, the characteristic of quantum computing resistance is achieved, the calculated amount of the encryption mode is smaller than that of a common encryption mode, therefore, the situation that the common encryption mode is used for resisting attacks of a quantum computer is avoided, and the equipment burden of all parties is reduced.

Description

technical field [0001] The invention relates to the technical field of secret sharing, in particular to a quantum communication service station key agreement system and method based on secret sharing and time stamps. Background technique [0002] Authentication, that is, identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] Currently, the identity authentication system in the communication network generally adopts the Kerberos authentication scheme. Kerberos is a network authentication protocol designed to provide strong authentication services for client / server applications through a key system. The realization of the authentication process does not depend on the authentication of the host operating system, does not require trust based on the host address, does not...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3297H04L9/0838H04L9/0852H04L9/085H04L9/0861H04L9/0819H04L63/08H04L63/0869H04L9/0869Y02D30/70
Inventor 富尧钟一民杨羽成
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products