Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Semi-quantum technology based two-party key negotiation method and system

A key agreement, semi-quantum technology, applied in transmission systems, digital transmission systems, key distribution

Active Publication Date: 2018-06-15
CHENGDU UNIV OF INFORMATION TECH
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Finally, both the first negotiated key user and the second negotiated key user generate the same session key The problem in this scheme is that since the first negotiating key user is learning the second negotiating key user’s key information r b After that, only the secret key information r is published a
[0011] The difficulty of solving this problem is: technology guarantees that the key is jointly and fairly negotiated by the two parties in communication, and any party in the agreement cannot decide alone or know the final key before the other party in advance; and the existing technology does not solve the problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semi-quantum technology based two-party key negotiation method and system
  • Semi-quantum technology based two-party key negotiation method and system
  • Semi-quantum technology based two-party key negotiation method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0102] See figure 1 , this embodiment includes two parties who negotiate the key, the first negotiated key user and the second negotiated key user, and a semi-trusted third party and a semi-trusted third party.

[0103] The semi-trusted third party sends the particle sequence to the first negotiated key user and the second negotiated key user respectively, and the first negotiated key user and the second negotiated key user randomly select one of the two operations of Measure and Reflect implement.

Embodiment 2

[0105] See figure 2 , the using method of embodiment 1, comprises the following steps:

[0106] 1) If it is listening to detect particles.

[0107] Both the first negotiated key user and the second negotiated key user perform Measure, and the semi-trusted third party also performs single event measurement, and finds the listener according to the measurement results of the three parties.

[0108] Both the first negotiated key user and the second negotiated key user execute Reflect, and the semi-trusted third party conducts GHZ joint measurement of the two received particles and the corresponding particle in its own hands, and finds the listener according to the measurement results.

[0109] The first negotiating key user and the second negotiating key user execute Measure and Reflect respectively, then the semi-trusted third party conducts Belkey ​​joint measurement of the reflected particles and the particles at the corresponding positions in their own hands, and finds the l...

Embodiment 3

[0112] See image 3 , the usage method of embodiment 1, 2, if the listener wants to obtain complete information, the probability of being detected is 0.75%.

[0113] The present invention needs to be executed in a quantum communication network environment, so the participating computers have quantum functions, and a quantum network is required for transmission.

[0114] In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented wholly or partly in the form of a computer program product, said computer program product comprises one or more computer instructions. When the computer program instructions are loaded or executed on the computer, the processes or functions according to the embodiments of the present invention will be generated in whole or in part. The computer needs to be equipped with a quantum device. The computer instructions may be stored in or transmitted from one computer-readab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of quantum technology based secure communication, and discloses a semi-quantum technology based two-party key negotiation method and system. Three users participatein execution of this protocol, wherein the users include two users who negotiate keys and a semi-trusted third party; the two users only need to have two basic quantum functions, specifically: measurement: using a classical base {|0), |1)} to measure a quantum, generating a new quantum |0) or |1), and sending the new quantum out; reflection: directly sending the quantum to a sender without any modification after the quantum is received. The third party has advanced quantum functions, can prepare quantum states, can use various bases to measure quantum states, and have a quantum storage function. The invention discloses a semi-quantum technology based two-party key negotiation system at the same time. The protocol proposed by the invention is a quantum technology based two-party key agreement protocol, and the fairness of the protocol is also satisfied under the premise of ensuring the absolute security of the key.

Description

technical field [0001] The invention belongs to the field of secure communication based on quantum technology, in particular to a two-party key agreement method and system based on semi-quantum technology. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] With the development of quantum technology, my country has built a 2,000-kilometer-long Beijing-Shanghai quantum communication trunk line, the metropolitan optical fiber quantum communication technology has matured, and the quantum communication network has entered the practical application stage from the laboratory research stage. Quantum cryptography is an emerging subject combining quantum physics and cryptography. It is a new cryptographic system that uses quantum physics methods to realize cryptographic ideas. Classical cryptography is based on mathematical theory, and its security is based on certain unproven mathematical assumptions, namely co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0852
Inventor 闫丽丽昌燕张仕斌林宏刚盛志伟韩桂华
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products