CN109951513A - Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card - Google Patents

Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card Download PDF

Info

Publication number
CN109951513A
CN109951513A CN201910027000.3A CN201910027000A CN109951513A CN 109951513 A CN109951513 A CN 109951513A CN 201910027000 A CN201910027000 A CN 201910027000A CN 109951513 A CN109951513 A CN 109951513A
Authority
CN
China
Prior art keywords
quantum
key
file
service station
random number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910027000.3A
Other languages
Chinese (zh)
Other versions
CN109951513B (en
Inventor
富尧
钟一民
杨羽成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruban Quantum Technology Co Ltd
Original Assignee
Ruban Quantum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruban Quantum Technology Co Ltd filed Critical Ruban Quantum Technology Co Ltd
Priority to CN201910027000.3A priority Critical patent/CN109951513B/en
Publication of CN109951513A publication Critical patent/CN109951513A/en
Application granted granted Critical
Publication of CN109951513B publication Critical patent/CN109951513B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to the anti-quantum calculation wired home quantum cloud storage method and systems based on quantum key card, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, private key, unsymmetrical key pond and public key pointer random number are stored in each quantum key card, the mobile terminal, the home gateway, the secure cloud quantum key card in be also stored with third pool of symmetric keys, and all pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;When the wired home component communicates accessing file with secure cloud, the file is signed and is verified to file using asymmetric arithmetic using the quantum key card of both sides;When transmitting a document between the wired home component and quantum communications service station and between quantum communications service station and secure cloud, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.

Description

Anti- quantum calculation wired home quantum cloud storage method based on quantum key card and System
Technical field
The present invention relates to intelligent home equipment technical field, especially a kind of anti-quantum calculation intelligence based on quantum key card Home communications method.
Background technique
With the continuous development of informationization technology and social economy, people's lives level has obtained continuous raising, raw Movable joint, which is played, also gradually to be accelerated, and residents can conveniently and efficiently be enjoyed intelligent, comfortable, efficient and safe by terminals such as mobile phones Home life.With gradually increasing for home intelligence equipment, people propose the intelligent operation of household equipment higher It is required that.Guarantee the safety of data in general intelligence household equipment communication means using asymmetric-key encryption, it is asymmetric close Key encryption needs to be respectively completed encrypt and decrypt operation using different keys, one publishes, i.e. public key, another by User oneself is secret to be saved, i.e. private key.Information transmitter goes to encrypt with public key, and information receiver goes to decrypt with private key;Or Information transmitter goes to encrypt with private key, and information receiver goes to decrypt with public key.
Communication encryption and transmission safety traditional at present, has relied on complicated mathematical algorithm.I.e. due to calculating at present The computing capability of machine is limited, and has little time to calculate within the period where demand as a result, it can be said that present number is close Code system is safe.But this Safety Situation is increasingly by the threat of quantum computer.For example, for classics Asymmetric key algorithm in cryptography, there are dedicated quantum computer algorithms (shor algorithm etc.) to be cracked.It is calculating In face of the powerful quantum computer of ability, even advanced secret communication again, as long as all can by current means of communication Face the possibility for being decrypted and eavesdropping.Therefore, it has been extremely urgent for establishing actually available a whole set of quantum communication network scheme Rigid need.
As most people is understood, quantum computer has great potential in password cracking.Mainstream is non-now Symmetrically (public key) Encryption Algorithm, such as RSA cryptographic algorithms, it is most of to be all based in factorization or the finite field of big integer The two difficult math questions of the calculating of discrete logarithm.Their difficulty that cracks also is dependent on the efficiency solved these problems.Tradition On computer, it is desirable that solve the two difficult math questions, the cost time is the exponential time (to crack the time with the growth of public key length Increased with exponential), this is unacceptable in practical applications.It and is that your elegant algorithm for making to measure of quantum computer can be with In polynomial time (time is cracked as the growth of public key length is increased with the speed of k power, wherein k is long with public key Spend unrelated constant) carry out integer factorization or discrete logarithm and calculate, thus for RSA, discrete logarithm Encryption Algorithm it is broken Solution provides may.
Problem of the existing technology:
(1) in the prior art, home gateway does not have reliable safeguard procedures.Home gateway is the central network of wired home Member, and have Internet networking capability, it is more likely that infected virus wooden horse, thus the information that is stolen;Or it is led by attack Paralysis is caused, so as to cause the paralysis of entire wired home scheme.
(2) in the prior art, mobile terminal key storage is exposed to the virus of mobile terminal in mobile terminal memory Under the threat of wooden horse, it can be stolen by Malware or malicious operation.
(3) corresponding private key is obtained quickly through public key due to quantum calculation function, existing foundation is in public and private key Wired home communication means on basis is easy to be cracked by quantum computer.
(4) in the prior art, the outputting and inputting for digital signature based on public and private key can be known to enemy, in quantum meter In the presence of calculation machine, it may be derived private key, cause to establish the wired home communication system on public and private key basis It is cracked by quantum computer.
(5) in the prior art, the file in cloud storage does not use digital signature such as, by the effect of not resisting denying, if There is illegal file, it may be difficult to trace source.Even if using digital signature, there is also because private key it is stolen caused by illegally sign Name.
(6) in the prior art, it is understood that there may be illegal user uses cloud, leads to safety problem.
(7) cloud storage key does not have hardware protection such as, not safe enough.
(8) the ssl protocol consult session key that cloud storage generally uses public key system is uploaded, which can be by quantum calculation Machine cracks.
Summary of the invention
The present invention provides a kind of anti-quantum calculation wired home quantum cloud storage method based on quantum key card, including intelligence Can family's component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home gateway And mobile terminal, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, each quantum Private key, unsymmetrical key pond and public key pointer random number are stored in key card, wherein unsymmetrical key pond is stored with each side Public key, corresponding with either one private key public key is obtained in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys is also stored in the quantum key card of the mobile terminal, the quantum of the home gateway is close It is also stored with the second pool of symmetric keys in key card, is also stored with third pool of symmetric keys in the quantum key card of the secure cloud, And all pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is adopted using the quantum key card of both sides File is signed and verified with asymmetric arithmetic;
Turn between the wired home component and quantum communications service station and between quantum communications service station and secure cloud When fat file, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
Optionally, when the wired home component communicates storage file to secure cloud, include: at wired home component
File is signed using private key to obtain file signature;
It generates and utilizes true random number RMAnd utilize true random number RMKey K is extracted from pool of symmetric keysM
Utilize key KMEncryption file and file signature obtain file cipher text, then by file cipher text together with true random number RM It is sent to quantum communications service station.
Optionally, the wired home component and secure cloud and same quantum communications service station direct communication, in the amount Sub- communication service station includes:
Receive file cipher text and true random number R from the wired home componentM
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM
Utilize key KMDecryption file cipher text obtains file and file signature;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are encrypted using key Kss and obtains file cipher text, then File cipher text is sent to the secure cloud together with true random number Rss.
Optionally, the wired home component and quantum communications service station QMDirect communication, the secure cloud and quantum are logical Telecommunications services station Qss direct communication;In the quantum communications service station QMInclude:
Receive file cipher text and true random number R from the wired home componentM
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM
Utilize key KMDecryption file cipher text obtains file and file signature;
To the true random number RMAnd file and file signature stood between sign and station between the mode that encrypts until It is sent to quantum communications service station Qss;
Include: in the quantum communications service station Qss
File and file signature are obtained by the way of decrypting between verifying and standing between station;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are encrypted using key Kss and obtains file cipher text, then File cipher text is sent to the secure cloud together with true random number Rss.
Optionally, include: in the secure cloud
Receive file cipher text and true random number Rss from the quantum communications service station with secure cloud direct communication;
Key Kss is extracted from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are obtained using key Kss decryption file cipher text;
Utilize unsymmetrical key pond in conjunction with the public key pointer random number in the quantum communications service station with secure cloud direct communication Obtain the public key in quantum communications service station;
The dual signature is verified using the public key in the quantum communications service station;
Wired home group is obtained using unsymmetrical key pond in conjunction with public key pointer random number corresponding with wired home component The public key of part;
The file signature is verified using the public key of the wired home component;
Storage is encrypted after being verified.
Optionally, the wired home component further includes household equipment, the household equipment via the home gateway to Secure cloud accessing file;The household equipment to the home gateway send file when include:
It signs to file;
The key K of true random number form is generated using quantum key card;
File is encrypted using key K and file signature obtains ciphertext, and uses the public key encryption key K of home gateway;
The key K and ciphertext of encryption are sent to home gateway;
Home gateway is decrypted with after verifying, and obtained file is sent to secure cloud.
Optionally, when the wired home component downloads file from secure cloud, comprising:
Downloading request is sent to secure cloud via quantum communications service station;
Secure cloud mutually should download request and extract corresponding document;
Quantum communications service station is sent to after file is signed and encrypted;
It is sent after carrying out dual signature and encryption to obtained file and file signature after the decryption of quantum communications service station Give wired home component;
Wired home component is accordingly decrypted and is verified.
Optionally, corresponding identity is also sent when each side communicates, recipient is close in quantum using the identity Public key pointer random number corresponding with identity is obtained in key card on demand.
Optionally, legitimate user's list is stored in the secure cloud, secure cloud verifies other side according to the identity Identity.
The present invention also provides a kind of anti-quantum calculation wired home quantum cloud storage system based on quantum key card, including Wired home component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home network It closes and mobile terminal, each wired home component and quantum communications service station and secure cloud is respectively provided with quantum key card, it is each to measure Private key, unsymmetrical key pond and public key pointer random number are stored in sub-key card, wherein unsymmetrical key pond is stored with respectively The public key of side obtains public key corresponding with either one private key in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys is also stored in the quantum key card of the mobile terminal, the quantum of the home gateway is close It is also stored with the second pool of symmetric keys in key card, is also stored with third pool of symmetric keys in the quantum key card of the secure cloud, And all pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is adopted using the quantum key card of both sides File is signed and verified with asymmetric arithmetic;
Turn between the wired home component and quantum communications service station and between quantum communications service station and secure cloud When fat file, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
Quantum key card of the present invention is combined with cryptological technique, hardware security isolation technology, quantum physics technology and (takes Carry quantum random number generator in the case where) authentication and encryption and decryption product.The embedded chip of quantum key card and operation System can provide the functions such as secure storage and the cryptographic algorithm of key.Due to it with independent data-handling capacity and well Safety, quantum key card become private key and pool of keys safety barrier.Each quantum key card can have hardware PIN code Protection, PIN code and hardware constitute two necessary factors that user uses quantum key card, i.e., so-called " double factor authentication ", use Family only has while obtaining the quantum key card and user's PIN code that save relevant authentication information, just can be with login system.Use The PIN code at family is leaked, as long as the quantum key card that user holds is not stolen, the identity of legitimate user would not be counterfeit; If the quantum key card of user is lost, the person of picking up also cannot counterfeit the identity of legitimate user due to not knowing user's PIN code. In short, quantum key card appears in the top-secret information such as key in the disk and memory of host with plaintext version, so as to The safety of top-secret information is effectively ensured.
Mobile terminal and home gateway in wired home member are equipped with quantum key card, quantum communications service station and Secure cloud is also equipped with quantum key card, stores key using quantum key card.Quantum key card is independent hardware device, quilt A possibility that Malware or malicious operation steal key substantially reduces.Meanwhile disclosed in each wired home member utilization Anti- quantum calculation public key extracted in conjunction with the unsymmetrical key pond needed for wired home member public key, and wired home member Public key be stored in quantum key card, guarantee that quantum computer is unable to get client public key, and then be unable to get corresponding private Key, therefore reduce and risk is cracked by quantum computer.In addition, digital signature is added to be uploaded to each file of secure cloud, And the digital signature based on public and private key is further encrypted by random number key, forms the digital signature of encryption.Even if in quantum meter In the presence of calculation machine, it is also difficult to be derived private key.Therefore the program is not easy to be cracked by quantum computer.Disappear to every Digital signature is added in breath, can specify the true source of every message, improve the safety of intelligent home system.Also in safety It is stored with legitimate user's list on cloud, can prevent illegal user from using secure cloud.
Detailed description of the invention
Fig. 1 is wired home networking diagram provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram in quantum key card key area;
(a) partially illustrates the structure of home gateway quantum key card in figure;
(b) partially illustrates the structure of household equipment quantum key card in figure;
(c) partially illustrates the structure of quantum communications service station quantum key card in figure.
Fig. 3 is public key storage mode flow chart provided in an embodiment of the present invention;
Fig. 4 is public key reading manner flow chart provided in an embodiment of the present invention;
Fig. 5 is the flow chart provided in an embodiment of the present invention for generating key;
The structure chart of Fig. 6 message between mobile terminal and quantum communications service station;
Fig. 7 is the message structure figure for the request that household equipment is sent to home gateway;
Fig. 8 is the message structure figure that home gateway is sent to household equipment.
Specific embodiment
Technique on Quantum Communication is the emerging safety communication technology set up based on quantum physics.The quantum communications in China Technology has come into the practical stage, and application prospect and strategic importance also result in local government and important industry to it The extensive concern of industry development.In addition to establishing quantum communications main line, some scale metropolitan areas quantum communication network has also been built It is set as function and runs.Based on metropolitan area quantum communication network, there has also been preliminary applications, it can be achieved that high confidentiality for Technique on Quantum Communication Video speech communication etc. application.The quantum communication networks such as quantum communications main line and quantum communications Metropolitan Area Network (MAN) form quantum communications Network, essence are quantum key distribution (QKD).Therefore the quantum communication network set up based on QKD technology can claim For QKD network.
Although current quantum Metropolitan Area Network (MAN) can permit the high safety characteristic that user accesses and enjoys quantum network, It is still the weakness in entire quantum communication network that user, which accesses the part of quantum network, at present.After one side quantum key distribution Key to arrive safe and sound in user hand be a very big problem, there is the risk for being stolen or distorting;On the other hand, same The number of users that quantum key distribution equipment can connect is limited, can not connect a large number of users simultaneously.Therefore it needs to access in user The part of quantum network is solved the above problems by the way of quantum communications service station:
(1) role of the quantum communications service station as similar operator, on the one hand establishes cooperative relationship with QKD network, real The guarantee of existing secure connection, to guarantee that quantum key can be with secure distribution to quantum communications service station;On the other hand, quantum is logical Telecommunications services station is that user issues quantum key card, quantum random number key is presented to user, while itself saving user and being gathered around Some keys are, it can be achieved that secure communication between quantum communications service station and user.
(2) mode that quantum communications service station can build as cluster server can access a large number of users simultaneously.
In wired home quantum communications scheme, mobile terminal, home gateway are the user in quantum communications service station, amount Issue quantum key card respectively for it in sub- communication service station.
In the present embodiment, wired home member has matched quantum key card, and the side of issuing of quantum key card is quantum The administrative department of the supervisor side of key card, generally wired home itself or wired home such as residential property, quantum key The member that the side of being awarded of card is managed by the supervisor side of quantum key card, the generally kinsfolk of wired home, maintenance people Member and visitor.
With the unsymmetrical key pond for storage of public keys in quantum key card.It is all that unsymmetrical key pond possesses this tissue Using the public key of the user of public private key system, and each public key ID corresponding with the public key is corresponded.Including home gateway, The public key of household equipment, mobile terminal.
The storage mode of public key is as shown in Figure 3, the specific steps are as follows: takes public key pointer random number rk at random to some user (i.e. the storage location parameter of public key) obtains public key pointer rkp in conjunction with specific public key pointer function frkp and from corresponding non- Corresponding position in pool of symmetric keys is stored in the public key krk of the user.Key mode is read as shown in figure 4, mode and storage are close Key mode is identical.Public key pointer random number rk is announced as anti-quantum calculation public key.
Wired home structure is as shown in Figure 1, home gateway (S) is the pipe for connecting all household equipments with routing function Reason center.It can be connected by Wifi or Internet with mobile terminal.Assume that its ID is SID herein.For convenience of receiving party Processing, SID include its public key pointer random number, it may also be used for the Q pool of keys in specified quantum communication service station.Home gateway amount Sub-key is positioned in inside home gateway, is typically embodied as the form of key board.Specific structure is as shown in the part Fig. 2 (a), card Interior further includes Q pool of keys in addition to including unsymmetrical key pond, public key pointer random number and private key, and Q pool of keys comes from quantum communications Service station, and its key is private cipher key, each member is different.Q pool of keys is not only stored in the quantum key of the member In card, it is also stored in the quantum key card in the matched quantum communications service station of the member.
Household equipment (C) includes monitoring camera, opal, door lock, intelligent switch, video server, monitoring server etc.. Assume that its ID is CID herein.For convenience of receiving party's processing, CID includes its public key pointer random number.Household equipment uses C Quantum key card, specific structure is as shown in the part Fig. 2 (b).Difference with home gateway quantum key card be without be used for and amount The Q pool of keys of sub- communication service station connection.
Mobile terminal (M) includes the mobile phone of home owner, tablet computer etc..House can be accessed by Wifi or Internet Front yard gateway simultaneously controls household equipment.Assume that its ID is MID herein.For convenience of receiving party's processing, MID includes that its public key refers to Needle random number, it may also be used for the Q pool of keys in specified quantum communication service station.Mobile terminal uses mobile terminal quantum key Card, storage inside key zone are identical as home gateway.Unlike the quantum key card be typically embodied as SDKEY or UKEY or The portable forms such as cell phone mainboard chip.
Secure cloud (SS) refers to public cloud or wired home private clound, for storing the encryption data of wired home, such as Video, image, text and other kinds of data.The safety of the cloud guarantees by quantum key card, will not be by the key of data It is exposed to the manager of cloud, therefore the Various types of data of user's storage is without having to worry about its safety.Assume that its ID is SSID herein.For Receiving party is facilitated to handle, SSID includes its public key pointer random number, it may also be used for the Q in specified quantum communication service station is close Key pond.Secure cloud uses secure cloud quantum key card, and storage inside key zone is identical as home gateway.The difference is that secure cloud Quantum key card is also stored with legitimate user's list, which is formed by user registration, list member with public key pointer with The mode of machine number indicates, and the user list can be modified maintenance by quantum key card administrator.
Quantum communications service station includes quantum service centre, is mainly used for each user terminal by classic network and user side It communication connection and is communicated to connect with other quantum communication service stations, classic network includes but is not limited to telecommunications network, internet, wide Broadcast television network or other communication networks etc.;Further include quantum key distribution equipment, is mainly used for realizing by QKD mode between station Quantum key is shared.Quantum communications service station uses Q quantum key card, and internal structure is as shown in the part Fig. 2 (c).Wherein, Q Unsymmetrical key pond in quantum key card is same with intelligent home system.In addition to unsymmetrical key pond, Q quantum key card The list of legitimate service station is also preserved, which is registered by quantum communications service station operation maintenance personnel and formed, and list member is used The mode of public key pointer random number indicates, and the service station list can be modified maintenance by quantum key card administrator.Q quantum Key card includes multiple Q pool of keys, respectively corresponds matched each home gateway or mobile terminal in quantum communications service.This Text assumes that the ID in quantum communications corresponding with M service station is QIDM, similarly the ID in quantum communications corresponding with S service station be QIDS.For convenience of receiving party's processing, QID includes its public key pointer random number, it may also be used for specified and matched home network Pass or the corresponding Q pool of keys of mobile terminal.
Embodiment 1
The present embodiment is the upper transmitting file of wired home member to secure cloud, and the upper transmitting file of wired home member to secure cloud divides For following three kinds of situations: transmitting file is to secure cloud on mobile terminal M, and transmitting file is to secure cloud, household equipment C on home gateway S Upper transmitting file is to secure cloud.
Situation 1: transmitting file is to secure cloud on mobile terminal.As shown in Figure 1, mobile terminal by quantum communication service station to Transmitting file in secure cloud.
Step 1.1.1: file is sent to quantum communications service station by mobile terminal.
Mobile terminal M generates true random number R according to the real random number generator in matched quantum key cardM(following letter Claim RM, other Chinese character parts that similarly save are as referred to as).RMPointer P is obtained in conjunction with specific key schedule fM。PMIt is directed toward M Q pool of keys in certain a part, corresponding key K can be extracted in the pool of keysM.File F is encrypted using the key Ciphertext is obtained with file signature MS, then by ciphertext together with true random number RMAnd to be sent to mobile terminal together matched by MID Quantum communications service station QM, message structure as shown in fig. 6, be represented by MID | | RM||{F||SM}KM}.File signature S hereinM That is mobile terminal M is digitally signed algorithm to original and obtains file signature SM
Step 1.1.2: quantum communications transmit information between service station.
Quantum communications service station QMReceive encryption message and R from mobile terminal MMAnd after MID, R is usedMIn conjunction with spy Fixed key schedule f obtains pointer PM, pass through PMIt is being specified by MID and is being extracted in the matched Q pool of keys of mobile terminal M Corresponding key K outM
Quantum communications service station QMUse KMCiphertext is decrypted to obtain file F and file signature SM。 QMIt is taken out with MID The public key of M, method are shown in Fig. 4;With the public key of M to SMSignature verification is carried out, stops handling if authentication failed;If being proved to be successful Continue follow-up process.Use QMPrivate key to MID, original F and SMIt is digitally signed algorithm and obtains file signature SQM.Combination At new information, be represented by MID | | F | | SM||SQM}。
It is delivered to and the matched quantum communications service station Q of secure cloud SSSSPlace.Quantum communications service station QMWith amount Sub- communication service station QSSQuantum key is shared between being stood using the realization of respective quantum key distribution equipment, so that plaintext version Entire message is in quantum communications service station QMQuantum communications service station Q is sent to after encryptionSS, then decrypted recover plaintext version Entire message.The entire message content transmitted herein includes QIDMAnd by QKD key encrypt MID | | F | | SM|| SQM}。
Quantum communications service station QMWith quantum communications service station QSSBetween if will also by other network node transfers, It is formed between two quantum communications service stations (or network node) of direct communication connection by corresponding quantum key distribution equipment Station between quantum key, and successively transfer transmit ciphertext.During transfer, other network nodes pass through QIDMObtain QMPublic key Pointer random number simultaneously further obtains QMPublic key, check QMPublic key pointer random number whether belong to the legal clothes in this service station Business station list stops handling if being not belonging to;If belonged to, continue follow-up process.Use QMPublic key to SQMIt is digitally signed and tests Card, stops handling if authentication failed;If being proved to be successful, continue follow-up process.SQMIt is verified this quantum after trusting this document Communication service station makes the file signature of oneself, i.e., using the private key of oneself to MID, original and SMIt is digitally signed algorithm Obtain file signature.Entire message is encrypted using QKD key.Before the ID of oneself is attached to the entire message of encryption, transmitting To next network node.
Between standing the distribution of quantum key be by the strange land key that fundamental principles of quantum mechanics is realized it is shared in the way of, preferably For BB84 agreement.
Step 1.1.3: transmitting file is to secure cloud on quantum communications service station.
Quantum communications service station QSSAfter receiving message, pass through QIDMObtain QMPublic key pointer random number and further obtain QMPublic key, detailed process is as shown in Figure 4.Check QMPublic key pointer random number whether belong to the legitimate service station in this service station List stops handling if being not belonging to;If belonged to, continue follow-up process.Use QMPublic key to SQMVerifying is digitally signed, Stop handling if authentication failed;If being proved to be successful, continue follow-up process.
SQMIt is verified the file signature that this quantum communications service station after trusting this document makes oneself, that is, uses oneself Private key is to MID, original and SMIt is digitally signed algorithm and obtains file signature SQSS
Quantum communications service station QSSTrue random number is generated according to the real random number generator in matched quantum key card RSS, RSSPointer P is obtained in conjunction with specific key schedule fSS, PSSDirection is specified close with the matched Q of secure cloud SS by SSID Certain a part in key pond, can extract corresponding key K in the pool of keysSS.It is obtained using key encryption message close Text is represented by QIDSS||RSS||{MID||F||SM||SQSS}KSS, pass to next network node i.e. SS.
Step 1.1.4: secure cloud receives file and is stored.
Secure cloud SS receives to come from QSSMessage after, by RSSPointer P is obtained in conjunction with specific key schedule fSS, lead to Cross PSSCorresponding key K is extracted in Q pool of keysSS.Use KSSDecryption ciphertext obtain MID | | F | | SM||SQSS}.SS is used QIDSSTake out QSSPublic key, method is shown in Fig. 4;Use QSSPublic key to SQSSSignature verification is carried out, stops handling if authentication failed; If being proved to be successful, continue follow-up process.SS verifies MID, if it exists in legitimate user's list, then passes through verifying.It is logical It crosses after verifying through the public key pointer random number of MID acquisition M and further obtains the public key of M, detailed process is as shown in Figure 4.Make Verifying is digitally signed to file with the public key of M, is verified, trusts the message.
After being verified to message, secure cloud generates file according to the real random number generator in matched quantum key card Key encrypts file and its signature using the key, and using the secure key encryption file key in quantum key card, will MID, the file of the file key of encryption and encryption and its signature storage are into cloud storage space.
Particularly, when mobile terminal and the matched quantum communications service station of secure cloud are same, mobile terminal M is to peace The process specific steps of transmitting file are described as follows on full cloud:
Step 1.2.1. mobile terminal encrypts file.
Mobile terminal M will generate true random number R according to the real random number generator in matched quantum key cardM。RMKnot It closes specific key schedule f and obtains pointer PM。PMCertain a part being directed toward in the Q pool of keys of M, can be in the pool of keys Extract corresponding key KM.File F and file signature S is encrypted using the keyMObtain ciphertext, then by ciphertext together with very with Machine number RMAnd MID is sent to the matched quantum communications service station Q of mobile terminal together, message structure is as shown in fig. 6, can indicate So that MID | | RM||{F||SM}KM}.File signature S hereinMI.e. mobile terminal M is digitally signed algorithm to original and obtains File signature SM
Step 1.2.2: upper transmitting file to secure cloud.
Quantum communications service station Q receives encryption message and R from mobile terminal MMAnd after MID, R is usedMIn conjunction with specific Key schedule f obtain pointer PM, pass through PMIt is being specified by MID and is being extracted in the matched Q pool of keys of mobile terminal M Corresponding key KM
Quantum communications service station Q uses KMCiphertext is decrypted to obtain file F and file signature SM.M is taken out by MID Public key, method is shown in Fig. 4;With the public key of M to SMSignature verification is carried out, stops handling if authentication failed;If being proved to be successful Continue follow-up process.It is verified the file signature that quantum communications service station Q after trusting this document makes oneself, that is, uses oneself Private key to MID, original and SMIt is digitally signed algorithm and obtains file signature SQ
Quantum communications service station Q generates true random number R according to the real random number generator in matched quantum key cardSS, RSSPointer P is obtained in conjunction with specific key schedule fSS, PSSBe directed toward specified by SSID with the matched Q key of secure cloud SS Certain a part in pond, can extract corresponding key K in the pool of keysSS.It is obtained using key encryption message close Text is represented by QID | | RSS||{MID||F||SM||SQ}KSS, pass to next network node i.e. SS.
Step 1.2.3: secure cloud receives file and is stored.
After secure cloud SS receives the message from Q, by RSSPointer P is obtained in conjunction with specific key schedule fSS, pass through PSSCorresponding key K is extracted in Q pool of keysSS.Use KSSDecryption ciphertext obtain MID | | F | | SM||SQ}.SS is taken with QID The public key of Q, method are shown in Fig. 4 out;With the public key of Q to SQSignature verification is carried out, stops handling if authentication failed;Such as it is proved to be successful Then continue follow-up process.SS verifies MID, if it exists in legitimate user's list, then passes through verifying.After verifying The public key pointer random number of M is obtained by MID and further obtains the public key of M, and detailed process is as shown in Figure 4.Use the public affairs of M Key is digitally signed verifying to file.As a result unanimously then trust the message.
After being verified to message, secure cloud generates file according to the real random number generator in matched quantum key card Key encrypts file and its signature using the key, and using the secure key encryption file key in quantum key card, will MID, the file of the file key of encryption and encryption and its signature storage are into cloud storage space.
Situation 2: transmitting file is to secure cloud on home gateway.The mistake of detailed process and transmitting file on mobile terminal to secure cloud Cheng Xiangtong.
Situation 3: household equipment is by transmitting file on home gateway to secure cloud.As shown in Figure 1, household equipment passes through family Gateway transmitting file in secure cloud.
Step 1.3.1: file is sent to home gateway by household equipment.
Household equipment C generates key K according to the real random number generator in matched quantum key card, is added using the key Ciphertext part F and file signature SC, and use the public key encryption key K of S.CID, the key K of encryption and ciphertext are sent to house Front yard gateway S.Ciphertext uses key K to encrypt file F and file signature S hereinC, signature is household equipment C to original herein It is digitally signed algorithm and obtains file signature SC.Message structure as shown in fig. 7, be represented by CID | | { K } PKS||{F|| SC}K}。
Step 1.3.2: file is uploaded to secure cloud by home gateway.
After security gateway S receives the message from household equipment C, CID is verified, if it exists in legitimate user's list In, then pass through verifying.By decrypting to obtain key K using the private key of oneself after verifying, file and label are obtained using K decoding request Name.The public key of C is obtained by CID, method is shown in Fig. 4.Verifying is digitally signed to file using the public key of C, as a result unanimously then Trust the message.
The signature after verifying to documenting security gateway is completed, file and signature are uploaded by quantum communication service station To secure cloud SS, described in specific steps and situation 1 identical.
Step 1.3.3: secure cloud receives file and is stored.
Specific steps describe identical with step 1.1.4 in situation 1.
Embodiment 2
The present embodiment is that wired home member downloads file from secure cloud, and wired home member downloads file from secure cloud Be divided into following three kinds of situations: mobile terminal M downloads file from secure cloud, and home gateway S downloads file from secure cloud and family sets Standby C downloads file from secure cloud.
Situation 1: mobile terminal downloads file from secure cloud.
Step 2.1.1: mobile terminal sends downloading file request to secure cloud.
The downloading file request that mobile terminal is sent to secure cloud carries out transfer by quantum communication service station, and request includes The MID of mobile terminal.
Step 2.1.2: quantum communications service station obtains and transmits file.
After secure cloud SS receives the request of downloading file, MID is verified, if it exists in legitimate user's list, then Pass through verifying.Respective encrypted file is extracted by secure cloud SS after verifying and it is decrypted using file key.
Secure cloud SS generates true random number R according to the real random number generator in matched quantum key cardSS, RSSIn conjunction with Specific key schedule f obtains pointer PSS, PSSCertain a part being directed toward in the Q pool of keys of secure cloud SS, can be close at this Corresponding key K is extracted in key pondSS.Secure cloud uses key KSSEncrypt file F and signature SSSCiphertext is obtained, it then will be close Text is together with true random number RSSAnd SSID is sent to quantum communications service station Q togetherSS, message structure be represented by SSID | | RSS ||{F||SSS}KSS}.File signature S hereinSSThat is secure cloud SS is digitally signed algorithm to original and obtains file signature SSS
With the matched quantum communications service station Q of secure cloud SSSSThe file F and signature of encryption are obtained from secure cloud SS SSS, pass through RSSObtain KSSAfter be decrypted to obtain file, obtained by SSID after the public key of SS to SSSSignature verification is carried out, such as Authentication failed then stops handling;If being proved to be successful, continue follow-up process.Use QSSPrivate key to SSID, original F and SSSInto Row Digital Signature Algorithm obtains file signature SQSS.It is combined into new information, be represented by SSID | | F | | SSS||SQSS}。
It is delivered to and the matched quantum communications service station Q of mobile terminal MMPlace.It will be new by information transmission between station Message is sent to and the matched quantum communications service station Q of mobile terminal MM.If mobile terminal M and secure cloud SS is matched is If the same quantum communications service station, then do not need to transmit by information between station.Signature and sign test step in detailed process Message transmitting procedure is consistent between station described in embodiment 1.Quantum communications service station QMAfter obtaining simultaneously trust messages, according to Real random number generator in matched quantum key card generates true random number RM, RMIt is obtained in conjunction with specific key schedule f Pointer PM, PMDirection is specified a part of with certain in the matched Q pool of keys of mobile terminal M by MID, can be in the pool of keys Extract corresponding key KM.Ciphertext is obtained using key encryption message, is represented by QIDM||RM||{SSID||F||SSS|| SQM}KM, pass to next network node i.e. mobile terminal M.
Step 2.1.3: acquisition for mobile terminal file.
Mobile terminal M is from quantum communications service station QMAfter obtaining message, by RMIt is obtained in conjunction with specific key schedule f Pointer PM, pass through PMCorresponding key K is extracted in Q pool of keysM.Use KMDecryption file cipher text obtain SSID | | F | | SSS| |SQM}.M QIDMTake out QMPublic key, method is shown in Fig. 4;Use QMPublic key to SQMSignature verification is carried out, is stopped if authentication failed Only handle;If being proved to be successful, continue follow-up process.The public key pointer random number of SS is obtained by SSID and further obtains SS Public key, detailed process is as shown in Figure 4.Verifying is digitally signed to file using the public key of SS, is verified then to trust and be somebody's turn to do Message.File is obtained after verifying signature.
Situation 2: home gateway downloads file from secure cloud.Detailed process and mobile terminal download the mistake of file from secure cloud Cheng Xiangtong.
Situation 3: household equipment downloads file from secure cloud by home gateway.
Step 2.3.1: household equipment sends to home gateway and requests.
Household equipment C generates key K according to the real random number generator in matched quantum key card1, use the key CIPHERING REQUEST request, and use the public key encryption key K of S1.By CID, the key K of encryption1And request ciphertext is sent to Home gateway S, message structure be represented by CID | | { K1}PKS||{request||SC}K1}.Request ciphertext uses herein Key K1CIPHERING REQUEST and signature, signature i.e. household equipment C is digitally signed algorithm to original request and obtains the signature herein.Disappear Structure is ceased as shown in Fig. 7.
Step 2.3.2: home gateway processing request and response.
After security gateway S receives the request from household equipment C, CID is verified, if it exists in legitimate user's list In, then pass through verifying.It decrypts to obtain key K using the private key of oneself by security gateway S after verifying1, use K1Decoding request is close Text is requested and is signed.Using being verified after the public key decryptions signature of C to signature, it is verified, trusts the request.
Security gateway S passes through file F and text that quantum communication service station obtains encryption from secure cloud SS after completing verifying Part signature SC.Detailed process is shown in 2 situation 1 of embodiment.Household equipment C is sent the file to after verifying to file signature.Family Front yard gateway S generates random number K according to the real random number generator in matched quantum key card2, file is encrypted using the key, And use the public key encryption key K of C2, by SID, the key K of encryption2, encryption file F and signature SSIt is sent to household equipment C, Message structure be represented by SID | | { K2}PKC||{F||SS}K2}.Sign S hereinSThat is home gateway S counts original Word signature algorithm obtains the signature.Message structure is as shown in Figure 8.
Step 2.3.3: household equipment obtains file.
After household equipment C has received the response from home gateway S, decrypt to obtain key K using the private key of oneself2, make Use K2Decryption response ciphertext obtains file and signature.Using the public key of S to SSSignature verification is carried out, if authentication failed at stopping Reason;If being proved to be successful, continue follow-up process.After being proved to be successful, file is obtained.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (10)

1. the anti-quantum calculation wired home quantum cloud storage method based on quantum key card, which is characterized in that including intelligent family Front yard component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home gateway and shifting Dynamic terminal, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, each quantum key Private key, unsymmetrical key pond and public key pointer random number are stored in card, wherein unsymmetrical key pond is stored with the public affairs of each side Key obtains public key corresponding with either one private key in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys, the quantum key card of the home gateway are also stored in the quantum key card of the mobile terminal It is inside also stored with the second pool of symmetric keys, third pool of symmetric keys, and institute are also stored in the quantum key card of the secure cloud Some pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is using the quantum key card of both sides using non- Symmetry algorithm is signed and is verified to file;
Text is forwarded between the wired home component and quantum communications service station and between quantum communications service station and secure cloud When part, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
2. the anti-quantum calculation wired home quantum cloud storage method based on quantum key card as described in claim 1, special Sign is, when the wired home component communicates storage file to secure cloud, includes: at wired home component
File is signed using private key to obtain file signature;
It generates and utilizes true random number RMAnd utilize true random number RMKey K is extracted from pool of symmetric keysM
Utilize key KMEncryption file and file signature obtain file cipher text, then by file cipher text together with true random number RMIt sends To quantum communications service station.
3. the anti-quantum calculation wired home quantum cloud storage method based on quantum key card as claimed in claim 2, special Sign is, the wired home component and secure cloud and same quantum communications service station direct communication take in the quantum communications Business station includes:
Receive file cipher text and true random number R from the wired home componentM
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM
Utilize key KMDecryption file cipher text obtains file and file signature;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature, which are encrypted, using key Kss obtains file cipher text, it then will be literary Part ciphertext is sent to the secure cloud together with true random number Rss.
4. the anti-quantum calculation wired home quantum communications method based on quantum key card as claimed in claim 2, feature It is, the wired home component and quantum communications service station QMDirect communication, the secure cloud and quantum communications service station Qss Direct communication;In the quantum communications service station QMInclude:
Receive file cipher text and true random number R from the wired home componentM
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM
Utilize key KMDecryption file cipher text obtains file and file signature;
To the true random number RMAnd file and file signature stood between sign and station between the mode that encrypts until being sent to Quantum communications service station Qss;
Include: in the quantum communications service station Qss
File and file signature are obtained by the way of decrypting between verifying and standing between station;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature, which are encrypted, using key Kss obtains file cipher text, it then will be literary Part ciphertext is sent to the secure cloud together with true random number Rss.
5. the anti-quantum calculation wired home quantum communications method based on quantum key card as described in claim 3 or 4, special Sign is, includes: in the secure cloud
Receive file cipher text and true random number Rss from the quantum communications service station with secure cloud direct communication;
Key Kss is extracted from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are obtained using key Kss decryption file cipher text;
It is obtained using unsymmetrical key pond in conjunction with the public key pointer random number in the quantum communications service station with secure cloud direct communication The public key in quantum communications service station;
The dual signature is verified using the public key in the quantum communications service station;
Wired home component is obtained using unsymmetrical key pond in conjunction with public key pointer random number corresponding with wired home component Public key;
The file signature is verified using the public key of the wired home component;
Storage is encrypted after being verified.
6. the anti-quantum calculation wired home quantum communications method based on quantum key card as claimed in claim 5, feature It is, the wired home component further includes household equipment, and the household equipment is accessed via the home gateway to secure cloud File;The household equipment to the home gateway send file when include:
It signs to file;
The key K of true random number form is generated using quantum key card;
File is encrypted using key K and file signature obtains ciphertext, and uses the public key encryption key K of home gateway;
The key K and ciphertext of encryption are sent to home gateway;
Home gateway is decrypted with after verifying, and obtained file is sent to secure cloud.
7. the anti-quantum calculation wired home quantum communications method based on quantum key card as described in claim 1, feature It is, when the wired home component downloads file from secure cloud, comprising:
Downloading request is sent to secure cloud via quantum communications service station;
Secure cloud mutually should download request and extract corresponding document;
Quantum communications service station is sent to after file is signed and encrypted;
Intelligence is sent to after carrying out dual signature and encryption to obtained file and file signature after the decryption of quantum communications service station It can family's component;
Wired home component is accordingly decrypted and is verified.
8. the anti-quantum calculation wired home quantum communications method based on quantum key card as described in claim 1, feature It is, each side also sends corresponding identity when communicating, recipient is on-demand in quantum key card using the identity Obtain public key pointer random number corresponding with identity.
9. the anti-quantum calculation wired home quantum communications method based on quantum key card as claimed in claim 8, feature It is, legitimate user's list is stored in the secure cloud, and secure cloud verifies other side's identity according to the identity.
10. the anti-quantum calculation wired home quantum cloud storage system based on quantum key card, which is characterized in that including intelligent family Front yard component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home gateway and shifting Dynamic terminal, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, each quantum key Private key, unsymmetrical key pond and public key pointer random number are stored in card, wherein unsymmetrical key pond is stored with the public affairs of each side Key obtains public key corresponding with either one private key in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys, the quantum key card of the home gateway are also stored in the quantum key card of the mobile terminal It is inside also stored with the second pool of symmetric keys, third pool of symmetric keys, and institute are also stored in the quantum key card of the secure cloud Some pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is using the quantum key card of both sides using non- Symmetry algorithm is signed and is verified to file;
Text is forwarded between the wired home component and quantum communications service station and between quantum communications service station and secure cloud When part, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
CN201910027000.3A 2019-01-11 2019-01-11 Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card Active CN109951513B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910027000.3A CN109951513B (en) 2019-01-11 2019-01-11 Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910027000.3A CN109951513B (en) 2019-01-11 2019-01-11 Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card

Publications (2)

Publication Number Publication Date
CN109951513A true CN109951513A (en) 2019-06-28
CN109951513B CN109951513B (en) 2021-10-22

Family

ID=67007268

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910027000.3A Active CN109951513B (en) 2019-01-11 2019-01-11 Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card

Country Status (1)

Country Link
CN (1) CN109951513B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519223A (en) * 2019-07-12 2019-11-29 如般量子科技有限公司 Anti- quantum calculation data isolation method and system based on asymmetric key pair
CN112134695A (en) * 2020-08-14 2020-12-25 江苏亨通问天量子信息研究院有限公司 Cloud platform management method and system based on quantum key distribution technology
CN114244551A (en) * 2021-09-28 2022-03-25 自然资源部第三地形测量队 Data application protection method and device and field painting checking method
CN114255533A (en) * 2022-01-28 2022-03-29 无锡融卡科技有限公司 Intelligent lock system and implementation method thereof
CN114301595A (en) * 2020-09-22 2022-04-08 如般量子科技有限公司 Quantum secret communication system based on witness and communication method thereof
CN115174145A (en) * 2022-05-30 2022-10-11 青岛海尔科技有限公司 Equipment control method and edge gateway equipment
CN115242785A (en) * 2022-09-22 2022-10-25 长江量子(武汉)科技有限公司 Secure communication method between desktop cloud server and terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103475464A (en) * 2013-08-20 2013-12-25 国家电网公司 Power special quantum encryption gateway system
US20140331050A1 (en) * 2011-04-15 2014-11-06 Quintessence Labs Pty Ltd. Qkd key management system
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card
CN106961327A (en) * 2017-02-27 2017-07-18 北京邮电大学 Key management system and method based on quantum key pond
US20180205541A1 (en) * 2014-07-25 2018-07-19 Cheng-Han KO Multiple encrypting method and system for encrypting a file and/or a protocol
CN109104276A (en) * 2018-07-31 2018-12-28 如般量子科技有限公司 A kind of cloud storage method of controlling security and system based on pool of keys
CN109150835A (en) * 2018-07-20 2019-01-04 国科量子通信网络有限公司 Method, apparatus, equipment and the computer readable storage medium of cloud data access
CN109150519A (en) * 2018-09-20 2019-01-04 如般量子科技有限公司 Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140331050A1 (en) * 2011-04-15 2014-11-06 Quintessence Labs Pty Ltd. Qkd key management system
CN103475464A (en) * 2013-08-20 2013-12-25 国家电网公司 Power special quantum encryption gateway system
US20180205541A1 (en) * 2014-07-25 2018-07-19 Cheng-Han KO Multiple encrypting method and system for encrypting a file and/or a protocol
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card
CN106961327A (en) * 2017-02-27 2017-07-18 北京邮电大学 Key management system and method based on quantum key pond
CN109150835A (en) * 2018-07-20 2019-01-04 国科量子通信网络有限公司 Method, apparatus, equipment and the computer readable storage medium of cloud data access
CN109104276A (en) * 2018-07-31 2018-12-28 如般量子科技有限公司 A kind of cloud storage method of controlling security and system based on pool of keys
CN109150519A (en) * 2018-09-20 2019-01-04 如般量子科技有限公司 Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519223B (en) * 2019-07-12 2023-05-05 如般量子科技有限公司 Anti-quantum computing data isolation method and system based on asymmetric key pair
CN110519223A (en) * 2019-07-12 2019-11-29 如般量子科技有限公司 Anti- quantum calculation data isolation method and system based on asymmetric key pair
CN112134695A (en) * 2020-08-14 2020-12-25 江苏亨通问天量子信息研究院有限公司 Cloud platform management method and system based on quantum key distribution technology
CN112134695B (en) * 2020-08-14 2022-09-06 江苏亨通问天量子信息研究院有限公司 Cloud platform management method and system based on quantum key distribution technology
CN114301595A (en) * 2020-09-22 2022-04-08 如般量子科技有限公司 Quantum secret communication system based on witness and communication method thereof
CN114301595B (en) * 2020-09-22 2023-09-29 如般量子科技有限公司 Quantum secret communication system based on witness and communication method thereof
CN114244551A (en) * 2021-09-28 2022-03-25 自然资源部第三地形测量队 Data application protection method and device and field painting checking method
CN114244551B (en) * 2021-09-28 2024-01-30 自然资源部第三地形测量队 Data application protection method, equipment and wild external painting verification method
CN114255533A (en) * 2022-01-28 2022-03-29 无锡融卡科技有限公司 Intelligent lock system and implementation method thereof
CN114255533B (en) * 2022-01-28 2024-04-16 无锡融卡科技有限公司 Intelligent lock system and implementation method thereof
CN115174145B (en) * 2022-05-30 2023-12-19 青岛海尔科技有限公司 Equipment control method and edge gateway equipment
CN115174145A (en) * 2022-05-30 2022-10-11 青岛海尔科技有限公司 Equipment control method and edge gateway equipment
CN115242785A (en) * 2022-09-22 2022-10-25 长江量子(武汉)科技有限公司 Secure communication method between desktop cloud server and terminal

Also Published As

Publication number Publication date
CN109951513B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN110247765B (en) Quantum secret data chain communication system
CN109951513A (en) Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card
CN106104562B (en) System and method for securely storing and recovering confidential data
CN103354498B (en) A kind of file encryption transmission method of identity-based
CN109495250A (en) Anti- quantum calculation wired home communication means based on key card
CN109495274A (en) A kind of decentralization smart lock electron key distribution method and system
US10742426B2 (en) Public key infrastructure and method of distribution
CN102685749B (en) Wireless safety authentication method orienting to mobile terminal
CN108243166A (en) A kind of identity identifying method and system based on USBKey
CN104023013A (en) Data transmission method, server side and client
CN109495251A (en) Anti- quantum calculation wired home cloud storage method and system based on key card
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN110247881A (en) Identity identifying method and system based on wearable device
CN109474419A (en) A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system
CN110535626A (en) The quantum communications service station secret communication method and system of identity-based
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN110493162A (en) Identity identifying method and system based on wearable device
CN110505055A (en) Based on unsymmetrical key pond to and key card outer net access identity authentication method and system
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN106230840B (en) A kind of command identifying method of high security
CN109104278A (en) A kind of encrypting and decrypting method
CN109889329A (en) Anti- quantum calculation wired home quantum communications method and system based on quantum key card
CN115333845B (en) Privacy data verification method based on subset
CN107104888A (en) A kind of safe instant communicating method
CN201717885U (en) Code providing equipment and code identification system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant