Quantum encryption method for realizing safety communication

A technology of quantum encryption and secure communication, which is applied in the field of quantum encryption to realize secure communication. It can solve the problems of uncontrollable quantum key transmission content and poor encryption protocol security, and achieve the effect of loose coupling and clear functions.

Inactive Publication Date: 2003-10-08
ZTE CORP
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The technical problem to be solved by the present invention is to provide a quantum encryption method for secure communication, which is used to effectivel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum encryption method for realizing safety communication
  • Quantum encryption method for realizing safety communication
  • Quantum encryption method for realizing safety communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The quantum encryption method for realizing secure communication of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0031] The quantum encryption method of the present invention to realize secure communication utilizes the same channel configuration as the quantum key release method, combined with the classical encoding method, to realize content-controllable quantum secure communication, and its channel structure is the same as that of the quantum key release method, as shown in figure 1 shown. There are two channels required: classical channel and quantum channel, in figure 1 In , the thick horizontal line represents the classical channel, and the thin horizontal line represents the quantum channel.

[0032] figure 2 It is a schematic flow chart of the quantum key distribution method, which has been introduced in detail in the background technology, and will not be repeated here.

[0033] see below ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

First, the sender partitions the source bit stream. The fault tolerant coding and the error correction coding are carried out in partition level. The coded bit stream is mapped into photon sequence. The photon subsequence with certain length is transferred through quantum channels. The sending and the receiving parties validate whether the current quantum communication is intercepted by using the classical channel verification. If it is intercepted, the quantum channel is not safe and the sending is stopped. If not, the said step is continued till all sequence are sent. Then, the sending party announces the preparation radix for each partition and the receiving party recovers the source bit stream. The channel structure used in the invention is same as the structure used in the quantum secret key release technique.

Description

Technical field: [0001] The invention relates to the field of information encryption, in particular to a quantum encryption method for realizing safe communication. Background technique: [0002] Information security technology has a wide range of applications in traditional fields such as military affairs, diplomacy, commerce, and securities, as well as emerging fields such as e-commerce and virtual private networks. Protecting the security of proprietary information is related to personal private property, business secrets, normal trade order and even national security. The interactive nature of information determines that information security must be meaningful in a dynamic communication state, and this purpose is realized through communication encryption protocols. [0003] The current general communication encryption protocols are mainly divided into two types: key encryption and public key encryption. The so-called key agreement or public key agreement is for the enc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04K1/00H04L9/14
Inventor 侯越先
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products