Unlock instant, AI-driven research and patent intelligence for your innovation.

Quantum secret communication identity authentication system and method based on secret sharing

A technology of quantum secure communication and identity authentication, applied in key distribution, can solve the problems of rights theft, user account rights damage, high communication cost, and achieve the effect of reducing the amount of calculation and protecting all rights and interests

Active Publication Date: 2020-07-14
南京如般量子科技有限公司 +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 2. After the key card is lost or stolen, it may be used directly and cause damage to the rights and interests corresponding to the user account
For example, transfer all the rights and interests of the user account, resulting in the theft of rights and interests
[0010] 3. The anti-quantum computing ability of the existing digital signature is not high, and it may be calculated to obtain the signature private key
In order to make the digital signature anti-quantum computing ability, the digital signature must be encrypted, which increases the calculation amount of the digital signature.
[0011] 4. The ID of the existing network communication subject is exposed in the network, and the security of user privacy is not high
[0012] 5. The existing multi-party threshold signature method has a complicated process and high communication costs
[0013] 6. In the existing algorithm based on ID cryptography, the elliptic curve generator is used as a fixed parameter, which will never change, and the security of the system based on ID cryptography is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret communication identity authentication system and method based on secret sharing
  • Quantum secret communication identity authentication system and method based on secret sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] instructions

[0054] The structure diagram of the system of the present invention is as follows: figure 1 As shown, client A and client B are mobile device clusters with quantum key cards, where client A is the active party and client B is the passive party. A's key fob is issued by quantum communication service station QA, and B's key fob is issued by quantum communication service station QB. A's ID is ID A , which can be the ID of the device owner of the mobile device cluster corresponding to A; similarly, the ID of B is ID B .

[0055] Mobile devices may be:

[0056] (1) UKEY, connected to the user host through the USB interface;

[0057] (2) IC key card, connected to the user host through an IC card reader;

[0058] (3) NFC key card, connected to the user host through NFC;

[0059] (4) Bluetooth KEY, connect to the user's host through Bluetooth;

[0060] (5) Infrared KEY, connected to the user host through infrared;

[0061] (6) WIFI key card, connect to u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum secret communication identity authentication system and method based on secret sharing. The system comprises service stations and user sides are in communication connection, each service station is provided with more than one user side, the user sides are mobile equipment groups formed by more than one piece of mobile equipment; the mobile equipment in the same group secretly shares the same equipment ID, equipment false identity and equipment secret key; login identity authentication is implemented between the user sides and the service stations to which theuser sides belong, and group session secret keys are generated; a session key between two mobile devices is generated in the process of implementing identity authentication between the two mobile devices. According to the authentication method, the complete secret key and ID of the user are not exposed in the network, the secret key shared secretly is updated after identity authentication each time, the threshold signature process is simplified, attacks of a quantum computer can be resisted without encryption, and the security of identity authentication is greatly improved.

Description

technical field [0001] The invention relates to the technical field of secret sharing, in particular to a quantum secret communication identity authentication system and method based on secret sharing. Background technique [0002] Quantum communication technology is an emerging secure communication technology based on quantum physics. my country's quantum communication technology has entered the stage of practical application, and its application prospects and strategic significance have also attracted widespread attention from local governments and important industries to its industrial development. In addition to the establishment of quantum communication backbones, some large-scale metropolitan quantum communication networks have also been successfully constructed and put into operation. Based on the metropolitan quantum communication network, quantum communication technology has also had preliminary applications, which can realize applications such as video and voice c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/0863H04L9/3247
Inventor 富尧钟一民杨羽成
Owner 南京如般量子科技有限公司