Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Strong authentication method and system based on quantum symmetric key

A technology of quantum key and symmetric key, which is applied in the field of quantum key distribution, can solve problems such as potential safety hazards, achieve the effect of reducing the operation scale and increasing the operation speed

Active Publication Date: 2021-02-02
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to solve the hidden security problem that the traditional message integrity authentication method relies on computational complexity, this invention proposes a strong authentication method and system based on quantum symmetric keys, which has quantum security characteristics and has nothing to do with computing power. The user's message integrity can be strongly guaranteed, effectively preventing the leakage of sensitive information, used to resist the deciphering of quantum computers, and ensure information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strong authentication method and system based on quantum symmetric key
  • Strong authentication method and system based on quantum symmetric key
  • Strong authentication method and system based on quantum symmetric key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work belong to the protection of the present invention. scope.

[0050] Such as figure 1 As shown, the strong authentication method based on the quantum symmetric key of this embodiment includes:

[0051] Step S11, obtaining the quantum key file, and enlarging it securely according to the poly1305 algorithm to obtain a safe quantum key;

[0052]The system configures the QKD device through the FTP interface. After t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of quantum key distribution, and particularly relates to a strong authentication method and system based on a quantum symmetric key, and the method comprises the steps: obtaining a quantum key file, and carrying out the secret amplification of the quantum key file according to a poly1305 algorithm; packaging the obtained quantum key by using a key packaging algorithm and a user password; the sender performing decapsulation to obtain a quantum key and a plaintext, obtaining a message authentication code, a ciphertext and a unique value through a poly1305 algorithm, and transmitting the message authentication code, the ciphertext and the unique value to the receiver through a public network after packaging; and the receiver receiving the packagedmessage, unpacking the packaged message to obtain a ciphertext, a unique value and a received message identification code, calling a quantum key and a poly1305 algorithm to calculate to obtain a plaintext and a calculated message identification code, and comparing whether the calculated message identification code is the same as the received message identification code to identify the integrity ofthe message. Message integrity of users of two communication parties can be powerfully guaranteed, leakage of sensitive information is effectively prevented, decoding of a quantum computer is resisted, and information safety is ensured.

Description

technical field [0001] The invention belongs to the technical field of quantum key distribution, and in particular relates to a strong authentication method and system based on quantum symmetric keys. Background technique [0002] Quantum key distribution mainly includes two stages: the quantum signal transmission stage and the post-processing stage. The quantum signal transmission stage mainly includes operations such as sending, receiving, and measuring quantum states performed by Alice and Bob in the quantum channel. The post-processing stage mainly Including base, error estimation, key agreement (error correction), error verification and security amplification process. With the rapid development of high-speed quantum key distribution system, the post-processing stage has become a bottleneck restricting its high-speed performance. Therefore, fast The study of effective post-processing algorithms plays a very important role in high-speed quantum key distribution systems. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3242H04L9/3226H04L9/0852Y04S40/20
Inventor 邓太行林兴周淳汪洋李家骥鲍皖苏张海龙汪翔江木生李宏伟
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products