Quantum secret communication identity authentication system and method based on secret sharing
A technology of quantum secure communication and identity authentication, applied in key distribution, can solve the problems of rights theft, user account rights damage, high communication cost, and achieve the effect of reducing the amount of calculation and protecting all rights and interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] instructions
[0054] The structure diagram of the system of the present invention is as follows: figure 1 As shown, client A and client B are mobile device clusters with quantum key cards, where client A is the active party and client B is the passive party. A's key fob is issued by quantum communication service station QA, and B's key fob is issued by quantum communication service station QB. A's ID is ID A , which can be the ID of the device owner of the mobile device cluster corresponding to A; similarly, the ID of B is ID B .
[0055] Mobile devices may be:
[0056] (1) UKEY, connected to the user host through the USB interface;
[0057] (2) IC key card, connected to the user host through an IC card reader;
[0058] (3) NFC key card, connected to the user host through NFC;
[0059] (4) Bluetooth KEY, connect to the user's host through Bluetooth;
[0060] (5) Infrared KEY, connected to the user host through infrared;
[0061] (6) WIFI key card, connect to u...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


