Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A quantum key distribution method and system with two-way identity authentication function

A technology of quantum key distribution and two-way identity authentication, applied in the field of network information, can solve the problems of difficult preparation, no further use of particles, and many resources.

Active Publication Date: 2020-08-04
北京前进先锋科技发展有限公司
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) In order to realize the update of the key, the previous identity authentication protocol has the problem of third party intervention, and defines a large number of parameters, the complexity of the authentication protocol is very high
[0007] (2) The quantum states used in many existing protocols are entangled states with more than three particles. However, the preparation of entangled states with more than three particles requires a lot of resources and is difficult to prepare. cost
[0008] (3) In many existing protocols, after the identity authentication protocol is completed, the string resources generated are not further utilized
[0016] Most of the existing identity authentication protocols do not further use the particles that have been distributed after the identity authentication is completed. After the identity authentication function is completed, the system uses the Pauli gate operation so that both communicating parties have the same key string

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A quantum key distribution method and system with two-way identity authentication function
  • A quantum key distribution method and system with two-way identity authentication function
  • A quantum key distribution method and system with two-way identity authentication function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] In the past, in order to realize the update of the key, there is a third-party intervention and a large number of parameters are defined in the authentication protocol. The complexity of the authentication protocol is very high.

[0050] The quantum states used in many existing protocols are entangled states with more than three particles. However, the preparation of entangled states with more than three particles requires a lot of resources and is difficult to prepare, which increases the cost of the identity authentication process.

[0051] Moreover, in many existing protocols, after the identity authentication pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of network information technology, and discloses a quantum key distribution method and system with a two-way identity authentication function. Communication participants use binary strings representing user identities to prepare Bell states, and code them according to the same agreement. Exchange, complete the Bell-based measurement to realize the entanglement exchange of Bell-state particles, after performing bitwise XOR operation, either party of the communication parties performs Pauli gate operation, so that the particles in the hand are converted into the same Bell-state particles as the particles in the other party’s hands; According to the same encoding rules, both parties in communication can obtain a string of identical binary strings to complete the key distribution. The present invention improves the utilization rate of resources generated during the authentication process of both parties in communication; identity authentication and key distribution can be realized without the intervention of a third party according to the agreement announced by both parties in communication, and the required quantum state is the Bell state of two particles, which is relatively easy to prepare easy.

Description

technical field [0001] The invention belongs to the technical field of network information, and in particular relates to a quantum key distribution method and system with a bidirectional identity authentication function. Background technique [0002] At present, the existing technologies commonly used in the industry are as follows: [0003] Since the first quantum key distribution (QKD) protocol was proposed, quantum cryptography has been greatly developed in recent years. Compared with classical cryptography, quantum cryptography combines classical cryptography and quantum mechanics, and uses quantum effects to realize unconditionally secure information exchange. In order to meet the needs of the society for various practical security, researchers have proposed a large number of quantum cryptography protocols, mainly including quantum key distribution protocol (QKD), quantum direct secure communication (QSDC), quantum secret sharing (QSS), and quantum digital signature. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0852H04L63/0869
Inventor 张仕斌郑涛代金鞘李雪杨
Owner 北京前进先锋科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products