Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, system and equipment based on super-dense coding and storage medium

A technology of identity authentication and ultra-dense coding, applied in the field of identity recognition, can solve the problems of consuming more physical resources, reducing practicability, and being difficult to prepare

Active Publication Date: 2022-01-07
HUNAN NORMAL UNIVERSITY
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the current research on quantum identity authentication generally needs to prepare quantum entangled states such as Bell state, GHZ state, and GHZ-like state to complete identity authentication. For example, the scheme proposed in the prior art uses Bell state or multi-particle The entanglement characteristics of the entangled state complete identity authentication, but the preparation of the entangled state requires more physical resources than the preparation of single photons, and it is not easy to prepare under the existing optical technology, nor can it be completely measured. These technical obstacles make The practicability of preparing entangled states to complete identity authentication is greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system and equipment based on super-dense coding and storage medium
  • Identity authentication method, system and equipment based on super-dense coding and storage medium
  • Identity authentication method, system and equipment based on super-dense coding and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0061] In one embodiment, such as figure 1 As shown, a method of identity authentication based on ultra-secret coding is provided, and the method includes:

[0062] Step 101, user A and user B respectively obtain and share a shared key Key with a length of 2n through the quantum key distribution protocol;

[0063] Step 102, according to the shared key Key, user A prepares a sequence of Bell state entangled particle pairs , every two bits in the shared key Key correspond to a Bell state entangled particle;

[0064] Step 103, user A puts the particle sequence in the Bell...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity authentication method, system and device based on super-dense coding and a storage medium. The method comprises the following steps: a user A and a user B respectively obtain and share a shared key Key with the length of 2n through a quantum key distribution protocol; according to a shared key Key, a user A prepares a Bell state entanglement particle pair sequence, and every two bits in the shared key Key correspond to one Bell state entanglement particle; the user A sends a particle sequence in the Bell state particle sequence to the user B and sends the particle sequence to the user C; According to the particle sequence and the super-dense code of the particle sequence, the user C performs mutual identity authentication on the user A and the user B. According to the invention, identity verification between two users is completed through quantum super-dense coding and third-party measurement; identity authentication is carried out according to the super-dense code of the Bell entangled state, and quantum entanglement resources are saved on the premise that the length of a verification key is certain.

Description

technical field [0001] The present application relates to the field of identity identification, in particular to an identity authentication method, system, device and storage medium based on ultra-encrypted codes. Background technique [0002] Identity authentication is a process of verifying the identity of each user in communication, and it is a very good method to prevent illegal users from impersonating legitimate users to communicate. The security of classical identity authentication generally depends on the complexity of mathematical algorithms. Therefore, their security will be threatened in the era of quantum computers. [0003] At present, although a series of researches on identity authentication have been carried out and fruitful results have been obtained, there are still some deficiencies. First of all, the efficiency of identity authentication is not high. At present, identity authentication is mostly a one-to-one model, that is, each user is independently au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04B10/70
CPCH04L9/3273H04L9/32H04L9/0852H04L9/0819H04B10/70
Inventor 娄小平
Owner HUNAN NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products