Data sharing method, device and computer equipment based on quantum key

A quantum key and data sharing technology, applied in the computer field, can solve the problems of brute force cracking, general limited length, and low security of data sharing, and achieve the effect of improving security and reducing the risk of brute force cracking

Active Publication Date: 2021-12-03
深圳科盾量子信息科技有限公司
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the length of the key pair composed of the public key and the private key is generally limited, and there is a risk of brute force cracking, resulting in low security for data sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data sharing method, device and computer equipment based on quantum key
  • Data sharing method, device and computer equipment based on quantum key
  • Data sharing method, device and computer equipment based on quantum key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0057] The quantum key-based data sharing method provided by this application can be applied to such as figure 1shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. The terminal 102 sends a data sharing request to the server 104. When the server 104 receives the data sharing request uploaded by the terminal 102, it performs identity authentication based on the authentication quantum key. When the identity authentication passes, it obtains and stores the quantum key to encrypt the target data The obtained ta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application relates to a quantum key-based data sharing method, device, computer equipment and storage medium. The method includes: when receiving a data sharing request uploaded by a terminal, performing identity authentication based on an authentication quantum key to obtain an identity authentication result; The text data is obtained by encrypting the target data requested by the data sharing request by storing the quantum key; performing ciphertext conversion on the target storage ciphertext data through the corresponding transmission quantum key of the terminal to obtain the transmission ciphertext data; the transmission ciphertext data Send it to the terminal, so that the terminal can obtain the target data after decrypting the transmission ciphertext data according to the transmission quantum key. By adopting the method, the security of data sharing can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a quantum key-based data sharing method, device, computer equipment and storage medium. Background technique [0002] With the development of computer technology, various network applications enable people to obtain rich data resources through data sharing, such as obtaining news data, social data, transaction data and other application data. With the wide application of data sharing, ensuring the security of data in data sharing has gradually become the focus of technological development. [0003] At present, in the traditional data sharing process, the shared data is usually encrypted with a key pair composed of a public key and a private key, and the shared data is transmitted through encrypted ciphertext. However, the length of the key pair composed of the public key and the private key is generally limited, and there is a risk of being cracked by brute force, re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0852H04L9/0869H04L9/0891H04L9/0894H04L9/3263H04L63/0428H04L63/083
Inventor 李红飞陈旭
Owner 深圳科盾量子信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products