A blockchain-based quantum key management method and system
A technology of quantum key and management method, which is applied in the field of quantum key management based on blockchain, can solve the problems of key update, difficult implementation of supervision, and less research content, so as to protect security, ensure correctness, The effect of ensuring safety
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] Such as figure 1 As shown, a quantum key management method based on the block chain includes the following steps:
[0042] Step S1. The first reference end and the second participating end share quantum key and the corresponding index value, the first key pool and the second key pool are established locally.
[0043] In the present invention, the first participating end and the second participating end are shared by the quantum key sequence through the Qkd device, and the QKD device can use the international quantum key distribution protocol, such as the BB84 protocol, B92 protocol or E91. The protocol is to carry out the distribution of quantum key sequences. The number of quantum keys in the key cell can be set as needed.
[0044] Step S2. The first reference end selects a first quantum key in the first key pool, encrypts the index value corresponding to the first quantum key to the first quantum key. , Obtain the first information block; separate the first information b...
Embodiment 2
[0060] Such as Figure 4 As shown, in order to further improve the security of communication, the present invention also provides a key update and destruction step, including:
[0061] Step S6. Set the key update time, when the update time is reached, the first participating end share the new quantum key and the corresponding index value, and will give a new quantum separately The key is added to the corresponding index value into the respective key pool, and destroy the quantum key and the corresponding index value in each key pool.
[0062] The update time is the synchronization setting when the key generation is generated, and each key can be set separately, or multiple keys can be set together. Regardless of the installation mode, when the update operation is performed, the generation of the new key is in synchronous with the destruction of the old key. If the key is in use when the update is used, the old key is transferred to the cache database. When the participating end re...
Embodiment 3
[0067] Such as Figure 5 As shown in this example, considering a one-to-one key sharing and management implementation is large, in order to facilitate managing multiple communication participants, the following embodiments include:
[0068] Step S1. The first participation end and the second participating end shared quantum key and the corresponding index value, establish a first key pool and a second key pool locally; the first participating end sets a number of first From the standby end; the second participating end sets a number of second slave devices.
[0069] Step S2. The first slave terminal transmits its own identity information and the identity information of the second slave attemption of the proposed communication to the first reference end; the first reference end is from the first key pool. The first quantum key is selected, and the identity information of the self, the identity information of the second reference end, the identity information of the first slave termi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com