CN109889340A - A kind of adaptive cipher key distribution mechanisms based on QKD network - Google Patents

A kind of adaptive cipher key distribution mechanisms based on QKD network Download PDF

Info

Publication number
CN109889340A
CN109889340A CN201910210923.2A CN201910210923A CN109889340A CN 109889340 A CN109889340 A CN 109889340A CN 201910210923 A CN201910210923 A CN 201910210923A CN 109889340 A CN109889340 A CN 109889340A
Authority
CN
China
Prior art keywords
key
quantum
classic
final
quantum key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201910210923.2A
Other languages
Chinese (zh)
Inventor
刘旭红
陈雨婷
孟坤
施运梅
宋�莹
郑晓博
季青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING INSTITUTE OF TECHNOLOGY SPECIAL ELECTROMECHANICAL
Beijing Information Science and Technology University
Original Assignee
BEIJING INSTITUTE OF TECHNOLOGY SPECIAL ELECTROMECHANICAL
Beijing Information Science and Technology University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING INSTITUTE OF TECHNOLOGY SPECIAL ELECTROMECHANICAL, Beijing Information Science and Technology University filed Critical BEIJING INSTITUTE OF TECHNOLOGY SPECIAL ELECTROMECHANICAL
Priority to CN201910210923.2A priority Critical patent/CN109889340A/en
Publication of CN109889340A publication Critical patent/CN109889340A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a kind of adaptive cipher key distribution mechanisms based on QKD network, including three kinds of key strategies, are respectively: one is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classic key, avoid quantum key generating rate lower and lead to not meet the conditions of demand to size of key.Video of the present invention for downloading playing-type, audio-frequency information, candidate block encryption algorithm: AES is specified for it, 3DES, IDEA, SM1, SMS4, Twofish, for the video of RTSP streaming, audio-frequency information, guarantee high real-time, for the video/audio information of RTSP streaming, candidate Encryption Algorithm: AES is specified for it, SM1, SMS4, RC4, Rabbit, ChaCha20, Serpent, for text information, such as Email, control information etc., requirement of real-time is lower, this patent is for such application distribution symmetric encipherment algorithm mainly according to the security level required by itself, therefore, it can be its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish.

Description

A kind of adaptive cipher key distribution mechanisms based on QKD network
Technical field
The present invention relates to Fiber quantum fields of communication technology, and in particular to a kind of adaptive cipher key based on QKD network point Hair mechanism.
Background technique
Currently, multimedia file can be divided into discontinuous media and continuous media.Discontinuous media mainly include text, figure And image, continuous media then mainly include voice, audio, video.In comparison, continuous media needs high real-time and low latency Property.Wherein, video file needs to guarantee higher transmission rate, and occupies biggish network bandwidth, and video, audio-frequency information have The features such as data volume is big, correlation is strong, redundancy is high, requirement of real-time is high, since data volume is big, code breaker need to carry out data A large amount of decoding operate, thus can be bigger compared to the decoding difficulty of text information, video and audio can be divided into downloading playing-type again With RTSP (Real Time Streaming Protocol) streaming: (1) download playing-type be will be under entire video, audio file Played out after being downloaded to terminal, can guarantee video integrality and play continuity, but using such mode user need compared with High latency, and requirement of real-time is lower.(2) RTSP streaming needs less buffer time, can be realized in downloading Video is played, but the video file that such mode needs network availability bandwidth to be persistently higher than video code rate, especially this mode is logical Carry out data transmission frequently with insecure udp protocol, the problems such as client is easy to appear frame-skipping, splashette.
Summary of the invention
The technical problem to be solved by the present invention is to overcome problem described above, provide a kind of based on the adaptive of QKD network Answer key distribution mechanism.
In order to solve the above-mentioned technical problems, the present invention provides the following technical solutions:
The present invention provides a kind of adaptive cipher key distribution mechanisms based on QKD network, including three kinds of key strategies, respectively Be: one is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classic key, the amount of avoiding Sub-key generating rate is lower and leads to not meet the conditions of demand to size of key, when classic key is used alone, uses Diffie-Hellman agreement establishes classic key session in exchange both sides, continues uninterruptedly to negotiate classic key, and be stored in Classic key table, and being stored in final key list, when quantum key is used alone, key storage that quantum channel generates in Quantum key table, and be stored in final key list, when fusion is using quantum key and classic key, in classical channel Quantum key access and extension mechanism are added in security strategy, thus propose two kinds of classic keys and quantum key convergence strategy, The shared key of the necessary wildcard of data transmission procedure, the session key of data encryption algorithm, hmac algorithm is generated, and It is stored in final key list.
As a preferred technical solution of the present invention, the key that the quantum channel generates is passed by the quantum channel Transport to quantum key server, the output end connection quantum key reservoir and quantum key table of the quantum key, the amount The output end of sub-key server connects the quantum encryption communication terminal with input terminal, the quantum encryption communication terminal it is defeated Outlet connection classic key table and classic key reservoir, the quantum reservoir and the classic key reservoir pass through key Convergence strategy connects the final key list, and the quantum key table and the classic key table pass through the key convergence strategy Connect the final key list.
As a preferred technical solution of the present invention, the key convergence strategy passes through N number of classic key and M is a The quantum key that QKD system generates is calculated according to predetermined operation mode, new key is obtained, to extend final cipher key number Amount.
As a preferred technical solution of the present invention, the classic key table, quantum key storage table and described Each key in final key list is numbered with N bit, and from 0 to 2N- 1, the key of generation is deposited since the 0th article Storage, until the last item 2N- 1 and then it is recycled to the 0th article of record, and covers no longer valid key.
As a preferred technical solution of the present invention, when handling high data throughput confidential transactions and low number is being handled When according to handling capacity confidential transactions, i.e., user's failed call high security level that is, one-time pad is taken, it can only in key lifetimes Transmit a message.
As a preferred technical solution of the present invention, the data encrypted using key need to carry key in the table Number, be decrypted so that corresponding key can be found in recipient.
The beneficial effects obtained by the present invention are as follows being: the present invention is specified for video, the audio-frequency information of downloading playing-type for it Candidate block encryption algorithm: AES, 3DES, IDEA, SM1, SMS4, Twofish, video, audio-frequency information for RTSP streaming, Guarantee high real-time, therefore the lower Encryption Algorithm of computation complexity can be chosen, to guarantee higher encryption and decryption rate, needle To the video/audio information of RTSP streaming, for its specified candidate Encryption Algorithm: AES, SM1, SMS4, RC4, Rabbit, ChaCha20, Serpent compare video, audio-frequency information, data volume for text information, such as Email, control information It is smaller, requirement of real-time is lower, this patent for such application distribution symmetric encipherment algorithm mainly according to the peace required by itself Full property rank, therefore, can be for its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish, this patent be according to business Type takes the symmetric encipherment algorithm for data message the mode of preferential recommendation, realizes that the adaptive refinement of application drive is calculated Method selection proposes the feature for multimedia messages such as video, image, audio, texts and its realizes the requirement of safe transmission, mentions For corresponding candidate Encryption Algorithm set of strategies, so that communicating pair is held consultation, communicating pair is determining that encryption policy confirms After selecting the contents such as algorithm and key, the requirement according to user to encryption safe rank determines key convergence strategy, last vector Quantum key distribution server-side application corresponds to the key of digit, and the data encrypted using key need to carry key in the table Number, is decrypted to find corresponding key in recipient.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example to be used to explain the present invention together, not be construed as limiting the invention.In the accompanying drawings:
Fig. 1 is structural schematic diagram of the invention;
Fig. 2 is side structure schematic view of the invention.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Embodiment 1
As shown in Figs. 1-2, the present invention provides a kind of adaptive cipher key distribution mechanisms based on QKD network, including three kinds close Key strategy is respectively: one is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classics Key avoids quantum key generating rate lower and leads to not meet the conditions of demand to size of key, is used alone classical close When key, using Diffie-Hellman agreement, classic key session is established in exchange both sides, continues uninterruptedly to negotiate classical close Key, and it is stored in classic key table, and be stored in final key list, when quantum key is used alone, quantum channel is generated Key storage in quantum key table, and be stored in final key list, when fusion is using quantum key and classic key, Quantum key access and extension mechanism are added in the security strategy of classical channel, thus propose that two kinds of classic keys and quantum are close Key convergence strategy generates data transmission procedure necessary wildcard, the session key of data encryption algorithm, hmac algorithm Shared key, and it is stored in final key list, in high speed business network, quantum key production rate is major influence factors, when User is specified to be used alone quantum key, but quantum key is at code rate is lower or quantum key production rate takes less than quantum key It when dosage, needs to be extended quantum key, reaches specified requirement, be used alone close involved in quantum key convergence strategy The specific method is as follows for key amplification: (such as according to predetermined operation mode by N number of classic key and the quantum key of M QKD system generation Exclusive or, phase and operation) it is calculated, new key is obtained, to extend final number of keys.
The key throughput subchannel transmission that quantum channel generates to quantum key server, the output end of quantum key connects Quantum key reservoir and quantum key table are connect, the output end of quantum key server connects quantum encryption communication end with input terminal End, the output end connection classic key table and classic key reservoir, quantum reservoir and classics of quantum encryption communication terminal are close Key reservoir connects final key list by key convergence strategy, and quantum key table and classic key table pass through key convergence strategy Connect final key list.
Key convergence strategy by by N number of classic key and M QKD system generation quantum key according to predetermined operation mould Formula is calculated, and new key is obtained, and to extend final number of keys, is added according to type of service to for the symmetrical of data message Close algorithm takes the mode of preferential recommendation, realizes the adaptive refinement algorithms selection of application drive.
Each key in classic key table, quantum key storage table and final key list is compiled with N bit Number, from 0 to 2N- 1, the key of generation is stored since the 0th article, until the last item 2N- 1 and then it is recycled to the 0th article of record, and Cover no longer valid key.
When handling high data throughput confidential transactions and when handling low data throughout confidential transactions, i.e., user does not want It seeks high security level that is, takes one-time pad, a message can only be transmitted in key lifetimes.
The data encrypted using key, need to carry the number of key in the table, to find pair in recipient The key answered is decrypted.
The device is a kind of adaptive cipher key distribution mechanisms based on QKD network, and the present invention provides a kind of based on QKD first The adaptive cipher key distribution mechanisms of network, including three kinds of key strategies are respectively: one is used alone classic key;Two individually make Use quantum key;Three fusions use quantum key and classic key, avoid quantum key generating rate lower and lead to not full The sufficient conditions of demand to size of key, the key throughput subchannel transmission that wherein quantum channel generates to quantum key server, Quantum key is stored in quantum key reservoir and quantum key table, and it is whole that quantum key server connects quantum encryption communication End, quantum encryption communication terminal connect classic key table and classic key reservoir, quantum reservoir and classic key reservoir Final key list is connected by key convergence strategy, quantum key table and classic key table are stored in most by key convergence strategy Whole key list, the requirement of feature and its realization safe transmission for multimedia messages such as video, image, audio, texts, provides Corresponding candidate's Encryption Algorithm set of strategies, so that communicating pair is held consultation, for video, the audio-frequency information of downloading playing-type (as downloading film, load play voice), for its specified candidate block encryption algorithm: AES, 3DES, IDEA, SM1, SMS4, Twofish;Video, audio-frequency information for RTSP streaming, it is ensured that high real-time, therefore can choose computation complexity it is lower plus Close algorithm flows RTSP (Real Time Streaming Protocol) with guaranteeing higher encryption and decryption rate The video/audio information (such as live streaming, video conference) of formula, for its specified candidate Encryption Algorithm: AES, SM1, SMS4, RC4, Rabbit, ChaCha20, Serpent compare video, audio-frequency information for text information, such as Email, control information, Data volume is smaller, requirement of real-time is lower, for such application distribution symmetric encipherment algorithm mainly according to the peace required by itself Therefore full property rank can be its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish etc.;So this patent root The mode that preferential recommendation is taken the symmetric encipherment algorithm for data message according to type of service, realizes the adaptive of application drive Encryption Algorithm selection;In some time interval, the data throughout sended and received meets Poisson process for data center.Periodically The data throughout that statistical data center is handled in set time domestic demand obtains Poisson model relevant parameter.Based on the mathematical modulo Type, can predict the variation tendency of data throughout of lower a moment by the network data throughput at current time, and according to Family in the demand and cipher key store of security level size of key dynamic regulation key lifetimes and used Encryption Algorithm, When handling the general service of high data throughput, according to the quantity of key in cipher key store, dynamic shortens the life cycle of key, Adaptively choose efficient Encryption Algorithm;When handling the general service of low data throughout, according to key in cipher key store Quantity, dynamic extend key lifetimes, adaptively selected highly-safe Encryption Algorithm;In processing high data throughput secret When business, i.e. user's failed call high security level (that is, taking one-time pad) can only transmit a report in key lifetimes Text.A large amount of keys can be consumed at this time, need the quantum key by generating N number of classic key and M QKD system according to predetermined Operation mode is calculated, and new key is obtained, and reaches key demand to extend the method for cipher key spreading of final number of keys Amount;When handling low data throughout confidential transactions, i.e. user's failed call high security level (that is, taking one-time pad), key A message can only be transmitted in life cycle, and is preferentially encrypted using the strategy of quantum key.It at this time can be relative to 3.4 Less key is consumed, it can be by the quantum key that generates N number of classic key and M QKD system according to predetermined operation mode It is calculated, obtains new key, reach key demand to extend the method for cipher key spreading of final number of keys, use is close The data of key encryption, need to carry the number of key in the table, carry out to find corresponding key in recipient.
The beneficial effects obtained by the present invention are as follows being: the present invention is specified for video, the audio-frequency information of downloading playing-type for it Candidate block encryption algorithm: AES, 3DES, IDEA, SM1, SMS4, Twofish, video, audio-frequency information for RTSP streaming, Guarantee high real-time, therefore the lower Encryption Algorithm of computation complexity can be chosen, to guarantee higher encryption and decryption rate, needle To the video/audio information of RTSP streaming, for its specified candidate Encryption Algorithm: AES, SM1, SMS4, RC4, Rabbit, ChaCha20, Serpent compare video, audio-frequency information, data volume for text information, such as Email, control information It is smaller, requirement of real-time is lower, this patent for such application distribution symmetric encipherment algorithm mainly according to the peace required by itself Full property rank, therefore, can be for its specified candidate Encryption Algorithm: DES, AES, SM1, SMS4, Twofish, this patent be according to business Type takes the symmetric encipherment algorithm for data message the mode of preferential recommendation, realizes that the adaptive refinement of application drive is calculated Method selection proposes the feature for multimedia messages such as video, image, audio, texts and its realizes the requirement of safe transmission, mentions For corresponding candidate Encryption Algorithm set of strategies, so that communicating pair is held consultation, communicating pair is determining that encryption policy confirms After selecting the contents such as algorithm and key, the requirement according to user to encryption safe rank determines key convergence strategy, last vector Quantum key distribution server-side application corresponds to the key of digit, and the data encrypted using key need to carry key in the table Number, is decrypted, method and mechanism proposed by the present invention ensure that data to find corresponding key in recipient The safety of transmission and the renewal frequency for improving session key.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention, Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features. All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention Within protection scope.

Claims (6)

1. a kind of adaptive cipher key distribution mechanisms based on QKD network, which is characterized in that including three kinds of key strategies, be respectively: One is used alone classic key;Two are used alone quantum key;Three fusions use quantum key and classic key, avoid quantum close Key generating rate is lower and leads to not meet the conditions of demand to size of key, when classic key is used alone, using Diffie- Hellman agreement establishes classic key session in exchange both sides, continues uninterruptedly to negotiate classic key, and is stored in classical close Key table, and be stored in final key list, when quantum key is used alone, the key storage that quantum channel generates is close in quantum Key table, and be stored in final key list, when fusion is using quantum key and classic key, in the safe plan of classical channel The access of addition quantum key and extension mechanism, thus propose two kinds of classic keys and quantum key convergence strategy in slightly, generate number According to the shared key of the necessary wildcard of transmission process, the session key of data encryption algorithm, hmac algorithm, and it is stored in Final key list.
2. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that described The key that quantum channel generates is transmitted to quantum key server by the quantum channel, and the output end of the quantum key connects Quantum key reservoir and quantum key table are connect, the output end of the quantum key server connects the quantum with input terminal and adds Close communication terminal, the output end connection classic key table and classic key reservoir of the quantum encryption communication terminal, the amount Sub- reservoir connects the final key list, the quantum key table by key convergence strategy with the classic key reservoir The final key list is connected by the key convergence strategy with the classic key table.
3. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 2, which is characterized in that described Key convergence strategy is by counting the quantum key of N number of classic key and the generation of M QKD system according to predetermined operation mode It calculates, new key is obtained, to extend final number of keys.
4. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that described Each key in classic key table, the quantum key storage table and the final key list is compiled with N bit Number, from 0 to 2N- 1, the key of generation is stored since the 0th article, until the last item 2N- 1 and then it is recycled to the 0th article of record, and Cover no longer valid key.
5. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that locating When managing high data throughput confidential transactions and when handling low data throughout confidential transactions, i.e. user's failed call high security level That is, one-time pad is taken, a message can only be transmitted in key lifetimes.
6. a kind of adaptive cipher key distribution mechanisms based on QKD network according to claim 1, which is characterized in that use The data of key encryption, need to carry the number of key in the table, carry out to find corresponding key in recipient Decryption.
CN201910210923.2A 2019-03-19 2019-03-19 A kind of adaptive cipher key distribution mechanisms based on QKD network Withdrawn CN109889340A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910210923.2A CN109889340A (en) 2019-03-19 2019-03-19 A kind of adaptive cipher key distribution mechanisms based on QKD network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910210923.2A CN109889340A (en) 2019-03-19 2019-03-19 A kind of adaptive cipher key distribution mechanisms based on QKD network

Publications (1)

Publication Number Publication Date
CN109889340A true CN109889340A (en) 2019-06-14

Family

ID=66933090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910210923.2A Withdrawn CN109889340A (en) 2019-03-19 2019-03-19 A kind of adaptive cipher key distribution mechanisms based on QKD network

Country Status (1)

Country Link
CN (1) CN109889340A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110262908A (en) * 2019-06-21 2019-09-20 珠海格力电器股份有限公司 A kind of processing method and processing device of shear plate data
CN110535634A (en) * 2019-07-12 2019-12-03 江苏宇太网智科技有限公司 Audio-video transmission system based on quantum cryptography
CN111835997A (en) * 2020-07-15 2020-10-27 济南慧云量子科技有限公司 Cloud video conference system based on quantum key encryption and decryption method thereof
CN111901553A (en) * 2020-07-16 2020-11-06 南京百家云科技有限公司 Data encryption and decryption method, device, equipment, server and storage medium
CN113328849A (en) * 2021-05-24 2021-08-31 清华大学 Key obtaining method and device
CN114499834A (en) * 2021-12-20 2022-05-13 北京邮电大学 Internet of things quantum key distribution method and system, electronic equipment and storage medium
CN115190217A (en) * 2022-07-07 2022-10-14 国家计算机网络与信息安全管理中心 Data security encryption method and device fusing self-coding network
CN115314270A (en) * 2022-07-29 2022-11-08 国网浙江省电力有限公司宁波供电公司 Power business hierarchical encryption method and communication method based on quantum key
CN115567201A (en) * 2022-09-22 2023-01-03 矩阵时光数字科技有限公司 Adaptive terminal quantum encryption and decryption method and system thereof

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110262908A (en) * 2019-06-21 2019-09-20 珠海格力电器股份有限公司 A kind of processing method and processing device of shear plate data
CN110535634A (en) * 2019-07-12 2019-12-03 江苏宇太网智科技有限公司 Audio-video transmission system based on quantum cryptography
CN110535634B (en) * 2019-07-12 2020-04-14 江苏宇太网智科技有限公司 Audio and video transmission system based on quantum encryption
CN111835997A (en) * 2020-07-15 2020-10-27 济南慧云量子科技有限公司 Cloud video conference system based on quantum key encryption and decryption method thereof
CN111901553A (en) * 2020-07-16 2020-11-06 南京百家云科技有限公司 Data encryption and decryption method, device, equipment, server and storage medium
CN113328849A (en) * 2021-05-24 2021-08-31 清华大学 Key obtaining method and device
CN114499834A (en) * 2021-12-20 2022-05-13 北京邮电大学 Internet of things quantum key distribution method and system, electronic equipment and storage medium
CN114499834B (en) * 2021-12-20 2024-05-14 北京邮电大学 Internet of things quantum key distribution method, system, electronic equipment and storage medium
CN115190217A (en) * 2022-07-07 2022-10-14 国家计算机网络与信息安全管理中心 Data security encryption method and device fusing self-coding network
CN115190217B (en) * 2022-07-07 2024-03-26 国家计算机网络与信息安全管理中心 Data security encryption method and device integrating self-coding network
CN115314270A (en) * 2022-07-29 2022-11-08 国网浙江省电力有限公司宁波供电公司 Power business hierarchical encryption method and communication method based on quantum key
CN115567201A (en) * 2022-09-22 2023-01-03 矩阵时光数字科技有限公司 Adaptive terminal quantum encryption and decryption method and system thereof
CN115567201B (en) * 2022-09-22 2024-04-19 矩阵时光数字科技有限公司 Self-adaptive terminal quantum encryption and decryption method and system thereof

Similar Documents

Publication Publication Date Title
CN109889340A (en) A kind of adaptive cipher key distribution mechanisms based on QKD network
CN108092769B (en) Quantum cipher network reliable encryption transmission system and method
CN101232368B (en) Method for distributing media stream cryptographic key and multimedia subsystem
CN106452741B (en) The communication system and communication means of the transmission of information encryption and decryption are realized based on quantum network
CN109768987A (en) A kind of storage of data file security privacy and sharing method based on block chain
CN110213652B (en) Audio and video data transmission method and device and storage medium
CN108965302A (en) Media data transmission system, method, apparatus and storage medium
KR102368749B1 (en) System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth
EP2426852B1 (en) Method and system for implementing secure forking calling session in ip multi-media subsystem
WO2009143765A1 (en) Key distributing method, public key of key distribution centre online updating method and device
CN100583989C (en) Media stream transmission method
CN101313510A (en) Media stream key management method, system and application server
Wang et al. A dependable privacy protection for end-to-end VoIP via Elliptic-Curve Diffie-Hellman and dynamic key changes
CN104618387B (en) SIP signaling is used for the method for safe quantum communication system, Integrated access quantum gateway and system
CN101330379A (en) Method and apparatus for down distributing cryptographic key
US20230208615A1 (en) Online-Streamer Image Model File Transmission in Co-Hosting During Livestreaming
CN108847928A (en) The communication system and communication means of the transmission of information encryption and decryption are realized based on group's type quantum key card
CN101222320B (en) Method, system and device for media stream safety context negotiation
CN108040269A (en) A kind of method and system of video monitoring system key agreement, computer
CN100438614C (en) Method for realizing distributing asymmetric video conference safety system
CN107846567A (en) A kind of SRTP capability negotiations method and conference terminal
JP2005295468A (en) Communication device and communication system
CN101222612A (en) Method and system for safely transmitting media stream
CN115589288A (en) Method for realizing end-to-end VoIP encrypted communication based on quantum key pre-charging
CN101729535B (en) Implementation method of media on-demand business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20190614

WW01 Invention patent application withdrawn after publication