Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum secret communication system and method based on secret sharing and asymmetric cryptography

A quantum secure communication and asymmetric cryptography technology, applied in key distribution, can solve problems such as key pool theft, vulnerability, loss of key security, etc.

Active Publication Date: 2020-06-19
南京如般量子科技有限公司 +1
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the QKD device is attacked by malware, or once the key card where it is located is cracked violently, the corresponding symmetric key pool in the QKD device may be stolen, thereby losing all key security
[0007] 2. When users apply for the use of QKD keys, if the number of users is huge in a short period of time, due to the limited maximum number of connections of a single QKD device, a single QKD device may not be able to provide key services due to exceeding the maximum number of connections
Since the main function of QKD equipment is key distribution, it is not designed for various practical business needs, and often cannot meet various needs of users
[0009] 4. With the development of quantum computers, the classical asymmetric key encryption algorithm will no longer be safe. In the process of secure communication, quantum computers can obtain private keys through public key calculations. Therefore, the current classical secure communication methods will be used in quantum computers times become fragile

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret communication system and method based on secret sharing and asymmetric cryptography
  • Quantum secret communication system and method based on secret sharing and asymmetric cryptography
  • Quantum secret communication system and method based on secret sharing and asymmetric cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Such as figure 1 As shown, the quantum secure communication system based on secret sharing and asymmetric cryptography of the present invention is used for secure communication between clients through QKD devices, including key fobs, multiple clients, QKD devices and QKD slave devices.

[0061] The client goes to the QKD slave device in the area to register, and gets the key card after being approved. The key card has built-in identity authentication protocol and user registration information;

[0062] There are QKD channels between different QKD devices, which can form a symmetric key pool through QKD. QKD channels are built between QKD devices and their corresponding QKD slave devices, and a symmetric key pool can be formed through QKD, or the corresponding QKD slave devices can bring There is a key card and a symmetric key pool pre-issued by QKD equipment.

[0063]The user terminal can be a mobile terminal or a fixed terminal. When it is a mobile terminal, the key c...

Embodiment 2

[0068] This embodiment provides a key distribution method of a quantum secure communication system based on secret sharing and asymmetric cryptography. Clients belong to different QKD devices, here it is assumed that there is a pair of QKD devices Q A and QKD device Q B , Q A There are N slaves Q An (n ∈ [0, N-1]), Q B There are M slave devices Q Bm (m ∈ [0, M-1]). The key distribution method is as follows:

[0069] Step 101, generate a QKD key K between different QKD devices, and K corresponds to the location of the local QKD key pool as K P ;

[0070] Step 102, QKD device Q A Calculate n=H(K)%N, ​​choose Q An as a key distribution object. H is a hash operation, and % is a modulo operation.

[0071] Step 103, QKD device Q A Perform (2, 2) secret sharing on K.

[0072] Step 104, QKD device Q A After encrypting the secret, send it to its corresponding multiple QKD slave devices Q An .

[0073] Step 105, each corresponding QKD slave device Q An Received from QKD...

Embodiment 3

[0087] When the client belongs to the same QKD device, the key distribution method is as follows:.

[0088] Step 201, Q A Generate a random number key K, and form a large number of random arrays into the local key pool, K corresponds to the position of the local key pool as K P ;

[0089] Step 202, QKD device Q A Calculate n=H(K)%N, ​​select Q An as a key distribution object. H is a hash operation, and % is a modulo operation. Q A Also calculate c=H(H(K))%N, select Q Ac As the key distribution object, the M xP Simultaneously sent to Q Ac .

[0090] Step 203, QKD device Q A Perform (2, 2) secret sharing on K.

[0091] Step 204, QKD device Q A After encrypting the secret, send it to its corresponding multiple QKD slave devices Q An .

[0092] Step 205, each corresponding QKD slave device Q An Received from QKD device Q A The ciphertext, decrypt to get the message, and multiple sets of key entries Q A ||Q B ||K P ||H(K)||x 1 ||(X 2 , K 2 ) are distributed an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum secret communication system and method based on secret sharing and asymmetric cryptography. The method is used for secret communication between user sides through QKDequipment. The QKD device generates a secret key based on the QKD or the true random number generator, secret sharing of the generated secret key between the QKD device and the QKD slave device is achieved through a symmetric secret key pool between the QKD device and the QKD slave device, and offset calculation is introduced in the communication process for encryption. According to the method, secret sharing is carried out on the QKD symmetric key pool, so that the possibility that the key is stolen is greatly reduced, and the safety of the QKD key is effectively improved. A single QKD device is provided with a plurality of slave devices, so that the capacity of the QKD device for providing key service and the system stability are improved. The offset is used for encrypting the data, andother parties cannot crack the data protected by the offset, so that the method has the characteristic of quantum computing resistance.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a quantum secure communication system and method based on secret sharing and asymmetric cryptography. Background technique [0002] With the continuous development of society, the continuous advancement of science and technology, and the rapid improvement of network information technology, the classic security system is being threatened unprecedentedly, making the protection situation of network information security extremely severe. People urgently need an alternative technology to achieve more secure and reliable confidentiality measures. The classic security system is based on the complexity of mathematical calculations, which makes the deciphering cost extremely high, so as to achieve security and confidentiality measures. It is simple and efficient, and is widely used by people. However, with the emergence of quantum computers, its security foundation is threatened, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/3297H04L9/3252H04L9/3242H04L9/0855H04L9/0852H04L63/0442H04L2209/72
Inventor 富尧钟一民凌基娴
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products