Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum key distribution method and system for authentication based on post-quantum cryptography algorithm

A technology of quantum key distribution and quantum cryptography, which is applied in the field of quantum communication network systems, can solve the problems of labor costs, high travel and transportation costs, inability to obtain guarantees, time-consuming and labor-intensive problems, and improve convenience and feasibility. Increase interoperability and enhance the effect of security

Active Publication Date: 2020-12-29
CAS QUANTUM NETWORK CO LTD +3
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has the following problems in practical application: 1. In order to ensure the security of the key, the pre-set key is generally passed face-to-face. For a QKD network with n users, key pre-setting is required between any two users. A total of n(n-1) / 2 pairs of keys are required. For example, for a network of 100 users, a total of 4950 pairs of keys need to be preset, which is a very heavy workload; 2. When a new user joins the QKD network, the new user needs to To pre-set keys with all the original users, face-to-face key delivery requires huge labor costs, travel and transportation costs, time-consuming and labor-intensive, and very inefficient
However, the security of the public key algorithms used in current authentication is generally based on the complexity of specific mathematical problems, such as factorization of large numbers or discrete logarithms, etc.
With the development of quantum computers, these mathematical problems face the risk of being effectively solved, so its security, especially long-term security, cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum key distribution method and system for authentication based on post-quantum cryptography algorithm
  • Quantum key distribution method and system for authentication based on post-quantum cryptography algorithm
  • Quantum key distribution method and system for authentication based on post-quantum cryptography algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Embodiment 1: A point-to-point quantum key distribution method for authentication based on the PQC algorithm

[0042] A quantum key distribution method and system for authentication based on the PQC algorithm according to the present invention, such as figure 1 As shown, this embodiment includes the following steps:

[0043] User A and user B act as the transmitter and receiver of QKD respectively. The PQC clients of both parties respectively generate public-private key pairs based on the PQC algorithm (S A ,P A ) and (S B ,P B ), the two parties send their identity information and the generated public key to the PQC certification center CA, and apply for a digital certificate from the CA. After verifying the identities of the two, the CA sends the digital certificate signed by the CA to user A and user B respectively. C A and C B , the digital certificate contains the identity information and public key information of the user authenticated by the CA. CAs are r...

Embodiment 2

[0049] Embodiment 2: QKD star relay network for authentication based on PQC algorithm

[0050] What the embodiment of the present invention described is a star QKD relay network for authentication based on the PQC algorithm, such as figure 2 As shown in the figure, 3 users and 1 trusted relay are taken as an example, all other embodiments obtained by those skilled in the art without creative work, such as changing the number of users or increasing the number of relays, Or change the network topology, which all belong to the protection scope of the present invention. This embodiment includes the following steps:

[0051] U1, U2 and U3 represent 3 users. Each user and relay has one or more sets of QKD equipment and PQC user end equipment. QKD equipment can be a transmitter or a receiver, or a transmitter-receiver integrated machine. The QKD device is connected with the PQC client and can transmit the summary and authentication results. The PQC client can be set independent...

Embodiment 3

[0056] Embodiment 3: QKD chain relay network for authentication based on PQC algorithm

[0057] Described in the embodiment of the present invention is a chain-type QKD relay network for authentication based on the PQC algorithm, such as image 3 As shown in the figure, 2 users and 2 trusted relays are taken as an example, all other embodiments obtained by those skilled in the art without creative work, such as changing the number of users or increasing the number of relays, Or change the network topology, which all belong to the protection scope of the present invention. This embodiment includes the following steps:

[0058] U1 and U2 represent two users, and relay 1 and relay 2 represent two trusted relays. Each user and relay has one or more sets of QKD equipment and PQC user end equipment. QKD equipment can be a transmitter or a receiver, or a transmitter-receiver integrated machine. The QKD device is connected with the PQC client and can transmit the summary and authe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum key distribution method and system for authentication based on a post-quantum cryptography algorithm. The quantum key distribution system comprises a PQC authentication center, a PQC user side and QKD equipment. Communication in the quantum key distribution data post-processing process needs to be authenticated, a key presetting method is generally adopted at present, but the method is not suitable for a large-scale QKD network. According to the method and the system for authenticating the QKD by combining the PQC algorithm with the public key infrastructure, each user of the QKD network only needs to apply for one digital certificate from the authentication center, and the abstract of the authenticated information is signed and verified by using the PQC algorithm, so that the quantum-resistant computing security of the PQC algorithm in the authentication process can be ensured. And the operability and the flexibility of a large-scale QKD network are ensured.

Description

technical field [0001] The present invention relates to the field of quantum communication network and quantum key technology, more specifically to a quantum key distribution (Quantum key distribution, QKD) method for authentication based on Post-quantum Cryptography (PQC) algorithm and application of the method Quantum communication network system. Background technique [0002] Based on the physical principles of quantum mechanics, the quantum key distribution protocol can provide security in the sense of information theory, and is an important development direction in the field of information security. The realization of quantum key distribution (Quantum key distribution, QKD) includes quantum channel and classical channel, the former is used to transmit quantum state, and the latter is used to transmit information in the process of data post-processing. Both quantum channels and classical channels are open channels, but the security of QKD requires the latter to be authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3268H04L9/0852H04L9/0819H04L9/0855
Inventor 王家勇杨勇华唐世彪汤艳琳王留军张强潘建伟张凯弈郁昱
Owner CAS QUANTUM NETWORK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products