Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum Communication Server Secure Communication Method and System Based on Asymmetric Key Pool and Implicit Certificate

An implicit certificate, confidential communication technology, applied in the field of quantum communication server confidential communication, can solve the problem of large key capacity, large capacity, unable to store the key card of the server, etc., to ensure communication security, reduce storage costs, The effect of improving safety

Active Publication Date: 2021-12-07
RUBAN QUANTUM TECH CO LTD +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. The existing scheme for secure communication based on a symmetric key pool uses a symmetric key pool between the server and the client, which has a huge capacity and puts pressure on the key storage of the server;
[0011] 2. Existing schemes for secure communication based on symmetric key pools. Due to the huge capacity of symmetric key pool keys, the server has to encrypt and store the keys in ordinary storage media such as hard disks, and cannot store the keys on the server. card;
[0012] 3. The existing scheme of secure communication based on the symmetric key pool, due to the huge key capacity of the symmetric key pool, causes troubles to the online update of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum Communication Server Secure Communication Method and System Based on Asymmetric Key Pool and Implicit Certificate
  • Quantum Communication Server Secure Communication Method and System Based on Asymmetric Key Pool and Implicit Certificate
  • Quantum Communication Server Secure Communication Method and System Based on Asymmetric Key Pool and Implicit Certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0098] systems mannual

[0099] This embodiment includes client A, client B, server QA and server QB, the structure is as image 3 shown. QA and QB have their own key management servers respectively. QA and QB have QKD lanes. Client A and client B are equipped with client key cards, and server QA and server QB are equipped with server key cards. The above-mentioned client A belongs to the server QA, that is, the key card of A is issued by the key management server of QA, and the client A and the server QA share an asymmetric key pool pair. Client B belongs to server QB, that is, B's key card is issued by QB's key management server, and client B and server QB share an asymmetric key pool pair.

[0100] step 1:

[0101] Client A generates random number RA according to the random number generator in the matching key card. The random number RA is combined with the pointer function f1 to obtain the pointer PA1, and the public key PKQA1 is taken out from the server public key poo...

Embodiment 2

[0127] This embodiment includes client A, client B and server Q, the structure is as follows Figure 4 shown. Server Q has a key management server. Client A and Client B are equipped with client key cards, and server Q is equipped with server key cards. Both client A and client B above belong to server Q, that is, the key cards of client A and client B are issued by the key management server of server Q, and client A and server Q share asymmetric Key pool pair, client B and server Q also share an asymmetric key pool pair.

[0128] step 1:

[0129] Client A generates random number RA according to the random number generator in the matching key card. The random number RA is combined with the pointer function f1 to obtain the pointer PA1, and the public key PKQA1 is taken out from the server public key pool through PA1. The random number RA is combined with the pointer function f2 to obtain the pointer PA2, and the public key PKQA2 is taken out from the public key pool of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a quantum communication server-side secure communication method and system based on an asymmetric key pool and an implicit certificate. This patent uses an implicit certificate to implicitly verify the public key’s security for the implicit certificate-based secure communication method. Reliability is proved, and asymmetric keys and digital signatures are used to prove the user's identity. Both the sender and the sender of the confidential communication can clearly identify the other party's identity, and no one else can interfere or counterfeit the confidential communication. Since none of the asymmetric keys are disclosed, and the keys cannot be obtained from public user information, the asymmetric key usage method in this paper has the characteristics of anti-quantum computing.

Description

technical field [0001] The present application relates to the technical field of secure communication, in particular to a quantum communication server-side secure communication method and system based on an asymmetric key pool and an implicit certificate. Background technique [0002] The rapid development of the Internet has brought great convenience to people's life and work. People can sit at home to send and receive e-mails, make phone calls, conduct online shopping, bank transfers and other activities through the Internet. At the same time, network information security has gradually become a potential huge problem. Generally speaking, network information faces the following security risks: network information is stolen, information is tampered with, attackers fake information, malicious damage, etc. [0003] Among them, confidential communication is one of the means to protect people's network information. It is generally realized by cryptographic encryption. Before en...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08
CPCH04L9/0643H04L9/0863H04L9/0869H04L63/0442H04L63/0823
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products