A quantum-based privacy protection method for content-centric networks

A content-centric network and privacy protection technology, applied in key distribution, can solve the problems of easy leakage of privacy, insecure transmission channel, and inability to analyze ciphertext, etc., to achieve the effect of ensuring integrity and privacy

Active Publication Date: 2022-07-12
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the technical problems of insecure transmission channels and easy leakage of privacy when sharing data, the present invention proposes a quantum-based content-centric network privacy protection method, combined with the CCN architecture, proposes quantum-based CCN content sharing and aggregation solution, the use of quantum cryptography can cleverly use the quantum state non-cloning theorem and the uncertainty theorem to achieve the purpose of preventing and detecting monitoring; the monitor is bound to be found when measuring, and the monitor cannot copy and save the qubit (if the monitor Therefore, even if there are infinite computing resources, it is impossible to perform effective ciphertext analysis, thereby achieving the purpose of protecting user privacy information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum-based privacy protection method for content-centric networks
  • A quantum-based privacy protection method for content-centric networks
  • A quantum-based privacy protection method for content-centric networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0101] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0102]Quantum cryptography was first proposed by Brassard and Benett in the 1970s. In quantum cryptography, the most striking feature is that these indivisible quantum and entangled states are directly bound by quantum mechanics. Therefore, some fundamental theorems in quantum mechanics play a crucial role in the field of quantum cryptography, these theorems include:

[0103] (1) It is impossible to obtain information from quantum st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention proposes a quantum-based content-centric network privacy protection method, the steps of which are as follows: encrypt and aggregate classical ciphertext by using the ELGamal algorithm; generate a master public key according to the public-private key pair generated by all participants; Generate the ciphertext and send it to the cloud server, aggregate the ciphertext to obtain the aggregated ciphertext, and generate the classical message to be shared according to the aggregated ciphertext; Quantum encryption stage: During all interactions with the cloud server, the data owner converts the classical information It generates quantum information, and negotiates a shared key with the cloud server through the BB84 key agreement protocol, and each data user uses it to encrypt the quantum information; it also detects eavesdropping behavior by randomly inserting decoy particles, making its security double-guaranteed . The present invention ensures the confidentiality of sensitive content exchanged between publishers and users, can be effectively executed without revealing any private information, and can safely share and aggregate content.

Description

technical field [0001] The invention relates to the technical field of privacy protection, in particular to a quantum-based content-centric network privacy protection method. Background technique [0002] Recently, Cisco released a report predicting that by 2022, the IP traffic flowing through the global network will exceed the total traffic of the entire 32 years from the first year of the Internet to the end of 2016. Among them, most of the traffic will come from content acquisition applications. IP video traffic alone is expected to account for 82% of all IP traffic (commercial and consumer) by 2025, and traffic generated by consumer-driven digital video content will continue to grow at a high rate for years to come. In order to adapt to the changing traffic trends in the future, researchers must provide native support for scalable and efficient content acquisition from the perspective of network architecture, while enhancing network support for mobility and security. T...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/40
CPCH04L9/0844H04L9/0852H04L63/1491
Inventor 张建伟吴作栋孙海燕蔡增玉朱亮梁树军崔梦梦彭中原贺倩倩
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products