Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device, terminal device and system for generating shared key

A shared key and secret key technology, which is applied in the electronic field, can solve the problems of affecting the output of quantum key quantity, unable to generate quantum key, insufficient key distribution, etc.

Active Publication Date: 2020-02-07
ALIBABA GRP HLDG LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the currently proposed quantum key distribution protocol negotiates the shared key based on the bit error rate. In large-scale business scenarios, there is a problem of insufficient key distribution. At the same time, the shared key for quantum key agreement is affected by external interference factors. It is relatively large, and it is necessary to rely on the bit error rate to determine the output of the quantum key. Therefore, because there is no effective bit error rate estimation method, it will affect the output of the quantum actual key quantity. At present, the domestic bit error rate is greater than 7%. Above, the quantum key cannot be generated, and the bit error rate tolerance rate in Japan is the highest abroad, but the key cannot be generated if it exceeds 11%.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, terminal device and system for generating shared key
  • Method, device, terminal device and system for generating shared key
  • Method, device, terminal device and system for generating shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0174] In the following description, numerous specific details are set forth in order to provide a thorough understanding of the application. However, the present application can be implemented in many other ways different from those described here, and those skilled in the art can make similar promotions without violating the connotation of the present application. Therefore, the present application is not limited by the specific implementation disclosed below.

[0175] This application provides a method for generating a shared key at the sending end, a device for generating a shared key at the sending end, and a terminal device for generating a shared key at the sending end, and a terminal device for generating a shared key at the receiving end. A method for generating a shared key at a receiving end, a device for generating a shared key at a receiving end, a terminal device for generating a shared key at a receiving end, and a system for generating a shared key, which are co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present application provide apparatus and methods for generating a shared key, including setting up a key negotiation connection, and determining an algorithm code by negotiating using the key negotiation connection. An algorithm corresponding to the algorithm code is retrieved from a pre-stored algorithm library, and a pre-stored seed key is calculated using the algorithm to obtain a shared key. Compared with traditional key generation methods, embodiments of the present invention avoid the problem of a high bit error rate that occurs in the traditional quantum key generation methods, especially quantum key generation methods. One exemplary method determines an algorithm code through negotiation, retrieves a pre-stored algorithm corresponding to the algorithm code, and generates a new shared key using a seed key.

Description

technical field [0001] This application relates to the field of electronic technology, specifically a method, device and terminal device for generating a shared key at the sending end, a method, device and terminal device for generating a shared key at the receiving end, and a The system used to generate the shared secret. Background technique [0002] In cryptography, private key cryptography and public key cryptography are used to ensure the security, integrity, non-repudiation and resistance to identity masquerading attacks of identity information in communication. In the public key infrastructure, the digital signature technology based on the public key cryptography mechanism is mainly used to realize identity authentication. Typical digital signature algorithms include RSA algorithm, ECC algorithm, DSA algorithm, EIGamal algorithm, etc. These algorithms are based on computational complexity. The security of the classical authentication system, which has the risk of bei...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852H04L9/0869H04L9/14H04L63/061
Inventor 原鹏付颖芳刘少杰王志强
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products