Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing identity authentication method and system based on secret sharing and quantum communication service station

A quantum communication and identity authentication technology, applied in the field of anti-quantum computing identity authentication, which can solve the problems of complex process, invalid public and private keys of key cards, and high communication cost

Active Publication Date: 2020-07-31
南京如般量子科技有限公司 +1
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] (2) After the key card is lost or stolen, the owner reports the loss of the key card. Assuming that the enemy has the ability to crack the key card, the report of the loss of the key card will cause the public and private key pairs corresponding to the key card to become invalid at the same time. no longer allowed to be used
[0015] (3), the existing multi-party threshold signature method, the process is more complicated, and the communication cost is higher

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing identity authentication method and system based on secret sharing and quantum communication service station
  • Anti-quantum computing identity authentication method and system based on secret sharing and quantum communication service station
  • Anti-quantum computing identity authentication method and system based on secret sharing and quantum communication service station

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] In this embodiment, it is implemented as identity authentication and key agreement between user A and user B. User A belongs to quantum communication service station QA, and user B belongs to quantum communication service station QB.

[0076] The specific steps of identity authentication are as follows:

[0077] 1. User A initiates an identity authentication request

[0078] User A obtains the current timestamp Time, and obtains RK=H(Time) through hash calculation. According to KN key pointer functions {FPm,m∈[1,KN]} and key coefficient calculation functions {FUm,m∈[ 1, KN]} to calculate the position of the secret component {Pm=FPm(RK), m∈[1,KN]}, key coefficient {μm=FUm(RK), m∈[1,KN]}. Take out KN keys from the PKa area, SKa area, and PKb area according to the position to obtain {PKaTempm,m∈[1,KN]}, {SKaTempm,m∈[1,KN]}, {PKbTempm,m∈[1, KN]}, obtained by calculating with the coefficient

[0079] User A generates a true random number DHa, and calculates it with t...

Embodiment 2

[0112] In this embodiment, it is implemented as identity authentication and key agreement between user A and user B. User A and user B both belong to quantum communication service station Q.

[0113] The specific steps of identity authentication are as follows:

[0114] 1. User A initiates an identity authentication request

[0115] User A obtains the current timestamp Time, and obtains RK=H(Time) through hash calculation. According to KN key pointer functions {FPm,m∈[1,KN]} and key coefficient calculation functions {FUm,m∈[ 1, KN]} to calculate the position of the secret component {Pm=FPm(RK), m∈[1,KN]}, key coefficient {μm=FUm(RK), m∈[1,KN]}. Take out KN keys from the PKa area, SKa area, and PKb area according to the position to obtain {PKaTempm,m∈[1,KN]}, {SKaTempm,m∈[1,KN]}, {PKbTempm,m∈[1, KN]}, obtained by calculating with the coefficient

[0116] User A generates a true random number DHa, and calculates it with the base point P to obtain DHA=DHa*P. Encrypt PKaM...

Embodiment 3

[0149] In this embodiment, it is implemented as identity authentication and key agreement between user A and user B. User A belongs to quantum communication service station QA, and user B belongs to quantum communication service station QB.

[0150] The specific steps of identity authentication are as follows:

[0151] Step 1 is the same as embodiment 1, and step 2 is as follows:

[0152] 2. Quantum communication service station QA verifies the request and returns a response

[0153] Quantum communication service station QA receives a request MsgA from user A. According to the IDA in MsgA, it is judged whether it belongs to the quantum communication service station. If it does not belong to the service station, the authentication process of user A fails; otherwise, QA of the quantum communication service station judges whether the time stamp Time is reasonable. If it is unreasonable, the authentication process of user A fails; otherwise, quantum communication service stati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-quantum computing identity authentication method and system based on secret sharing and a quantum communication service station. The system comprises a plurality of secret key card groups which are in communication connection to form a quantum communication network, each secret key card group is provided with a quantum communication service station and a plurality of user sides, and the quantum communication service stations and the user sides in the same group share a main secret key and a temporary secret key in a secret sharing mode; identity authentication between user sides needs to be verified by quantum communication service stations of two parties. In a verification process, identity authentication information of an initiator needs to be signed by auser side and a quantum communication service station respectively, and complete key information of the user side does not appear in an authentication record, so that an enemy cannot track and crack the key information of the user, and user rights and interests corresponding to a key card are protected. Meanwhile, by pre-sharing the parameters of the threshold signature and a series of anti-quantum computing communication mechanisms, the threshold signature of the anti-quantum computing is realized, the flow of the threshold signature is simplified, and the communication cost is reduced.

Description

technical field [0001] The invention relates to secret sharing and threshold signature technology, in particular to a quantum computing-resistant identity authentication method and system based on secret sharing and quantum communication service stations. Background technique [0002] As mankind enters the 21st century, the wave of informatization has swept every corner of the earth. The Internet has connected the whole world, and the network has profoundly affected the way of life of human beings. It has changed the traditional way of dealing with things and provided us with unprecedented convenience and unlimited development space. There are three principles of information security, commonly referred to as "The Big Three", which originate from the need to maintain the confidentiality, integrity, and availability of information resources. At present, in the classical network, asymmetric key algorithms are mainly used to protect the data and identity information of all part...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/34G06F21/46
CPCG06F21/34G06F21/46
Inventor 富尧钟一民余秋炜
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products