Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum key negotiation method, quantum key negotiation system, quantum digital signature method and quantum digital signature system

A quantum key agreement and key technology, which is applied in quantum digital signature method, quantum key agreement method, and system fields, can solve the problems of low efficiency and lack of practicability of digital signatures, and achieve large-scale deployment, high efficiency and Practical, practical effect

Active Publication Date: 2022-03-25
NANJING UNIV +1
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Purpose of the invention: The present invention aims to overcome the defects of low efficiency and lack of practicability of digital signatures in the prior art, and propose a quantum key agreement method, system, quantum digital signature method, and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key negotiation method, quantum key negotiation system, quantum digital signature method and quantum digital signature system
  • Quantum key negotiation method, quantum key negotiation system, quantum digital signature method and quantum digital signature system
  • Quantum key negotiation method, quantum key negotiation system, quantum digital signature method and quantum digital signature system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] This embodiment exemplarily provides a quantum key agreement system, a sender A, a receiver B, and an untrusted relay R1.

[0053] The internal structure of the untrusted relay is as follows figure 1 As shown, it includes a first signal stabilization module 1-1, a second signal stabilization module 1-2, an interference module 1-3, a first detector 1-4, a second detector 1-5, and a main laser module 1-6 and beam splitting modules 1-7.

[0054] figure 1 Among them, the first signal stabilization module 1-1 and the second signal stabilization module 1-2 have the same function, and both are used to increase the interference stability of the quantum signal. In this embodiment, we choose dense wavelength division multiplexing (hereinafter referred to as DWDM), electronically controlled polarization controller (hereinafter referred to as EPC), polarization beam splitter and superconducting nanowire single photon detector (hereinafter referred to as SNSPD) to form this module...

Embodiment 2

[0072] In this embodiment, on the basis of the quantum key agreement system described in Embodiment 1, a quantum key agreement method is proposed, which specifically includes the following steps:

[0073] (1) Injection locking: the CW laser at the untrusted relay R1 is used as the main laser module 1-6, and the CW laser is generated as the seed light. The seed light is divided into two beams through the polarization maintaining beam splitter, and the two beams of seed light reach A and B respectively through the long-distance optical fiber channel. After the seed light reaches A and B, it is first amplified by EDFA, filtered by FBG through the circulator, and then filtered by DWDM, and then passed through EPC and polarization beam splitter. The transmission output port of the polarization beam splitter is connected to the circulator, and the reflection output port is connected to the The optical power meter adjusts the EPC according to the detection result of the optical power...

Embodiment 3

[0082] This embodiment further proposes a quantum digital signature method based on the key agreement method described in Embodiment 2, which method includes the following steps:

[0083] 1) A puts the S in his hand 1 and S 2 xor get

[0084] 2) A from S A Selecting the first key whose length is n is used to generate a hash function based on a linear feedback shift register;

[0085] 3) A obtains an n-bit random number locally, and uses the n-bit random number to generate an n-order irreducible polynomial in the GF(2) field.

[0086] First, each bit of the n-bit random number corresponds to the coefficient of each item in the polynomial except the highest term in turn to generate an n-order polynomial in the GF(2) field, and the coefficient of the highest term is 1. For example, the random number is (a n-1 , a n-2 ,...,a 1 , a 0 ), then the generated polynomial is p 1 (x)=x n +a n-1 x n-1 +…+a 1 x+a 0 . Preferably, only when a 0 =1, the generated polynomial m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum key negotiation method, a quantum key negotiation system, a quantum digital signature method and a quantum digital signature system. According to the key negotiation method, an untrusted relay is introduced to serve as a third party, interference measurement is carried out on a coherent state and reference light sent by a sending end and a receiving end, and a phase plate difference value PR of a sending party and a receiving party is determined; constructing a calculation model based on the PR, and determining a flip processing mode of the receiver on the held bit string according to the measurement result of the untrusted relay and the calculation result of the calculation model; and finally, the sender and the receiver perform parameter estimation, error correction and privacy amplification based on the held bits to obtain keys of the sender and the receiver. The security of the key negotiation method is irrelevant to the measurement equipment, and the security of the generated key can also be ensured in the presence of an untrusted third party. In the signature method, a Toeplitz matrix is generated by using the key obtained by the key negotiation method, a digital signature can be generated for a message with the longest 264 bits, and the method has very high efficiency and practicability.

Description

technical field [0001] The invention relates to the field of quantum communication, in particular to a quantum key agreement method, a system, a quantum digital signature method, and a system. Background technique [0002] Quantum Key Agreement (QKA) is an important branch of quantum cryptography and quantum information technology. It is different from traditional Quantum Key Distribution (QKD). In Quantum Key Agreement (QKA), the participation of the agreement Participants need to fairly establish a set of random keys based on mutual information interaction, that is, each participant should contribute a part of his influence to the final established key. In other words, the final key established in the QKA protocol cannot be determined by any non-trivial subset of protocol participants. Therefore, QKA not only needs to ensure the security of the key, but also needs to ensure the fairness of the key. In this case, the generated key needs to be generated in a trusted environ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0855H04L9/0838
Inventor 尹华磊李晨龙富尧
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products