A Two-way Identity Authentication Method Based on Single Photon

A two-way identity authentication, single-photon technology, applied in the field of quantum communication, to achieve the effect of easy implementation, easy operation, good fault tolerance and robustness

Active Publication Date: 2020-10-30
NORTH CHINA ELECTRIC POWER UNIV (BAODING)
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the deficiencies of the above-mentioned prior art, the present invention provides a two-way identity authentication method based on single photons, and uses single photons as quantum resources, and effectively solves the problem of user identity authentication in complex network communication protocols. Implementation and security issues, making authentication faster and more efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Two-way Identity Authentication Method Based on Single Photon
  • A Two-way Identity Authentication Method Based on Single Photon
  • A Two-way Identity Authentication Method Based on Single Photon

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0039] In this example, if figure 1 As shown, a two-way identity authentication method based on single photons is based on the quantum non-cloning and uncertainty theorem for wiretapping detection and identity authentication: firstly, the two sides of the authentication obtain the shared key through the quantum key distribution QKD protocol, and the semi-honest third party C generates and distributes the polarized single-photon sequence to authenticator A. Authenticator A performs corresponding operations on the polarized single-photon sequence and sends it to authenticator B. Authenticator B returns the polarized single-photon sequence after performing the corresponding operation. Two-way authentication is completed after C measurement; this protocol first distributes keys, then detects channel security, and then performs identity authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bidirectional identity authentication method based on a single photon. The method comprises the following steps that two authentication parties share one secret key; the third party prepares an initial single photon sequence and sends the initial single photon sequence to an authentication party; the authenticator performs corresponding single event operation on the single photon sequence according to the shared key; random replacement is carried out on the single photon sequence; after replacement, the information is sent to the other party through a quantum channel;and the other party executes inverse replacement operation to obtain a single photon sequence before replacement, performs corresponding single particle operation according to the secret key, recovers the initial single photon sequence and returns the initial single photon sequence to the third party, the third party measures the returned single photon sequence and compares whether the returned single photon sequence is consistent with the initial photon sequence, if so, authentication succeeds, and otherwise, authentication fails. According to the invention, the single photon is used as a quantum resource, and the problems of effectiveness, realizability and security of user identity authentication in a complex network communication protocol are effectively solved, so that the authentication is more convenient and effective.

Description

technical field [0001] The invention belongs to the technical field of quantum communication, and in particular relates to a single-photon-based two-way identity authentication method. Background technique [0002] With the continuous development of the Internet, people start to use online transactions more and more in their daily life. However, malicious threats such as viruses, hackers, phishing and phishing scams have brought great challenges to the security of online transactions. Identity authentication is the basic technology to realize information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between users. Currently existing authentication methods include identity authentication based on classical passwords and identity authentication based on biometric features. Although the identity authentication based on classical cryptography is accurate, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0643H04L9/0852
Inventor 石润华石泽苟湘淋
Owner NORTH CHINA ELECTRIC POWER UNIV (BAODING)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products