Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption and decryption method and system for quantum secret communication

A quantum security communication, encryption and decryption technology, which is applied in the field of quantum security communication, can solve problems such as high computing pressure, high communication pressure, and leakage, and achieve the effects of reducing computing pressure, ensuring security, and improving work efficiency

Active Publication Date: 2020-12-01
RUBAN QUANTUM TECH CO LTD +1
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above technical solution is equivalent to using K1 as the relay key, and then the subsequent relay node XORs it with the negotiated key of the adjacent node and sends it directly to the target node, and the target node solves the key of each relay node in the reverse direction. Negotiate the key, and finally deduce the relay key K1. In this scheme, the relay key K1 used for encryption will appear not only at the starting node A, but also at the first relay node C1, and still exists certain leakage risk
In addition, in this scheme, the communication pressure at the target node B is relatively high, and the target node needs to calculate the relay key K1 according to the received adjacent XOR values ​​of all nodes, and the calculation pressure is also high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and system for quantum secret communication
  • Encryption and decryption method and system for quantum secret communication
  • Encryption and decryption method and system for quantum secret communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] This embodiment proposes an encryption and decryption method for quantum secure communication, which is implemented in image 3 In the shown encryption and decryption system for quantum secure communication, the number of relay nodes in this system is n.

[0044] The whole method includes the following steps:

[0045] (1) Establish a quantum channel between the starting node and the target node.

[0046] (2) Divide the n relay nodes between the starting node and the target node into odd nodes and even nodes. Adjacent relay nodes are regarded as even nodes, and so on until all relay nodes are divided; image 3 As shown, among the n relay nodes, the relay node directly connected to the target node is numbered B1, and then numbered sequentially in the direction of the starting node, and the next relay node connected to the relay node B1 is numbered B2, The number of the next relay node connected to the relay node B2 is B3..., and the number of the relay node directly co...

Embodiment 2

[0054] The flow of this embodiment is as follows Figure 4 As shown, in the entire communication link, the starting node is A, the target node is E, and there are three relay nodes, namely B, C, and D.

[0055] When A initiates a communication requirement, first establish a quantum communication link between A and E, and then negotiate a quantum key between adjacent nodes through quantum secure communication, and share the quantum key between node A and node B K1, the shared quantum key between B and C is K2, the shared quantum key between C and D is K3, and the shared quantum key between D and E is K4. When the quantum communication link is established, the intermediate nodes are identified as odd and even nodes. The specific rules are as follows: starting from the target node, the relay nodes directly adjacent to it are odd nodes, and then encode the relay nodes in sequence according to the odd and even numbers , such as attached Figure 4 D in D is an odd node, C is an ev...

Embodiment 3

[0057] The flow of this embodiment is as follows Figure 5 As shown, in the entire communication link, the starting node is A, the destination node is D, and there are two relay nodes, namely B and C. According to the above identification of the parity of the relay node, C is an odd node, B is an even node, the starting node A’s own quantum key is K1, and the received quantum key of the odd node is the K2 XOR K3 of the C node, Therefore, the encryption key of the starting node is K1⊕(K2⊕K3); the quantum key of the target node D itself is K3, and the received quantum key of the even node is K1 XOR K2 of node B, so the target node’s The decryption key is K3⊕(K1⊕K2).

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an encryption and decryption method and system for quantum secret communication, and the method comprises the steps: enabling a relay node directly connected with a target nodeto serve as an odd node, enabling an adjacent relay node of the relay node to serve as an even node, and carrying out the analogy; when the starting node and the target node carry out data transmission, each odd node transmitting the quantum key between the odd node and the two adjacent nodes to the starting node after exclusive OR, and each even node transmitting the quantum key between the evennode and the two adjacent nodes to the target node after exclusive OR; and the starting node performing exclusive OR on the own key and the received key to obtain an encryption key, and the target node performing exclusive OR on the own key and the received key data to obtain a decryption key. According to the method, a specific relay key is not transmitted in the relay node, so that the requirement that the relay key needs to pass through all the relay nodes hop by hop is avoided, the credible requirement degree on the relay node is reduced, and the security of confidential information transmission can be fully guaranteed.

Description

technical field [0001] The invention relates to the field of quantum secure communication, in particular to an encryption and decryption method and system for quantum secure communication. Background technique [0002] The encryption and decryption of the existing quantum secure communication is mainly based on the hop-by-hop transfer of the key based on the trusted relay. The process is as follows: figure 1 As shown, for example, the starting node needs to send data to the target node, the starting node first conducts quantum secret communication with the adjacent node (set as the first hop node) to negotiate the quantum key K, and the starting node uses the quantum key K performs an encryption operation on the data (generally an XOR operation) and then sends the encrypted information to the target node through classical communication; Node, the fourth hop node..., the Nth hop node, the target node) conduct quantum secret communication to negotiate the quantum key K1, so t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0855
Inventor 富尧钟一民王泽军
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products