Model and method for user authentication for quantum key distribution network
A quantum key distribution and network technology, applied in the field of quantum key distribution, can solve problems such as limited experimental conditions, inability to accurately clone quantum states, and difficulty in realizing entangled states.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. It should be understood that the specific examples described here are only used to explain the present invention, not to limit the present invention.
[0021] This example is a multi-user-based network model, and identity authentication needs to be performed between any two users in the network. Under the model and method designed by the present invention, any two communication users in the network can successfully complete the distribution of the pre-shared authentication key and the establishment of the secure quantum channel.
[0022] The completion of user identity authentication is based on the user obtaining the pre-shared key. A secure quantum channel can be established between any two nodes in the network. Take Alice and Bob as an example. A...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com