Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device, terminal device and system for generating shared key

A shared key and secret key technology, which is applied in the electronic field, can solve the problems of affecting the output of quantum key quantity, unable to generate quantum key, insufficient key distribution, etc.

Active Publication Date: 2017-03-01
ALIBABA GRP HLDG LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the currently proposed quantum key distribution protocol negotiates the shared key based on the bit error rate. In large-scale business scenarios, there is a problem of insufficient key distribution. At the same time, the shared key for quantum key agreement is affected by external interference factors. It is relatively large, and it is necessary to rely on the bit error rate to determine the output of the quantum key. Therefore, because there is no effective bit error rate estimation method, it will affect the output of the quantum actual key quantity. At present, the domestic bit error rate is greater than 7%. Above, the quantum key cannot be generated, and the bit error rate tolerance rate in Japan is the highest abroad, but the key cannot be generated if it exceeds 11%.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, terminal device and system for generating shared key
  • Method, device, terminal device and system for generating shared key
  • Method, device, terminal device and system for generating shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0174] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0175] This application provides a method for generating a shared key at the sending end, a device for generating a shared key at the sending end, and a terminal device for generating a shared key at the sending end, and a terminal device for generating a shared key at the receiving end. A method for generating a shared key at a receiving end, a device for generating a shared key at a receiving end, a terminal device for generating a shared key at a receiving end, and a system for generating a shared key, which are co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for a transmitting end to generate a shared key. The method includes the following steps that: a key negotiation connection is built between the transmitting end and a receiving end; the transmitting end and the receiving end negotiate with each other through the key negotiation connection so as to determine an algorithm code; an algorithm corresponding to the algorithm code is queried in a pre-stored algorithm library; and a pre-stored seed key is calculated according to the algorithm, so that a shared key can be obtained. Compared with a traditional key generation method, especially a quantum key generation method, the method of the invention determines the algorithm code through negotiation, and then inquires the pre-stored algorithm corresponding to the algorithm code, and calculates and generates the new shared key by using the generated seed key, and therefore, the problem of the high bit error rate of the traditional quantum key generation method can be avoided, a key generation success rate is high, and the requirements of large-scale business can be satisfied.

Description

technical field [0001] This application relates to the field of electronic technology, specifically a method, device and terminal device for generating a shared key at the sending end, a method, device and terminal device for generating a shared key at the receiving end, and a The system used to generate the shared secret. Background technique [0002] In cryptography, private key cryptography and public key cryptography are used to ensure the security, integrity, non-repudiation and resistance to identity masquerading attacks of identity information in communication. In the public key infrastructure, the digital signature technology based on the public key cryptography mechanism is mainly used to realize identity authentication. Typical digital signature algorithms include RSA algorithm, ECC algorithm, DSA algorithm, EIGamal algorithm, etc. These algorithms are based on computational complexity. The security of the classical authentication system, which has the risk of bei...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/14H04L63/061H04L9/0838H04L9/0852H04L9/0869
Inventor 原鹏付颖芳刘少杰王志强
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products