Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum key distribution method and system with bidirectional identity authentication function

A quantum key distribution and two-way identity authentication technology, applied in the field of network information, can solve the problems of difficult preparation, increased identity authentication costs, and many resources

Active Publication Date: 2019-02-12
CHENGDU UNIV OF INFORMATION TECH
View PDF12 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) In order to realize the update of the key, the previous identity authentication protocol has the problem of third party intervention, and defines a large number of parameters, the complexity of the authentication protocol is very high
[0007] (2) The quantum states used in many existing protocols are entangled states with more than three particles. However, the preparation of entangled states with more than three particles requires a lot of resources and is difficult to prepare. cost
[0008] (3) In many existing protocols, after the identity authentication protocol is completed, the string resources generated are not further utilized
[0016] Most of the existing identity authentication protocols do not further use the particles that have been distributed after the identity authentication is completed. After the identity authentication function is completed, the system uses the Pauli gate operation so that both communicating parties have the same key string

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key distribution method and system with bidirectional identity authentication function
  • Quantum key distribution method and system with bidirectional identity authentication function
  • Quantum key distribution method and system with bidirectional identity authentication function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] In the past, in order to realize the update of the key, there is a third-party intervention and a large number of parameters are defined in the authentication protocol. The complexity of the authentication protocol is very high.

[0050] The quantum states used in many existing protocols are entangled states with more than three particles. However, the preparation of entangled states with more than three particles requires a lot of resources and is difficult to prepare, which increases the cost of the identity authentication process.

[0051] Moreover, in many existing protocols, after the identity authentication pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network information and discloses a quantum key distribution method and system with a bidirectional identity authentication function. A communication participant uses a binary character string representing the user identity to carry out preparation of a Bell state; encoding and particle exchange are carried out according to a same convention; Bell-based measurement is finished so as to achieve entanglement exchange of the Bell-state particles; after a bitwise XOR operation is carried out, a Pauli gate operation is carried out on any side of bothsides of communication so that the particles in the hand are converted into the Bell-state particles the same as the particles on the opposite side; and both the sides of communication can obtain a same binary character string so as to finish the distribution of secret keys. The quantum key distribution method and system with a bidirectional identity authentication function in the invention improve the use ratio of resources produced during authentication of both the sides of communication; according to the agreement announced by both the sides of communication can identity authentication andkey distribution be realized without the intervention of a third side; the required quantum state is the Bell state of two particles; and the preparation is relatively easy.

Description

technical field [0001] The invention belongs to the technical field of network information, and in particular relates to a quantum key distribution method and system with a bidirectional identity authentication function. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Since the first quantum key distribution (QKD) protocol was proposed, quantum cryptography has been greatly developed in recent years. Compared with classical cryptography, quantum cryptography combines classical cryptography and quantum mechanics, and uses quantum effects to realize unconditionally secure information exchange. In order to meet the needs of the society for various practical security, researchers have proposed a large number of quantum cryptography protocols, mainly including quantum key distribution protocol (QKD), quantum direct secure communication (QSDC), quantum secret sharing (QSS), and quantum digital signature. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0852H04L63/0869
Inventor 张仕斌郑涛代金鞘李雪杨
Owner CHENGDU UNIV OF INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products