Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data integrity rapid authentication method and system based on quantum secret communication, terminal and storage medium

A quantum secure communication and data integrity technology, applied in digital transmission systems and key distribution, can solve the problems of easy tampering of data transmission and easy cracking of hash functions, etc., and achieve the effect of reducing the risk of tampering and acquisition

Pending Publication Date: 2020-09-29
BEIJING INFORMATION SCI & TECH UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the deficiencies of the prior art, this application provides a fast data integrity authentication method, system, terminal and storage medium based on quantum secure communication, so as to solve the problem that the hash function in the prior art is easy to be cracked when verifying the data integrity, Problems such as easy tampering during data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data integrity rapid authentication method and system based on quantum secret communication, terminal and storage medium
  • Data integrity rapid authentication method and system based on quantum secret communication, terminal and storage medium
  • Data integrity rapid authentication method and system based on quantum secret communication, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0078] Please refer to figure 1 , figure 1 It is a flow chart of a fast authentication method for data integrity based on quantum secure communication provided in the embodiment of the present application. The method 100 includes:

[0079] S101: The data sending end and the data receiving end obtain the quantum shared key;

[0080] S102: Generate a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data integrity rapid authentication method and system based on quantum secret communication, a terminal and a storage medium. The method comprises the steps that a data sending end and a data receiving end obtain a quantum shared key; the plaintext data of the data sending end and the shared key are subjected to hash operation to generate a first hash value, and the plaintext data and the first hash value are sent to the data receiving end; hash operation is performed on the received plaintext data and the shared key to generate a second hash value; the first hash value is compared with the second hash value to verify data integrity. According to the invention, a quantum key is used to replace a traditional key to carry out hash operation so as to carry out data integrity verification; according to the method, the risk that the hash function is cracked when data integrity verification is carried out can be reduced, authentication needs to be carried out on thetwo communication ends during data communication to ensure authenticity and integrity of data, rapid authentication needs to be carried out during large-scale communication, and data integrity and authenticity verification can be rapidly achieved by adopting the quantum key to carry out hash operation.

Description

technical field [0001] The present application relates to the technical field of quantum communication, in particular to a fast data integrity authentication method, system, terminal and storage medium based on quantum secure communication. Background technique [0002] In an information security system, the privacy and integrity of encrypted data are two very important aspects. The key to the privacy security of encrypted data lies in confidential storage and confidential sharing. The integrity of encrypted data is to reduce the risk of data tampering by providing data hash value for verification. Existing data integrity checks generally use a hash algorithm and a key to hash the data to obtain a data hash value, and send the hash value and data to the other party. After receiving the data, the other party uses the same If the hash value obtained is the same as that sent by the other party, it means that the data has not been tampered with. [0003] Hash is an irreversibl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0852H04L9/085H04L63/0435H04L63/123
Inventor 蒋文保刘颖慧史博轩
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products