Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

44 results about "BB84" patented technology

BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure, relying on the quantum property that information gain is only possible at the expense of disturbing the signal if the two states one is trying to distinguish are not orthogonal (see no-cloning theorem) and an authenticated public classical channel. It is usually explained as a method of securely communicating a private key from one party to another for use in one-time pad encryption.

Quantum secret data chain communication system

ActiveCN110247765ACapable of monitoringHave a certain defensive abilityKey distribution for secure communicationPhotonic quantum communicationCommunications systemKey issues
The invention discloses a quantum secret data link communication system, which comprises two identical quantum secrecy devices, each quantum secrecy device comprises quantum key generation equipment, a key management control server and a plurality of secrecy terminals, wherein each key management control server is bound with a plurality of confidential terminals; the two pieces of quantum key generation equipment are used for transmitting the partial normal single light quantum through a channel, operating a BB84 protocol and generating symmetrical quantum keys; putting into respective key pools; then respectively issuing to the secret key management control servers which are respectively connected with the server; the key management control server is used for receiving and verifying the quantum key issued by the key pool and then distributing the quantum key to a plurality of bound confidential terminals; and the security terminal is used for establishing a binding connection with the key management control server through a built-in authentication key, and receiving and storing the quantum key. The system disclosed by the invention has the advantages of high security, high independence, and convenience, rapidness and simplicity in deployment.
Owner:湖北凯乐量子通信光电科技有限公司

Quantum key distribution eavesdropping judgment method based on BB84 protocol

ActiveCN105743882ADifferentiate sources of errorImprove transmission efficiencyKey distribution for secure communicationSkew normal distributionMatrix normal distribution
The invention discloses a quantum key distribution eavesdropping judgment method based on a BB84 protocol, and mainly aims to solve the safety problem in quantum encryption caused by non-ideal devices and imperfect experimental conditions. According to the technical scheme, the method comprises the following steps: the overall probability distribution of photon number in a received pulse sequence is judged according to the Poisson distribution followed by the number of photons in sent pulses and the Poisson distribution or normal distribution satisfied by the number of retransmitted photons after an eavesdropper intercepts part of photons; the source of received information error is judged according to the overall probability distribution of photon number; if the overall probability distribution of photon number is damaged, that the information error is from an eavesdropping attack is judged, legitimate participants believe that the communication is unsafe and cancel the communication; or, that the information error is from a non-ideal channel is judged, and legitimate participants adjust the parameters of the non-ideal channel to reduce information error. The method improves the efficiency and safety of quantum key distribution, and can be used in the BB84 protocol.
Owner:XIDIAN UNIV

Quantum-based content centric network privacy protection method

ActiveCN113346996ATroubleshoot secure distribution issuesWith absolute privacyKey distribution for secure communicationCiphertextConfidentiality
The invention provides a quantum-based content centric network privacy protection method, which comprises the following steps of: encrypting and aggregating a classical ciphertext by using an ELGamal algorithm: generating a main public key according to public and private key pairs generated by all participants, generating a ciphertext according to plaintext information of the participants, sending the ciphertext to a cloud server, aggregating according to the ciphertext to obtain an aggregated ciphertext, and generating a classic message to be shared according to the aggregated ciphertext; in the quantum encryption stage, in all interaction processes with the cloud server, enabling a data owner to convert classic information into quantum information and negotiate a shared key with the cloud server through a BB84 key negotiation protocol, wherein each data person encrypts the quantum information by using the shared key; and detecting the eavesdropping behavior through adoption of a method of randomly inserting the decoy particles, so that the safety has double assurance. According to the method, confidentiality of sensitive content exchange between a publisher and a user is guaranteed, the method can be effectively executed under the condition that any privacy information is not leaked, and the content can be safely shared and aggregated.
Owner:ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY

IPv6 network node data security transmission method

The invention discloses an IPv6 network node data security transmission method. The IPv6 network node data security transmission method comprises the following steps of: a network node A sends an encrypted communication request packet to a network node B according to a routing path order; the network node B performs key sharing on key data K with the network node A through a key relay path consistent with the routing path; the network node A performs combinatorial computing on the key data K, the IP address of the network node A, and the IP address of the network node B to obtain a new key K<AB>; and the network node A encrypts the data to be sent by using the new key K<AB>. The IPv6 network node data security transmission method uses the BB84 protocol to perform quantum key distribution,and the key generated by a quantum key distribution terminal is transmitted to a router, which is more secure than a traditional cryptosystem; moreover, the new key K<AB> is calculated through a combined operation mode, therefore, the key utilization and encryption security are improved; and the data security problem of the IPv6 network node can be effectively solved, and the economic loss of thesociety and an individual caused by leakage of network data is reduced.
Owner:ANHUI QASKY QUANTUM SCI & TECH CO LTD

Quantum key distribution networking system and quantum key distribution method

The invention discloses a quantum key distribution networking system and a quantum key distribution method. The system comprises a first quantum state preparation sending end, a second quantum state preparation sending end and a measurement end. The quantum state preparation comprises a light source, an intensity modulator, a phase encoder and an adjustable attenuator; the phase encoder is used for modulating each light pulse according to a target phase encoding mode, so that each light pulse is divided into two pulses with target delay, and the phase difference of the two pulses is modulated; a phase decoder in the measuring end is used for modulating the phase difference of the two pulses; and the polarization controller modulates the polarization state of the light quantum input by the first optical fiber channel when the first target protocol mode is executed. The phase difference between the two pulses is modulated through the phase decoder, so that the difference between the MDI protocol and the BB84 protocol in coding and detection is eliminated. The compatibility of the MDI protocol and the BB84 protocol in the same system is realized, and the practicability of the quantum key distribution network is improved.
Owner:UNIV OF SCI & TECH OF CHINA

Quantum key distribution coding device

A quantum key distribution encoding device comprises a polarization interferometer, a first phase modulator, a second phase modulator and a polarization beam splitting module, and a port a of the polarization beam splitting module is an input port of the encoding device; a port b of the polarization beam splitting module and a port A of the polarization interferometer are respectively connected with an input port of the first phase modulator and an output port of the first phase modulator, and a port c of the polarization beam splitting module and a port B of the polarization interferometer are respectively connected with an input port of the second phase modulator and an output port of the second phase modulator to form a Sagnac ring. Compared with the prior art, six polarization states can be stably prepared, multiple lasers are not needed, safety loopholes caused by inconsistent wavelengths of the multiple lasers are eliminated, the prepared polarization states are very stable, any compensation is not needed, a receiving end only needs two single-photon detectors, and the complexity and cost of the system are reduced. In addition, the polarization coding device can be used for realizing a BB84 protocol, a 6-state protocol and a reference system independent protocol.
Owner:北京中科国光量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products