Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity anti-counterfeiting system based on quantum key and application thereof

An identity anti-counterfeiting and quantum technology, applied in the field of identity anti-counterfeiting systems based on quantum secret keys, can solve the problems that non-orthogonal qubits cannot be accurately measured at the same time, cannot detect counterfeit behavior of both communication parties, and communication is insecure, achieving high security , Guaranteed confidentiality and strong anti-interference performance

Pending Publication Date: 2021-10-12
合肥金瀚科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the distribution of quantum keys, non-orthogonal qubits have quantum properties that cannot be accurately measured at the same time. Although this property has the ability to actively detect eavesdroppers and interference, it cannot detect counterfeiting behaviors between the two communicating parties.
Therefore, it is possible that all communication information is intercepted by attackers, resulting in insecure communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity anti-counterfeiting system based on quantum key and application thereof
  • Identity anti-counterfeiting system based on quantum key and application thereof
  • Identity anti-counterfeiting system based on quantum key and application thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026]In describing the present invention, it is to be understood that the terms "opening", "upper", "lower", "thickness", "top", "middle", "length", "inner", "surrounding" etc. Indicating orientation or positional relationship is only for the convenience of describing the present invention and simplifying the description, and does not indicate or imply that the components or elements referred to must have a specific orientation, be constructed and operated in a spe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity anti-counterfeiting system based on a quantum secret key and application thereof. The system comprises a main server S0, the server is in signal connection with n sub-servers Si (i belongs to 1, 2,..., n), each sub-server is provided with m (m > n) clients Cij (i belongs to 1, 2,..., n, j belongs to 1, 2,..., m), the main server S0 and the sub-servers Si share K entangled state particle pair sequences P, and the K entangled state particle pairs T are shared between the sub-server Si and the client Cij. According to the method, the lower level sends one particle in the EPR entanglement pair to the upper level, the other particle is reserved, an eavesdropper cannot obtain information of the whole EPR entanglement pair from one particle, during user authentication, a counterfeit client cannot know a secret key string between clients, particle measurement cannot be carried out according to a measurement base corresponding to a shared string, and therefore, the anti-counterfeiting effect is achieved.

Description

technical field [0001] The invention relates to the field of quantum communication, in particular to an identity anti-counterfeiting system based on a quantum secret key and its application. Background technique [0002] Quantum cryptography is based on quantum computing and is an emerging subject combining quantum mechanics and cryptographic communication. At present, the study of quantum cryptography has aroused widespread interest, and important progress has been made in both theory and practice. Quantum key sharing is an important direction of quantum cryptography research. Using the properties of Bell entangled states, the characteristics of quantum error correction codes, and the properties of continuous variable qubits and other quantum properties, people have designed a series of quantum key sharing schemes. [0003] In the distribution of quantum keys, non-orthogonal qubits have quantum properties that cannot be accurately measured at the same time. Although this p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0858
Inventor 汪国航张炜丁晓光邓晓军
Owner 合肥金瀚科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products