Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method, system, device and storage medium based on super-secret encoding

A technology of identity authentication and ultra-dense coding, applied in the field of identity recognition, can solve the problems of consuming more physical resources, reducing practicability, and being difficult to prepare

Active Publication Date: 2022-03-04
HUNAN NORMAL UNIVERSITY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the current research on quantum identity authentication generally needs to prepare quantum entangled states such as Bell state, GHZ state, and GHZ-like state to complete identity authentication. For example, the scheme proposed in the prior art uses Bell state or multi-particle The entanglement characteristics of the entangled state complete identity authentication, but the preparation of the entangled state requires more physical resources than the preparation of single photons, and it is not easy to prepare under the existing optical technology, nor can it be completely measured. These technical obstacles make The practicability of preparing entangled states to complete identity authentication is greatly reduced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system, device and storage medium based on super-secret encoding
  • Identity authentication method, system, device and storage medium based on super-secret encoding
  • Identity authentication method, system, device and storage medium based on super-secret encoding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to make the objects, technical solutions and advantages of the present application, the present application will be described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are intended to explain the present application and is not intended to limit the present application.

[0061] In one embodiment, if figure 1 As shown, an identity authentication method based on hyperdere encoding is provided, the method comprising:

[0062] Step 101, the user A and the user B receive and share a shared key Key with a length of 2N by a quantum key distribution protocol.

[0063] Step 102, according to the shared key Key, User A Prepare Bell gematuring particle pair sequence Each of the two bits in the shared key KEY corresponds to a Bell gematuring particle;

[0064] Step 103, user A Popular sequence in a Bell state particle sequence Send User B, sequence of particles Send to use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to an identity authentication method, system, device and storage medium based on ultra-secret codes. The method includes: user A and user B respectively obtain and share a shared key Key with a length of 2n through the quantum key distribution protocol; according to the shared key Key, user A prepares a Bell state entangled particle pair sequence, and the shared key Key Every two bits in the entanglement particle correspond to a Bell state entangled particle; user A sends the particle sequence in the Bell state particle sequence to user B, and sends the particle sequence to user C; according to the ultra-dense encoding of the particle sequence and particle sequence, user C User A and user B perform mutual identity authentication. The present invention completes mutual identity verification between two users through quantum ultra-dense coding and third-party measurement; performs identity authentication based on the ultra-dense coding of the Bell entangled state, and saves quantum entanglement resources under the premise of a certain verification key length .

Description

Technical field [0001] The present application relates to the field of identification, and in particular, there is an identity authentication method, system, device, and storage medium based on hyperdeal coding. Background technique [0002] Identity authentication is a process of verifying each user identity in communication, making it a good way to prevent illegal users from pretending to communicate with legal users. The safety of classic identity authentication is generally the complexity of the mathematical algorithm. Therefore, their security will be threatened in the quantum computer age. [0003] At present, although a series of studies have been carried out around identity certification, there are still some shortcomings. First, the efficiency of identity authentication is not high, and the current authentication is mostly one-on-one model, that is, each user is independently certified. In many scenarios, most users may be certified, and the efficiency of a pair of model...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04B10/70
CPCH04L9/3273H04L9/32H04L9/0852H04L9/0819H04B10/70
Inventor 娄小平
Owner HUNAN NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products