Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain-based quantum key management method and system

A technology of quantum key and management method, which is applied in the field of quantum key management based on blockchain, can solve the problems of key update, difficult implementation of supervision, and less research content, so as to protect security, ensure correctness, The effect of ensuring safety

Active Publication Date: 2021-03-16
唐发明 +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are many related researches in the field of quantum key generation, but there are very few researches on other aspects.
If the traditional key management scheme is used, it will be very difficult to implement the entire key update and supervision in the case of large-scale data traffic and large-scale device interconnection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain-based quantum key management method and system
  • A blockchain-based quantum key management method and system
  • A blockchain-based quantum key management method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Such as figure 1 As shown, a quantum key management method based on the block chain includes the following steps:

[0042] Step S1. The first reference end and the second participating end share quantum key and the corresponding index value, the first key pool and the second key pool are established locally.

[0043] In the present invention, the first participating end and the second participating end are shared by the quantum key sequence through the Qkd device, and the QKD device can use the international quantum key distribution protocol, such as the BB84 protocol, B92 protocol or E91. The protocol is to carry out the distribution of quantum key sequences. The number of quantum keys in the key cell can be set as needed.

[0044] Step S2. The first reference end selects a first quantum key in the first key pool, encrypts the index value corresponding to the first quantum key to the first quantum key. , Obtain the first information block; separate the first information b...

Embodiment 2

[0060] Such as Figure 4 As shown, in order to further improve the security of communication, the present invention also provides a key update and destruction step, including:

[0061] Step S6. Set the key update time, when the update time is reached, the first participating end share the new quantum key and the corresponding index value, and will give a new quantum separately The key is added to the corresponding index value into the respective key pool, and destroy the quantum key and the corresponding index value in each key pool.

[0062] The update time is the synchronization setting when the key generation is generated, and each key can be set separately, or multiple keys can be set together. Regardless of the installation mode, when the update operation is performed, the generation of the new key is in synchronous with the destruction of the old key. If the key is in use when the update is used, the old key is transferred to the cache database. When the participating end re...

Embodiment 3

[0067] Such as Figure 5 As shown in this example, considering a one-to-one key sharing and management implementation is large, in order to facilitate managing multiple communication participants, the following embodiments include:

[0068] Step S1. The first participation end and the second participating end shared quantum key and the corresponding index value, establish a first key pool and a second key pool locally; the first participating end sets a number of first From the standby end; the second participating end sets a number of second slave devices.

[0069] Step S2. The first slave terminal transmits its own identity information and the identity information of the second slave attemption of the proposed communication to the first reference end; the first reference end is from the first key pool. The first quantum key is selected, and the identity information of the self, the identity information of the second reference end, the identity information of the first slave termi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a blockchain-based quantum key management method and system. The method includes: participants share quantum keys and corresponding index values, and respectively establish key pools; the first participant selects from the key pool The quantum key encrypts the identity information of itself and the second participant and the index value corresponding to the quantum key to obtain the first information block, which is passed to the second participant and the key management center, and stored in the private blockchain; the second The participating end decrypts the first information block, searches for the quantum key according to the index value, encrypts the identity information of itself and the first participating end and the index value corresponding to the quantum key to obtain the second information block, transmits it to the key management center, and stores it in the private In the block chain; the key management center stores the first and second information blocks in the public block chain. Use the blockchain to record the use process of the key to ensure the correctness, completeness, timeliness and traceability of the operation track record, and realize the supervision and traceability of the quantum key throughout its life cycle.

Description

Technical field [0001] The present invention relates to a cryptographic application, and more particularly to a quantum key management method based on the block chain. Background technique [0002] Quantum cryptography is a product of quantum mechanics and classic cryptography, which is a new and research application hotspot in the field of information security. The basic principles of quantum mechanics ensure their safety, theoretically provide unconditional safety. The Qkd protocol proposed, making the two parties of communication to generate and share a random, secure key to encrypt and decrypt messages. This quantum cryptography is increasingly applied to the security field. After the quantum key is established in both parties, it is generated by a series of operations of both parties. Its generation process is its transfer process, using quantum mechanics characteristics, can make both parties to generate a string random number in their respective hands, and do not need to s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/0819H04L9/0891H04L9/50
Inventor 张仕斌昌燕代金鞘郑涛闫丽丽
Owner 唐发明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products