Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum key management method and system based on block chain

A technology of quantum key and management method, which is applied in the field of quantum key management based on blockchain, can solve the problems of key update, difficult implementation of supervision, and less research content, so as to protect security, ensure correctness, The effect of ensuring safety

Active Publication Date: 2020-12-11
唐发明 +1
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are many related researches in the field of quantum key generation, but there are very few researches on other aspects.
If the traditional key management scheme is used, it will be very difficult to implement the entire key update and supervision in the case of large-scale data traffic and large-scale device interconnection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key management method and system based on block chain
  • Quantum key management method and system based on block chain
  • Quantum key management method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 As shown, a blockchain-based quantum key management method includes the following steps:

[0042] Step S1. The first participant and the second participant share the quantum key and the corresponding index value, and respectively establish the first key pool and the second key pool locally.

[0043] In the present invention, the quantum key sequence is shared between the first participating terminal and the second participating terminal through the QKD device, and the QKD device can use an internationally accepted quantum key distribution protocol, such as the BB84 protocol, the B92 protocol or the E91 protocol for the distribution of quantum key sequences. The number of quantum keys in the key pool can be set as required.

[0044] Step S2. The first participant selects a first quantum key from the first key pool, and encrypts its own identity information, the identity information of the second participant, and an index value corresponding to the firs...

Embodiment 2

[0060] Such as Figure 4 As shown, in order to further improve the security of communication, the present invention also sets the updating and destroying steps of the key, specifically including:

[0061] Step S6. Set the key update time. When the update time is reached, the first participant and the second participant share the new quantum key and the corresponding index value, respectively adding to their respective key pools , and destroy the expired quantum keys and corresponding index values ​​in their respective key pools.

[0062] Wherein, the update time is set synchronously when the key is generated, and each key can be set individually, or a common update time can be set for multiple keys. Regardless of the setting method, when performing an update operation, the generation of a new key and the destruction of an old key must be performed simultaneously. If the key is in use when updating, the old key will be transferred to the cache database first, and when the par...

Embodiment 3

[0067] Such as Figure 5 As shown, in this example, considering that it is difficult to implement one-to-one key sharing and management each time, in order to facilitate the management of multiple communication participants, the following embodiments are provided, including:

[0068] Step S1. The first participating terminal and the second participating terminal share the quantum key and the corresponding index value, respectively establish the first key pool and the second key pool locally; the first participating terminal has several first slaves end; the second participating end has a plurality of second slave ends.

[0069] Step S2. The first slave transmits its own identity information and the identity information of the second slave to be communicated to the first participant; the first participant selects from the first key pool The first quantum key encrypts the identity information of itself, the identity information of the second participant, the identity informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum key management method and system based on a block chain, and the method comprises the steps: participants share a quantum key and a corresponding index value, and keypools are built; the first participant selects a quantum key from the key pools, encrypts identity information of the first participant and the second participant and an index value corresponding to the quantum key to obtain a first information block, transmits the first information block to the second participant and a key management center, and stores the first information block in a private block chain; the second participant decrypts the first information block, searches the quantum key according to the index value, encrypts the identity information of the second participant and the firstparticipant and the index value corresponding to the quantum key to obtain a second information block, transmits the second information block to the key management center, and stores the second information block in the private block chain; and the key management center stores the first information block and the second information block in a public block chain. In the use process of recording the key by using the block chain, the correctness, integrity, timeliness and traceability of an operation track record are ensured, and the supervision and traceability of the quantum key in the full lifecycle are realized.

Description

technical field [0001] The present invention relates to cryptography applications, in particular to a blockchain-based quantum key management method. Background technique [0002] Quantum cryptography is the product of the combination of quantum mechanics and classical cryptography. It is an upstart in the field of information security and a hot research and application hotspot. The basic principles of quantum mechanics guarantee its security, which can theoretically provide unconditional security. The proposal of the QKD protocol enables both parties to communicate to generate and share a random, secure key to encrypt and decrypt messages. As a result, quantum cryptography is more and more applied to the security field. The quantum key is generated through a series of operations between the two parties after the two parties establish communication. Its generation process is its transmission process. Using the characteristics of quantum mechanics, both parties can generat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0819H04L9/0891H04L9/50
Inventor 张仕斌昌燕代金鞘郑涛闫丽丽
Owner 唐发明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products