Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum secret communication system based on secret sharing and communication method thereof

A quantum secure communication and secret sharing technology, which is applied in the field of quantum secure communication systems, can solve the problems of loss of key security, low validity of identity authentication and non-repudiation, and limited maximum number of connections, so as to avoid failure of identity authentication problems, improve the ability of key services, the effect of high effectiveness and non-repudiation

Active Publication Date: 2020-07-14
南京如般量子科技有限公司 +1
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once the QKD device is attacked by malware, or once the key card where it is located is cracked violently, the corresponding symmetric key pool in the QKD device may be stolen, thereby losing all key security;
[0008]2. When users apply for QKD keys, if the number of users is huge in a short period of time, due to the limited maximum number of connections for a single QKD device, it may be due to exceeding the maximum A single QKD device cannot provide key services due to the number of connections;
[0009]3. When users log in to QKD, they often use symmetric keys for identity authentication. Compared with asymmetric cryptography, the effectiveness of identity authentication and Low non-repudiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret communication system based on secret sharing and communication method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The networking designed in this embodiment has Num nodes, each node is a quantum communication service station, each quantum communication service station has a QKD device, and the QKD device is defined as Qn(n∈[0, Num-1]), A QKD channel is established between any two Qn, for example, the QKD device of node A is QA, and the QKD device of node B is QB. A QKD channel is established between QA and QB, so that a symmetric key pool can be formed through the QKD channel. And each Qn transmits its own public key to all other Qn through the QKD key during deployment. Therefore, the public keys of all other Qn are stored in the memory of each Qn.

[0049] The asymmetric algorithms used in this embodiment include identity-based cryptography and elliptic curve-based cryptography. The key management server in the quantum communication service station issues private keys to clients (ie nodes). The identity of the client is ID, the public key is PK, and the private key is SK.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum secret communication system based on secret sharing and a communication method thereof. The system comprises a plurality of user sides and a quantum communication service station, wherein the service station serves as an issuing service station or an access service station of the user side, the service station private key and the public keys of all service stations are stored in the service station secret key card, the user side private key and the issuing service station public key are stored in the user side secret key card, the ID of the user side carries the information of the issuing service station, the user side sends a login application to the issuing service station, and a dialogue secret key is generated in the login application process. According to the method provided by the invention, the user side is set to access the plurality of access service stations, the problem that identity authentication cannot be carried out due to limited maximum connection number is prevented, and the capability of providing key service of the network is improved; identity authentication is carried out by adopting encryption modes such as random numbers, offset and the like; the effectiveness and the non-repudiation of identity authentication are high.

Description

technical field [0001] The invention relates to the field of secret sharing, in particular to a quantum secret communication system based on secret sharing and a communication method thereof. Background technique [0002] Confidential communication is a communication method, which is to take special measures on the content of the information to be transmitted, so as to conceal the real content of the information, so that illegal interceptors cannot understand the meaning of the communication content. In order to conceal the communication content, usually before transmission, the information is transformed in various forms to form encrypted information, and the corresponding inverse transformation is performed at the receiving end to restore the original information. Security communication can be divided into analog security communication and digital security communication according to the encryption method of communication information. Digital security technology has been w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/085H04L9/3297H04L9/3247H04L9/3226
Inventor 富尧钟一民茆冬梅
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products