Quantum authentication method for access control among three essential elements for cloud computing

An access control and authentication method technology, applied in the field of collar security communication, can solve the problem of no secrets, etc., and achieve the effect of high communication efficiency and reliable security.

Active Publication Date: 2016-02-17
QINGDAO TECHNOLOGICAL UNIVERSITY
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

On the other hand, the data in cloud computing is confidential to users other than the data own...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum authentication method for access control among three essential elements for cloud computing
  • Quantum authentication method for access control among three essential elements for cloud computing
  • Quantum authentication method for access control among three essential elements for cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below in conjunction with accompanying drawing and embodiment the present invention will be further described:

[0035] In this embodiment, it is assumed that {|0>,|1>} is a set of orthogonal bases, denoted as C x ; {|i>,|j>} is a set of orthogonal basis, denoted as C y ;C x with C y The following relationship exists between the two:

[0036] | i > = 1 2 ( | 0 > + | 1 > ) | ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a quantum authentication method for access control among three essential elements for cloud computing. The three essential elements for cloud computing are a data owner Downer, a data user DUser and a cloud service provider CSP. The method comprises: setting the CSP and the DUser as an ERP (entangled pair) and enabling the CSP and the DUser to possess the same identity number legally, and performing mutual quantum authentication for the CSP and the DUser; setting the Downer and the CSP as an ERP and enabling the Downer and the CSP to possess the same identity number legally, and performing mutual quantum authentication for the Downer and the CSP; realizing successful quantum authentication among the Downer, the DUser and the CSP if the mutual quantum authentication between the CSP and the DUser and the mutual quantum authentication between the Downer and the CSP are successful; and quantum authentication among the Downer, the DUser and the CSP fails if the mutual quantum authentication between the CSP and the DUser and the mutual quantum authentication between the Downer and the CSP are not successful.

Description

technical field [0001] The invention relates to the field of collar security communication, in particular to a quantum authentication method for access control between three elements of cloud computing. Background technique [0002] Cloud computing is the growth, usage and delivery model of Internet-based related services, usually involving the provision of dynamically scalable and often virtualized resources over the Internet. Cloud is a metaphor for network, internet. In the past, the cloud was often used to represent the telecommunications network in the figure, and later it was also used to represent the abstraction of the Internet and the underlying infrastructure. Therefore, cloud computing can even allow you to experience the computing power of 10 trillion times per second. With such powerful computing power, you can simulate nuclear explosions, predict climate change and market development trends. Users access the data center through computers, notebooks, mobile ph...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32H04L29/08
CPCH04L9/0852H04L9/3273H04L67/10H04L9/08H04L9/32H04L65/40
Inventor 肖淑芬董玉民马鸿洋陈立波
Owner QINGDAO TECHNOLOGICAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products