Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum identity authentication method and system based on continuous variable quantum key distribution

A technology of quantum key distribution and identity authentication, applied in the field of quantum identity authentication based on continuous variable quantum key distribution, it can solve the problems that continuous variable quantum identity authentication is rarely researched, and achieve the advantages of reduced application cost and good application flexibility. Effect

Pending Publication Date: 2022-05-27
上海循态量子科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing identity authentication schemes are proposed based on discrete variable technology, and the current research is mostly focused on quantum key distribution, and there is little research on continuous variable quantum identity authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum identity authentication method and system based on continuous variable quantum key distribution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] A quantum identity authentication method based on continuous variable quantum key distribution provided according to the present invention, comprising:

[0040] Step S1: The client and the authentication center share the authentication key K through the continuous variable quantum key distribution system s , K s is a binary bit string with a length greater than or equal to 2N; wherein, the first N lengths are used for calculation, and the length of N+1 to 2N is selected for updating the authentication base K b , the remaining length can be ignored;

[0041] Specifically, the step S1 adopts: in the user terminal and the authentication center, use any Gaussian modulation coherent state continuous variable quantum key distribution protocol with unconditional security to perform identity authentication.

[0042] Step S2: Obtain the authentication key K s The first N binary bits in the middle, get the binary bit string K of length N a ; the client uses the binary bit str...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a quantum identity authentication method and system based on continuous variable quantum key distribution. The method comprises the steps that a user side and an authentication center share an authentication key Ks through the continuous variable quantum key distribution system; obtaining a bit string Ka of first N binary bits in the authentication key Ks; the user side calculates a binary bit string KID by using an authentication base Kb composed of a binary bit string Ka and a binary bit string with the length of N, and then sends the KID to the authentication center through a channel; the authentication center obtains a binary bit string K'a with the length of N based on the authentication key K's after channel sharing, and the authentication center calculates a binary bit string K 'ID by using an authentication base K'b formed by the binary bit string K'a and the shared binary bit string with the length of N; calculating the correlation of the KID and the K 'ID respectively calculated by the user side and the authentication center, and judging whether the user side is a legal user or not; and after the authentication succeeds, taking a binary bit string which is not used from N + 1 in the authentication key Ks and has the length of N as a binary identity authentication base of the next stage.

Description

technical field [0001] The invention relates to a communication identity authentication method, in particular to a quantum identity authentication method and system based on continuous variable quantum key distribution. Background technique [0002] The continuous development of communication technology has made the communication of human society break through the limitation of time and region, greatly accelerated the efficiency of information transmission, and facilitated our life. However, while enjoying the convenience brought by the communication system, people are also more worried about the security of communication. In this era when information is a resource, the confidentiality of information is particularly important. Most of the current methods of encrypting information are basically based on the complexity of computing, but with the rapid improvement of people's computing power, especially the emergence of quantum computing theory, the security of traditional encr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0852
Inventor 黄鹏杨启明周颖明曾贵华
Owner 上海循态量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products