Key distribution method and system based on multi-key combined quantum key relaying

A quantum key and key distribution technology, applied in the field of key distribution method and system based on multi-key combination quantum key relay, can solve the problems of limited security, high cost, insufficient anti-attack ability and the like

Active Publication Date: 2020-07-07
SHANDONG INST OF QUANTUM SCI & TECH
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006]First, the cost is relatively high, requiring multiple routing devices to set up more than one transmission path between the source and destination nodes;
[0007]Second, the ability to resist attacks is insufficient. As long as one node is compromised on a path, the information transmitted on the entire path will be immediately insecure
In other words, if there are two paths in the entire system, the attacker only needs to take down one node in each of the two paths, which is equivalent to taking down the two paths. Need to take down a node is better, but its security improvement is still limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution method and system based on multi-key combined quantum key relaying
  • Key distribution method and system based on multi-key combined quantum key relaying
  • Key distribution method and system based on multi-key combined quantum key relaying

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] figure 1 It is a flow chart of a key distribution method based on multi-key combined quantum key relay provided in Embodiment 1 of the present invention. In this embodiment, there is a layer of intermediate keys, such as figure 1 shown, including the following steps:

[0067] S1: The quantum terminal node A as the source node and the quantum terminal node B as the destination node exchange the quantum key k through the relay node R 1 sharing of

[0068] In this embodiment, the step S1 specifically includes the following steps:

[0069] S11: The quantum terminal node A as the source node transfers the quantum key k 1 Encrypt with the shared key between quantum terminal node A and relay node R to get k 1 (A-R), and sent to the relay node R;

[0070] S12: The relay node R receives the encrypted key k sent by the quantum terminal node A as the source node 1 (A-R), decrypt it to get k 1 , the quantum key k 1 Encrypt with the shared key between the relay node R and th...

Embodiment 2

[0107] Embodiment 1 The calculation of the intermediate key and the final key requires the quantum terminal node A as the source node and the quantum terminal node B as the destination node to respectively store the shared quantum key k 1 to k m-1 and the calculated intermediate key k 1 ' to k m-1 ', in order to save the storage space of the quantum terminal, the present invention makes a further improvement on the basis of Embodiment 1.

[0108] On the basis of embodiment 1, it is modified as follows:

[0109] 1. Intermediate key k m 'The calculation method is changed to k m '=H 1 (k m +k m-1 ');

[0110] 2. Final key k m "The calculation method is changed to k m "=H 2 (k m '+k m-1 ").

[0111] In this embodiment, if only from the calculation point of view, in order to calculate the new intermediate key k m ', the quantum terminal only needs to store k m-1 ' can be shared with the new k m Calculate the result together without necessarily storing the previousl...

Embodiment 3

[0146] Make further improvement on the basis of embodiment 1 or embodiment 2:

[0147] In the formula for calculating the intermediate key or the final key, the combination of two or more keys can not only be realized by splicing, but also can be changed to other combinations, such as XOR operation, misplaced X Or operation, dislocation splicing operation, etc.

[0148] It should be noted that when the combination is a linear operation, the hash function should preferably choose a hash function with nonlinear properties.

[0149] For example, in this embodiment, step S8 in Embodiment 1 is improved as follows:

[0150] S8: According to step S2 or S4, the quantum terminal node A as the source node and the quantum terminal node B as the destination node each share a quantum key k m , the quantum terminal node A as the source node calculates the intermediate key k sequentially m ' and the final key k m ";

[0151] The intermediate key k m 'According to the shared quantum key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key distribution method and system based on multi-key combined quantum key relaying. The method comprises that: a source node and a destination node sequentially share quantum keys through relay nodes according to a key distribution sequence; and after the quantum key is shared each time, the source node and the destination node respectively calculate a final key by adopting the same algorithm, and the final key is obtained by performing at least one round of combination calculation according to the quantum key distributed in history. According to the invention, through the combined calculation of a plurality of secret keys, the secret key distribution safety is improved.

Description

technical field [0001] The invention belongs to the technical field of quantum communication, and in particular relates to a key distribution method and system based on multi-key combination quantum key relay. Background technique [0002] With the development of network information, the network affects all aspects of people's lives, and the subsequent security requirements are getting higher and higher, and the confidentiality requirements for people's network activities are also getting higher and higher. Encryption or authentication technology guarantees the confidentiality of people's own data and some related materials in network activities, and ensures the security and confidentiality of the network. Due to its unconditional security and high efficiency, quantum communication has brought a revolutionary development to information security, and is currently the main research direction for secure data transmission. [0003] As the current quantum communication network i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06
CPCH04L9/0855H04L9/0852H04L9/0643
Inventor 赵梅生刘春华
Owner SHANDONG INST OF QUANTUM SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products