Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data decryption method based on quantum shared key

A shared key and data encryption technology, which is applied in the field of secure communication, can solve the problems of cumbersome data encryption process, reduce encryption and decryption, etc., and achieve the effect of improving encryption efficiency and simple process

Inactive Publication Date: 2018-03-16
ZHEJIANG QUANTUM TECH CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to provide a data encryption method based on a quantum shared key to solve the problem that in the prior art, in the process of implementing digital envelope encryption communication on a quantum shared key network, firstly, two shared keys are negotiated to obtain a plurality of nodes to share The session key, and then the method of encrypting the data content through the session key and then transmitting it makes the data encryption process cumbersome and greatly reduces the efficiency of encryption and decryption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data decryption method based on quantum shared key
  • Data decryption method based on quantum shared key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] In the quantum key network, there is a shared quantum key (symmetric key) between any two points, and the network can carry out point-to-point and multi-point information transmission.

[0038] Such as figure 1 As shown, user A wants to send an email to four users B, C, D, and E. The sender can use the quantum random number generator to generate the encryption key R for encrypting the email content, and use the key R to encrypt the email to form the email ciphertext X. Then the sender uses the quantum keys (symmetric keys) K1, K2, K3, and K4 shared with B, C, D, and E to encrypt the mail encryption key R respectively to form key ciphertexts C1, C2, C3, C4, sender A then organizes C1, C2, C3, C4, X according to a certain format and sends them to each receiver B, C, D, E, receivers B, C, D, E respectively according to their own and sending Party A’s shared quantum keys K1, K2, K3, and K4 decrypt key ciphertexts C1, C2, C3, and C4, decrypt the email encryption key R, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A data encryption method based on a quantum shared key. The data sender generates a symmetric content encryption key Rs through a quantum random number generator; the content encryption key Rs of the sender is encrypted with the key Rc shared with the receiver to form an The key-encapsulated ciphertext C; the sender uses the content encryption key Rs to encrypt the data content to form the content ciphertext X; the sender packs the key-encapsulated ciphertext C and the content ciphertext X and sends it to the receiver, and the receiver uses the key The Rc decryption key encapsulates the ciphertext C to obtain the content encryption key Rs, and then uses Rs to decrypt the content ciphertext X to restore the data content. Compared with the prior art, the sending end of the present invention encrypts data content with a local content encryption key, encrypts the content encryption key with a key shared with the receiving end, and encrypts data with a content encryption key. Compared with using a shared key The method for directly encrypting the data content and then transmitting it does not need to encrypt the data content multiple times for the point-to-point communication, thereby improving the encryption efficiency.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to a data encryption method based on a quantum shared key. Background technique [0002] The digital envelope is a technology that comprehensively utilizes the advantages of both symmetric encryption technology and asymmetric encryption technology to carry out information security transmission. The digital envelope not only takes advantage of the fast speed and good security of the symmetric encryption algorithm, but also takes advantage of the convenient key management of the asymmetric encryption algorithm. In the digital envelope, the information sender uses a symmetric key to encrypt the content of the information, and then encrypts the symmetric key with the receiver's public key (this part is called a digital envelope), and sends it together with the encrypted information To the recipient, the recipient first uses the corresponding private key to open the digital...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0852H04L9/085
Inventor 於建江曹文钊
Owner ZHEJIANG QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products