Quantum-based content centric network privacy protection method

A content-centric network and privacy protection technology, applied to key distribution, can solve problems such as insecure transmission channels, inability to perform ciphertext analysis, qubit copying and storage, etc.

Active Publication Date: 2021-09-03
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the technical problems of insecure transmission channels and easy leakage of privacy when sharing data, the present invention proposes a quantum-based content-centric network privacy protection method, combined with the CCN architecture, proposes quantum-based CCN content sharing and aggregation solution, the use of quantum cryptography can cleverly use the quantum state non-cloni

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum-based content centric network privacy protection method
  • Quantum-based content centric network privacy protection method
  • Quantum-based content centric network privacy protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0102]Quantum cryptography was first proposed by Brassard and Benett in the 1970s. In quantum cryptography, the most striking feature is that these indivisible quantum and entangled states are directly constrained by quantum mechanics. Therefore, some basic theorems in quantum mechanics play a vital role in the field of quantum cryptography, these theorems include:

[0103] (1) It is impossible to obtain information from quantum states encoded in non-orthogon...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a quantum-based content centric network privacy protection method, which comprises the following steps of: encrypting and aggregating a classical ciphertext by using an ELGamal algorithm: generating a main public key according to public and private key pairs generated by all participants, generating a ciphertext according to plaintext information of the participants, sending the ciphertext to a cloud server, aggregating according to the ciphertext to obtain an aggregated ciphertext, and generating a classic message to be shared according to the aggregated ciphertext; in the quantum encryption stage, in all interaction processes with the cloud server, enabling a data owner to convert classic information into quantum information and negotiate a shared key with the cloud server through a BB84 key negotiation protocol, wherein each data person encrypts the quantum information by using the shared key; and detecting the eavesdropping behavior through adoption of a method of randomly inserting the decoy particles, so that the safety has double assurance. According to the method, confidentiality of sensitive content exchange between a publisher and a user is guaranteed, the method can be effectively executed under the condition that any privacy information is not leaked, and the content can be safely shared and aggregated.

Description

technical field [0001] The invention relates to the technical field of privacy protection, in particular to a quantum-based content-centric network privacy protection method. Background technique [0002] Recently, Cisco released a report predicting that by 2022, the IP traffic flowing through the global network will exceed the sum of traffic in all 32 years from the first year of the Internet to the end of 2016. Among them, most of the traffic will originate from content acquisition applications. It is estimated that by 2025, IP video traffic alone will account for 82% of all IP traffic (commercial and consumer), and traffic generated by consumer-driven digital video content will continue to grow at a high rate in the next few years. In order to adapt to changes in future traffic trends, researchers must provide native support for scalable and efficient content acquisition from the network system, while enhancing network support for mobility and security. Therefore, the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0844H04L9/0852H04L63/1491
Inventor 张建伟吴作栋孙海燕蔡增玉朱亮梁树军崔梦梦彭中原贺倩倩
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products