CN109951513A - Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card - Google Patents
Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card Download PDFInfo
- Publication number
- CN109951513A CN109951513A CN201910027000.3A CN201910027000A CN109951513A CN 109951513 A CN109951513 A CN 109951513A CN 201910027000 A CN201910027000 A CN 201910027000A CN 109951513 A CN109951513 A CN 109951513A
- Authority
- CN
- China
- Prior art keywords
- quantum
- key
- file
- service station
- random number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to the anti-quantum calculation wired home quantum cloud storage method and systems based on quantum key card, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, private key, unsymmetrical key pond and public key pointer random number are stored in each quantum key card, the mobile terminal, the home gateway, the secure cloud quantum key card in be also stored with third pool of symmetric keys, and all pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;When the wired home component communicates accessing file with secure cloud, the file is signed and is verified to file using asymmetric arithmetic using the quantum key card of both sides;When transmitting a document between the wired home component and quantum communications service station and between quantum communications service station and secure cloud, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
Description
Technical field
The present invention relates to intelligent home equipment technical field, especially a kind of anti-quantum calculation intelligence based on quantum key card
Home communications method.
Background technique
With the continuous development of informationization technology and social economy, people's lives level has obtained continuous raising, raw
Movable joint, which is played, also gradually to be accelerated, and residents can conveniently and efficiently be enjoyed intelligent, comfortable, efficient and safe by terminals such as mobile phones
Home life.With gradually increasing for home intelligence equipment, people propose the intelligent operation of household equipment higher
It is required that.Guarantee the safety of data in general intelligence household equipment communication means using asymmetric-key encryption, it is asymmetric close
Key encryption needs to be respectively completed encrypt and decrypt operation using different keys, one publishes, i.e. public key, another by
User oneself is secret to be saved, i.e. private key.Information transmitter goes to encrypt with public key, and information receiver goes to decrypt with private key;Or
Information transmitter goes to encrypt with private key, and information receiver goes to decrypt with public key.
Communication encryption and transmission safety traditional at present, has relied on complicated mathematical algorithm.I.e. due to calculating at present
The computing capability of machine is limited, and has little time to calculate within the period where demand as a result, it can be said that present number is close
Code system is safe.But this Safety Situation is increasingly by the threat of quantum computer.For example, for classics
Asymmetric key algorithm in cryptography, there are dedicated quantum computer algorithms (shor algorithm etc.) to be cracked.It is calculating
In face of the powerful quantum computer of ability, even advanced secret communication again, as long as all can by current means of communication
Face the possibility for being decrypted and eavesdropping.Therefore, it has been extremely urgent for establishing actually available a whole set of quantum communication network scheme
Rigid need.
As most people is understood, quantum computer has great potential in password cracking.Mainstream is non-now
Symmetrically (public key) Encryption Algorithm, such as RSA cryptographic algorithms, it is most of to be all based in factorization or the finite field of big integer
The two difficult math questions of the calculating of discrete logarithm.Their difficulty that cracks also is dependent on the efficiency solved these problems.Tradition
On computer, it is desirable that solve the two difficult math questions, the cost time is the exponential time (to crack the time with the growth of public key length
Increased with exponential), this is unacceptable in practical applications.It and is that your elegant algorithm for making to measure of quantum computer can be with
In polynomial time (time is cracked as the growth of public key length is increased with the speed of k power, wherein k is long with public key
Spend unrelated constant) carry out integer factorization or discrete logarithm and calculate, thus for RSA, discrete logarithm Encryption Algorithm it is broken
Solution provides may.
Problem of the existing technology:
(1) in the prior art, home gateway does not have reliable safeguard procedures.Home gateway is the central network of wired home
Member, and have Internet networking capability, it is more likely that infected virus wooden horse, thus the information that is stolen;Or it is led by attack
Paralysis is caused, so as to cause the paralysis of entire wired home scheme.
(2) in the prior art, mobile terminal key storage is exposed to the virus of mobile terminal in mobile terminal memory
Under the threat of wooden horse, it can be stolen by Malware or malicious operation.
(3) corresponding private key is obtained quickly through public key due to quantum calculation function, existing foundation is in public and private key
Wired home communication means on basis is easy to be cracked by quantum computer.
(4) in the prior art, the outputting and inputting for digital signature based on public and private key can be known to enemy, in quantum meter
In the presence of calculation machine, it may be derived private key, cause to establish the wired home communication system on public and private key basis
It is cracked by quantum computer.
(5) in the prior art, the file in cloud storage does not use digital signature such as, by the effect of not resisting denying, if
There is illegal file, it may be difficult to trace source.Even if using digital signature, there is also because private key it is stolen caused by illegally sign
Name.
(6) in the prior art, it is understood that there may be illegal user uses cloud, leads to safety problem.
(7) cloud storage key does not have hardware protection such as, not safe enough.
(8) the ssl protocol consult session key that cloud storage generally uses public key system is uploaded, which can be by quantum calculation
Machine cracks.
Summary of the invention
The present invention provides a kind of anti-quantum calculation wired home quantum cloud storage method based on quantum key card, including intelligence
Can family's component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home gateway
And mobile terminal, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, each quantum
Private key, unsymmetrical key pond and public key pointer random number are stored in key card, wherein unsymmetrical key pond is stored with each side
Public key, corresponding with either one private key public key is obtained in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys is also stored in the quantum key card of the mobile terminal, the quantum of the home gateway is close
It is also stored with the second pool of symmetric keys in key card, is also stored with third pool of symmetric keys in the quantum key card of the secure cloud,
And all pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is adopted using the quantum key card of both sides
File is signed and verified with asymmetric arithmetic;
Turn between the wired home component and quantum communications service station and between quantum communications service station and secure cloud
When fat file, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
Optionally, when the wired home component communicates storage file to secure cloud, include: at wired home component
File is signed using private key to obtain file signature;
It generates and utilizes true random number RMAnd utilize true random number RMKey K is extracted from pool of symmetric keysM;
Utilize key KMEncryption file and file signature obtain file cipher text, then by file cipher text together with true random number RM
It is sent to quantum communications service station.
Optionally, the wired home component and secure cloud and same quantum communications service station direct communication, in the amount
Sub- communication service station includes:
Receive file cipher text and true random number R from the wired home componentM;
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM;
Utilize key KMDecryption file cipher text obtains file and file signature;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are encrypted using key Kss and obtains file cipher text, then
File cipher text is sent to the secure cloud together with true random number Rss.
Optionally, the wired home component and quantum communications service station QMDirect communication, the secure cloud and quantum are logical
Telecommunications services station Qss direct communication;In the quantum communications service station QMInclude:
Receive file cipher text and true random number R from the wired home componentM;
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM;
Utilize key KMDecryption file cipher text obtains file and file signature;
To the true random number RMAnd file and file signature stood between sign and station between the mode that encrypts until
It is sent to quantum communications service station Qss;
Include: in the quantum communications service station Qss
File and file signature are obtained by the way of decrypting between verifying and standing between station;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are encrypted using key Kss and obtains file cipher text, then
File cipher text is sent to the secure cloud together with true random number Rss.
Optionally, include: in the secure cloud
Receive file cipher text and true random number Rss from the quantum communications service station with secure cloud direct communication;
Key Kss is extracted from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are obtained using key Kss decryption file cipher text;
Utilize unsymmetrical key pond in conjunction with the public key pointer random number in the quantum communications service station with secure cloud direct communication
Obtain the public key in quantum communications service station;
The dual signature is verified using the public key in the quantum communications service station;
Wired home group is obtained using unsymmetrical key pond in conjunction with public key pointer random number corresponding with wired home component
The public key of part;
The file signature is verified using the public key of the wired home component;
Storage is encrypted after being verified.
Optionally, the wired home component further includes household equipment, the household equipment via the home gateway to
Secure cloud accessing file;The household equipment to the home gateway send file when include:
It signs to file;
The key K of true random number form is generated using quantum key card;
File is encrypted using key K and file signature obtains ciphertext, and uses the public key encryption key K of home gateway;
The key K and ciphertext of encryption are sent to home gateway;
Home gateway is decrypted with after verifying, and obtained file is sent to secure cloud.
Optionally, when the wired home component downloads file from secure cloud, comprising:
Downloading request is sent to secure cloud via quantum communications service station;
Secure cloud mutually should download request and extract corresponding document;
Quantum communications service station is sent to after file is signed and encrypted;
It is sent after carrying out dual signature and encryption to obtained file and file signature after the decryption of quantum communications service station
Give wired home component;
Wired home component is accordingly decrypted and is verified.
Optionally, corresponding identity is also sent when each side communicates, recipient is close in quantum using the identity
Public key pointer random number corresponding with identity is obtained in key card on demand.
Optionally, legitimate user's list is stored in the secure cloud, secure cloud verifies other side according to the identity
Identity.
The present invention also provides a kind of anti-quantum calculation wired home quantum cloud storage system based on quantum key card, including
Wired home component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home network
It closes and mobile terminal, each wired home component and quantum communications service station and secure cloud is respectively provided with quantum key card, it is each to measure
Private key, unsymmetrical key pond and public key pointer random number are stored in sub-key card, wherein unsymmetrical key pond is stored with respectively
The public key of side obtains public key corresponding with either one private key in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys is also stored in the quantum key card of the mobile terminal, the quantum of the home gateway is close
It is also stored with the second pool of symmetric keys in key card, is also stored with third pool of symmetric keys in the quantum key card of the secure cloud,
And all pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is adopted using the quantum key card of both sides
File is signed and verified with asymmetric arithmetic;
Turn between the wired home component and quantum communications service station and between quantum communications service station and secure cloud
When fat file, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
Quantum key card of the present invention is combined with cryptological technique, hardware security isolation technology, quantum physics technology and (takes
Carry quantum random number generator in the case where) authentication and encryption and decryption product.The embedded chip of quantum key card and operation
System can provide the functions such as secure storage and the cryptographic algorithm of key.Due to it with independent data-handling capacity and well
Safety, quantum key card become private key and pool of keys safety barrier.Each quantum key card can have hardware PIN code
Protection, PIN code and hardware constitute two necessary factors that user uses quantum key card, i.e., so-called " double factor authentication ", use
Family only has while obtaining the quantum key card and user's PIN code that save relevant authentication information, just can be with login system.Use
The PIN code at family is leaked, as long as the quantum key card that user holds is not stolen, the identity of legitimate user would not be counterfeit;
If the quantum key card of user is lost, the person of picking up also cannot counterfeit the identity of legitimate user due to not knowing user's PIN code.
In short, quantum key card appears in the top-secret information such as key in the disk and memory of host with plaintext version, so as to
The safety of top-secret information is effectively ensured.
Mobile terminal and home gateway in wired home member are equipped with quantum key card, quantum communications service station and
Secure cloud is also equipped with quantum key card, stores key using quantum key card.Quantum key card is independent hardware device, quilt
A possibility that Malware or malicious operation steal key substantially reduces.Meanwhile disclosed in each wired home member utilization
Anti- quantum calculation public key extracted in conjunction with the unsymmetrical key pond needed for wired home member public key, and wired home member
Public key be stored in quantum key card, guarantee that quantum computer is unable to get client public key, and then be unable to get corresponding private
Key, therefore reduce and risk is cracked by quantum computer.In addition, digital signature is added to be uploaded to each file of secure cloud,
And the digital signature based on public and private key is further encrypted by random number key, forms the digital signature of encryption.Even if in quantum meter
In the presence of calculation machine, it is also difficult to be derived private key.Therefore the program is not easy to be cracked by quantum computer.Disappear to every
Digital signature is added in breath, can specify the true source of every message, improve the safety of intelligent home system.Also in safety
It is stored with legitimate user's list on cloud, can prevent illegal user from using secure cloud.
Detailed description of the invention
Fig. 1 is wired home networking diagram provided in an embodiment of the present invention;
Fig. 2 is the structural schematic diagram in quantum key card key area;
(a) partially illustrates the structure of home gateway quantum key card in figure;
(b) partially illustrates the structure of household equipment quantum key card in figure;
(c) partially illustrates the structure of quantum communications service station quantum key card in figure.
Fig. 3 is public key storage mode flow chart provided in an embodiment of the present invention;
Fig. 4 is public key reading manner flow chart provided in an embodiment of the present invention;
Fig. 5 is the flow chart provided in an embodiment of the present invention for generating key;
The structure chart of Fig. 6 message between mobile terminal and quantum communications service station;
Fig. 7 is the message structure figure for the request that household equipment is sent to home gateway;
Fig. 8 is the message structure figure that home gateway is sent to household equipment.
Specific embodiment
Technique on Quantum Communication is the emerging safety communication technology set up based on quantum physics.The quantum communications in China
Technology has come into the practical stage, and application prospect and strategic importance also result in local government and important industry to it
The extensive concern of industry development.In addition to establishing quantum communications main line, some scale metropolitan areas quantum communication network has also been built
It is set as function and runs.Based on metropolitan area quantum communication network, there has also been preliminary applications, it can be achieved that high confidentiality for Technique on Quantum Communication
Video speech communication etc. application.The quantum communication networks such as quantum communications main line and quantum communications Metropolitan Area Network (MAN) form quantum communications
Network, essence are quantum key distribution (QKD).Therefore the quantum communication network set up based on QKD technology can claim
For QKD network.
Although current quantum Metropolitan Area Network (MAN) can permit the high safety characteristic that user accesses and enjoys quantum network,
It is still the weakness in entire quantum communication network that user, which accesses the part of quantum network, at present.After one side quantum key distribution
Key to arrive safe and sound in user hand be a very big problem, there is the risk for being stolen or distorting;On the other hand, same
The number of users that quantum key distribution equipment can connect is limited, can not connect a large number of users simultaneously.Therefore it needs to access in user
The part of quantum network is solved the above problems by the way of quantum communications service station:
(1) role of the quantum communications service station as similar operator, on the one hand establishes cooperative relationship with QKD network, real
The guarantee of existing secure connection, to guarantee that quantum key can be with secure distribution to quantum communications service station;On the other hand, quantum is logical
Telecommunications services station is that user issues quantum key card, quantum random number key is presented to user, while itself saving user and being gathered around
Some keys are, it can be achieved that secure communication between quantum communications service station and user.
(2) mode that quantum communications service station can build as cluster server can access a large number of users simultaneously.
In wired home quantum communications scheme, mobile terminal, home gateway are the user in quantum communications service station, amount
Issue quantum key card respectively for it in sub- communication service station.
In the present embodiment, wired home member has matched quantum key card, and the side of issuing of quantum key card is quantum
The administrative department of the supervisor side of key card, generally wired home itself or wired home such as residential property, quantum key
The member that the side of being awarded of card is managed by the supervisor side of quantum key card, the generally kinsfolk of wired home, maintenance people
Member and visitor.
With the unsymmetrical key pond for storage of public keys in quantum key card.It is all that unsymmetrical key pond possesses this tissue
Using the public key of the user of public private key system, and each public key ID corresponding with the public key is corresponded.Including home gateway,
The public key of household equipment, mobile terminal.
The storage mode of public key is as shown in Figure 3, the specific steps are as follows: takes public key pointer random number rk at random to some user
(i.e. the storage location parameter of public key) obtains public key pointer rkp in conjunction with specific public key pointer function frkp and from corresponding non-
Corresponding position in pool of symmetric keys is stored in the public key krk of the user.Key mode is read as shown in figure 4, mode and storage are close
Key mode is identical.Public key pointer random number rk is announced as anti-quantum calculation public key.
Wired home structure is as shown in Figure 1, home gateway (S) is the pipe for connecting all household equipments with routing function
Reason center.It can be connected by Wifi or Internet with mobile terminal.Assume that its ID is SID herein.For convenience of receiving party
Processing, SID include its public key pointer random number, it may also be used for the Q pool of keys in specified quantum communication service station.Home gateway amount
Sub-key is positioned in inside home gateway, is typically embodied as the form of key board.Specific structure is as shown in the part Fig. 2 (a), card
Interior further includes Q pool of keys in addition to including unsymmetrical key pond, public key pointer random number and private key, and Q pool of keys comes from quantum communications
Service station, and its key is private cipher key, each member is different.Q pool of keys is not only stored in the quantum key of the member
In card, it is also stored in the quantum key card in the matched quantum communications service station of the member.
Household equipment (C) includes monitoring camera, opal, door lock, intelligent switch, video server, monitoring server etc..
Assume that its ID is CID herein.For convenience of receiving party's processing, CID includes its public key pointer random number.Household equipment uses C
Quantum key card, specific structure is as shown in the part Fig. 2 (b).Difference with home gateway quantum key card be without be used for and amount
The Q pool of keys of sub- communication service station connection.
Mobile terminal (M) includes the mobile phone of home owner, tablet computer etc..House can be accessed by Wifi or Internet
Front yard gateway simultaneously controls household equipment.Assume that its ID is MID herein.For convenience of receiving party's processing, MID includes that its public key refers to
Needle random number, it may also be used for the Q pool of keys in specified quantum communication service station.Mobile terminal uses mobile terminal quantum key
Card, storage inside key zone are identical as home gateway.Unlike the quantum key card be typically embodied as SDKEY or UKEY or
The portable forms such as cell phone mainboard chip.
Secure cloud (SS) refers to public cloud or wired home private clound, for storing the encryption data of wired home, such as
Video, image, text and other kinds of data.The safety of the cloud guarantees by quantum key card, will not be by the key of data
It is exposed to the manager of cloud, therefore the Various types of data of user's storage is without having to worry about its safety.Assume that its ID is SSID herein.For
Receiving party is facilitated to handle, SSID includes its public key pointer random number, it may also be used for the Q in specified quantum communication service station is close
Key pond.Secure cloud uses secure cloud quantum key card, and storage inside key zone is identical as home gateway.The difference is that secure cloud
Quantum key card is also stored with legitimate user's list, which is formed by user registration, list member with public key pointer with
The mode of machine number indicates, and the user list can be modified maintenance by quantum key card administrator.
Quantum communications service station includes quantum service centre, is mainly used for each user terminal by classic network and user side
It communication connection and is communicated to connect with other quantum communication service stations, classic network includes but is not limited to telecommunications network, internet, wide
Broadcast television network or other communication networks etc.;Further include quantum key distribution equipment, is mainly used for realizing by QKD mode between station
Quantum key is shared.Quantum communications service station uses Q quantum key card, and internal structure is as shown in the part Fig. 2 (c).Wherein, Q
Unsymmetrical key pond in quantum key card is same with intelligent home system.In addition to unsymmetrical key pond, Q quantum key card
The list of legitimate service station is also preserved, which is registered by quantum communications service station operation maintenance personnel and formed, and list member is used
The mode of public key pointer random number indicates, and the service station list can be modified maintenance by quantum key card administrator.Q quantum
Key card includes multiple Q pool of keys, respectively corresponds matched each home gateway or mobile terminal in quantum communications service.This
Text assumes that the ID in quantum communications corresponding with M service station is QIDM, similarly the ID in quantum communications corresponding with S service station be
QIDS.For convenience of receiving party's processing, QID includes its public key pointer random number, it may also be used for specified and matched home network
Pass or the corresponding Q pool of keys of mobile terminal.
Embodiment 1
The present embodiment is the upper transmitting file of wired home member to secure cloud, and the upper transmitting file of wired home member to secure cloud divides
For following three kinds of situations: transmitting file is to secure cloud on mobile terminal M, and transmitting file is to secure cloud, household equipment C on home gateway S
Upper transmitting file is to secure cloud.
Situation 1: transmitting file is to secure cloud on mobile terminal.As shown in Figure 1, mobile terminal by quantum communication service station to
Transmitting file in secure cloud.
Step 1.1.1: file is sent to quantum communications service station by mobile terminal.
Mobile terminal M generates true random number R according to the real random number generator in matched quantum key cardM(following letter
Claim RM, other Chinese character parts that similarly save are as referred to as).RMPointer P is obtained in conjunction with specific key schedule fM。PMIt is directed toward M
Q pool of keys in certain a part, corresponding key K can be extracted in the pool of keysM.File F is encrypted using the key
Ciphertext is obtained with file signature MS, then by ciphertext together with true random number RMAnd to be sent to mobile terminal together matched by MID
Quantum communications service station QM, message structure as shown in fig. 6, be represented by MID | | RM||{F||SM}KM}.File signature S hereinM
That is mobile terminal M is digitally signed algorithm to original and obtains file signature SM。
Step 1.1.2: quantum communications transmit information between service station.
Quantum communications service station QMReceive encryption message and R from mobile terminal MMAnd after MID, R is usedMIn conjunction with spy
Fixed key schedule f obtains pointer PM, pass through PMIt is being specified by MID and is being extracted in the matched Q pool of keys of mobile terminal M
Corresponding key K outM。
Quantum communications service station QMUse KMCiphertext is decrypted to obtain file F and file signature SM。 QMIt is taken out with MID
The public key of M, method are shown in Fig. 4;With the public key of M to SMSignature verification is carried out, stops handling if authentication failed;If being proved to be successful
Continue follow-up process.Use QMPrivate key to MID, original F and SMIt is digitally signed algorithm and obtains file signature SQM.Combination
At new information, be represented by MID | | F | | SM||SQM}。
It is delivered to and the matched quantum communications service station Q of secure cloud SSSSPlace.Quantum communications service station QMWith amount
Sub- communication service station QSSQuantum key is shared between being stood using the realization of respective quantum key distribution equipment, so that plaintext version
Entire message is in quantum communications service station QMQuantum communications service station Q is sent to after encryptionSS, then decrypted recover plaintext version
Entire message.The entire message content transmitted herein includes QIDMAnd by QKD key encrypt MID | | F | | SM||
SQM}。
Quantum communications service station QMWith quantum communications service station QSSBetween if will also by other network node transfers,
It is formed between two quantum communications service stations (or network node) of direct communication connection by corresponding quantum key distribution equipment
Station between quantum key, and successively transfer transmit ciphertext.During transfer, other network nodes pass through QIDMObtain QMPublic key
Pointer random number simultaneously further obtains QMPublic key, check QMPublic key pointer random number whether belong to the legal clothes in this service station
Business station list stops handling if being not belonging to;If belonged to, continue follow-up process.Use QMPublic key to SQMIt is digitally signed and tests
Card, stops handling if authentication failed;If being proved to be successful, continue follow-up process.SQMIt is verified this quantum after trusting this document
Communication service station makes the file signature of oneself, i.e., using the private key of oneself to MID, original and SMIt is digitally signed algorithm
Obtain file signature.Entire message is encrypted using QKD key.Before the ID of oneself is attached to the entire message of encryption, transmitting
To next network node.
Between standing the distribution of quantum key be by the strange land key that fundamental principles of quantum mechanics is realized it is shared in the way of, preferably
For BB84 agreement.
Step 1.1.3: transmitting file is to secure cloud on quantum communications service station.
Quantum communications service station QSSAfter receiving message, pass through QIDMObtain QMPublic key pointer random number and further obtain
QMPublic key, detailed process is as shown in Figure 4.Check QMPublic key pointer random number whether belong to the legitimate service station in this service station
List stops handling if being not belonging to;If belonged to, continue follow-up process.Use QMPublic key to SQMVerifying is digitally signed,
Stop handling if authentication failed;If being proved to be successful, continue follow-up process.
SQMIt is verified the file signature that this quantum communications service station after trusting this document makes oneself, that is, uses oneself
Private key is to MID, original and SMIt is digitally signed algorithm and obtains file signature SQSS。
Quantum communications service station QSSTrue random number is generated according to the real random number generator in matched quantum key card
RSS, RSSPointer P is obtained in conjunction with specific key schedule fSS, PSSDirection is specified close with the matched Q of secure cloud SS by SSID
Certain a part in key pond, can extract corresponding key K in the pool of keysSS.It is obtained using key encryption message close
Text is represented by QIDSS||RSS||{MID||F||SM||SQSS}KSS, pass to next network node i.e. SS.
Step 1.1.4: secure cloud receives file and is stored.
Secure cloud SS receives to come from QSSMessage after, by RSSPointer P is obtained in conjunction with specific key schedule fSS, lead to
Cross PSSCorresponding key K is extracted in Q pool of keysSS.Use KSSDecryption ciphertext obtain MID | | F | | SM||SQSS}.SS is used
QIDSSTake out QSSPublic key, method is shown in Fig. 4;Use QSSPublic key to SQSSSignature verification is carried out, stops handling if authentication failed;
If being proved to be successful, continue follow-up process.SS verifies MID, if it exists in legitimate user's list, then passes through verifying.It is logical
It crosses after verifying through the public key pointer random number of MID acquisition M and further obtains the public key of M, detailed process is as shown in Figure 4.Make
Verifying is digitally signed to file with the public key of M, is verified, trusts the message.
After being verified to message, secure cloud generates file according to the real random number generator in matched quantum key card
Key encrypts file and its signature using the key, and using the secure key encryption file key in quantum key card, will
MID, the file of the file key of encryption and encryption and its signature storage are into cloud storage space.
Particularly, when mobile terminal and the matched quantum communications service station of secure cloud are same, mobile terminal M is to peace
The process specific steps of transmitting file are described as follows on full cloud:
Step 1.2.1. mobile terminal encrypts file.
Mobile terminal M will generate true random number R according to the real random number generator in matched quantum key cardM。RMKnot
It closes specific key schedule f and obtains pointer PM。PMCertain a part being directed toward in the Q pool of keys of M, can be in the pool of keys
Extract corresponding key KM.File F and file signature S is encrypted using the keyMObtain ciphertext, then by ciphertext together with very with
Machine number RMAnd MID is sent to the matched quantum communications service station Q of mobile terminal together, message structure is as shown in fig. 6, can indicate
So that MID | | RM||{F||SM}KM}.File signature S hereinMI.e. mobile terminal M is digitally signed algorithm to original and obtains
File signature SM。
Step 1.2.2: upper transmitting file to secure cloud.
Quantum communications service station Q receives encryption message and R from mobile terminal MMAnd after MID, R is usedMIn conjunction with specific
Key schedule f obtain pointer PM, pass through PMIt is being specified by MID and is being extracted in the matched Q pool of keys of mobile terminal M
Corresponding key KM。
Quantum communications service station Q uses KMCiphertext is decrypted to obtain file F and file signature SM.M is taken out by MID
Public key, method is shown in Fig. 4;With the public key of M to SMSignature verification is carried out, stops handling if authentication failed;If being proved to be successful
Continue follow-up process.It is verified the file signature that quantum communications service station Q after trusting this document makes oneself, that is, uses oneself
Private key to MID, original and SMIt is digitally signed algorithm and obtains file signature SQ。
Quantum communications service station Q generates true random number R according to the real random number generator in matched quantum key cardSS,
RSSPointer P is obtained in conjunction with specific key schedule fSS, PSSBe directed toward specified by SSID with the matched Q key of secure cloud SS
Certain a part in pond, can extract corresponding key K in the pool of keysSS.It is obtained using key encryption message close
Text is represented by QID | | RSS||{MID||F||SM||SQ}KSS, pass to next network node i.e. SS.
Step 1.2.3: secure cloud receives file and is stored.
After secure cloud SS receives the message from Q, by RSSPointer P is obtained in conjunction with specific key schedule fSS, pass through
PSSCorresponding key K is extracted in Q pool of keysSS.Use KSSDecryption ciphertext obtain MID | | F | | SM||SQ}.SS is taken with QID
The public key of Q, method are shown in Fig. 4 out;With the public key of Q to SQSignature verification is carried out, stops handling if authentication failed;Such as it is proved to be successful
Then continue follow-up process.SS verifies MID, if it exists in legitimate user's list, then passes through verifying.After verifying
The public key pointer random number of M is obtained by MID and further obtains the public key of M, and detailed process is as shown in Figure 4.Use the public affairs of M
Key is digitally signed verifying to file.As a result unanimously then trust the message.
After being verified to message, secure cloud generates file according to the real random number generator in matched quantum key card
Key encrypts file and its signature using the key, and using the secure key encryption file key in quantum key card, will
MID, the file of the file key of encryption and encryption and its signature storage are into cloud storage space.
Situation 2: transmitting file is to secure cloud on home gateway.The mistake of detailed process and transmitting file on mobile terminal to secure cloud
Cheng Xiangtong.
Situation 3: household equipment is by transmitting file on home gateway to secure cloud.As shown in Figure 1, household equipment passes through family
Gateway transmitting file in secure cloud.
Step 1.3.1: file is sent to home gateway by household equipment.
Household equipment C generates key K according to the real random number generator in matched quantum key card, is added using the key
Ciphertext part F and file signature SC, and use the public key encryption key K of S.CID, the key K of encryption and ciphertext are sent to house
Front yard gateway S.Ciphertext uses key K to encrypt file F and file signature S hereinC, signature is household equipment C to original herein
It is digitally signed algorithm and obtains file signature SC.Message structure as shown in fig. 7, be represented by CID | | { K } PKS||{F||
SC}K}。
Step 1.3.2: file is uploaded to secure cloud by home gateway.
After security gateway S receives the message from household equipment C, CID is verified, if it exists in legitimate user's list
In, then pass through verifying.By decrypting to obtain key K using the private key of oneself after verifying, file and label are obtained using K decoding request
Name.The public key of C is obtained by CID, method is shown in Fig. 4.Verifying is digitally signed to file using the public key of C, as a result unanimously then
Trust the message.
The signature after verifying to documenting security gateway is completed, file and signature are uploaded by quantum communication service station
To secure cloud SS, described in specific steps and situation 1 identical.
Step 1.3.3: secure cloud receives file and is stored.
Specific steps describe identical with step 1.1.4 in situation 1.
Embodiment 2
The present embodiment is that wired home member downloads file from secure cloud, and wired home member downloads file from secure cloud
Be divided into following three kinds of situations: mobile terminal M downloads file from secure cloud, and home gateway S downloads file from secure cloud and family sets
Standby C downloads file from secure cloud.
Situation 1: mobile terminal downloads file from secure cloud.
Step 2.1.1: mobile terminal sends downloading file request to secure cloud.
The downloading file request that mobile terminal is sent to secure cloud carries out transfer by quantum communication service station, and request includes
The MID of mobile terminal.
Step 2.1.2: quantum communications service station obtains and transmits file.
After secure cloud SS receives the request of downloading file, MID is verified, if it exists in legitimate user's list, then
Pass through verifying.Respective encrypted file is extracted by secure cloud SS after verifying and it is decrypted using file key.
Secure cloud SS generates true random number R according to the real random number generator in matched quantum key cardSS, RSSIn conjunction with
Specific key schedule f obtains pointer PSS, PSSCertain a part being directed toward in the Q pool of keys of secure cloud SS, can be close at this
Corresponding key K is extracted in key pondSS.Secure cloud uses key KSSEncrypt file F and signature SSSCiphertext is obtained, it then will be close
Text is together with true random number RSSAnd SSID is sent to quantum communications service station Q togetherSS, message structure be represented by SSID | | RSS
||{F||SSS}KSS}.File signature S hereinSSThat is secure cloud SS is digitally signed algorithm to original and obtains file signature SSS。
With the matched quantum communications service station Q of secure cloud SSSSThe file F and signature of encryption are obtained from secure cloud SS
SSS, pass through RSSObtain KSSAfter be decrypted to obtain file, obtained by SSID after the public key of SS to SSSSignature verification is carried out, such as
Authentication failed then stops handling;If being proved to be successful, continue follow-up process.Use QSSPrivate key to SSID, original F and SSSInto
Row Digital Signature Algorithm obtains file signature SQSS.It is combined into new information, be represented by SSID | | F | | SSS||SQSS}。
It is delivered to and the matched quantum communications service station Q of mobile terminal MMPlace.It will be new by information transmission between station
Message is sent to and the matched quantum communications service station Q of mobile terminal MM.If mobile terminal M and secure cloud SS is matched is
If the same quantum communications service station, then do not need to transmit by information between station.Signature and sign test step in detailed process
Message transmitting procedure is consistent between station described in embodiment 1.Quantum communications service station QMAfter obtaining simultaneously trust messages, according to
Real random number generator in matched quantum key card generates true random number RM, RMIt is obtained in conjunction with specific key schedule f
Pointer PM, PMDirection is specified a part of with certain in the matched Q pool of keys of mobile terminal M by MID, can be in the pool of keys
Extract corresponding key KM.Ciphertext is obtained using key encryption message, is represented by QIDM||RM||{SSID||F||SSS||
SQM}KM, pass to next network node i.e. mobile terminal M.
Step 2.1.3: acquisition for mobile terminal file.
Mobile terminal M is from quantum communications service station QMAfter obtaining message, by RMIt is obtained in conjunction with specific key schedule f
Pointer PM, pass through PMCorresponding key K is extracted in Q pool of keysM.Use KMDecryption file cipher text obtain SSID | | F | | SSS|
|SQM}.M QIDMTake out QMPublic key, method is shown in Fig. 4;Use QMPublic key to SQMSignature verification is carried out, is stopped if authentication failed
Only handle;If being proved to be successful, continue follow-up process.The public key pointer random number of SS is obtained by SSID and further obtains SS
Public key, detailed process is as shown in Figure 4.Verifying is digitally signed to file using the public key of SS, is verified then to trust and be somebody's turn to do
Message.File is obtained after verifying signature.
Situation 2: home gateway downloads file from secure cloud.Detailed process and mobile terminal download the mistake of file from secure cloud
Cheng Xiangtong.
Situation 3: household equipment downloads file from secure cloud by home gateway.
Step 2.3.1: household equipment sends to home gateway and requests.
Household equipment C generates key K according to the real random number generator in matched quantum key card1, use the key
CIPHERING REQUEST request, and use the public key encryption key K of S1.By CID, the key K of encryption1And request ciphertext is sent to
Home gateway S, message structure be represented by CID | | { K1}PKS||{request||SC}K1}.Request ciphertext uses herein
Key K1CIPHERING REQUEST and signature, signature i.e. household equipment C is digitally signed algorithm to original request and obtains the signature herein.Disappear
Structure is ceased as shown in Fig. 7.
Step 2.3.2: home gateway processing request and response.
After security gateway S receives the request from household equipment C, CID is verified, if it exists in legitimate user's list
In, then pass through verifying.It decrypts to obtain key K using the private key of oneself by security gateway S after verifying1, use K1Decoding request is close
Text is requested and is signed.Using being verified after the public key decryptions signature of C to signature, it is verified, trusts the request.
Security gateway S passes through file F and text that quantum communication service station obtains encryption from secure cloud SS after completing verifying
Part signature SC.Detailed process is shown in 2 situation 1 of embodiment.Household equipment C is sent the file to after verifying to file signature.Family
Front yard gateway S generates random number K according to the real random number generator in matched quantum key card2, file is encrypted using the key,
And use the public key encryption key K of C2, by SID, the key K of encryption2, encryption file F and signature SSIt is sent to household equipment C,
Message structure be represented by SID | | { K2}PKC||{F||SS}K2}.Sign S hereinSThat is home gateway S counts original
Word signature algorithm obtains the signature.Message structure is as shown in Figure 8.
Step 2.3.3: household equipment obtains file.
After household equipment C has received the response from home gateway S, decrypt to obtain key K using the private key of oneself2, make
Use K2Decryption response ciphertext obtains file and signature.Using the public key of S to SSSignature verification is carried out, if authentication failed at stopping
Reason;If being proved to be successful, continue follow-up process.After being proved to be successful, file is obtained.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited
In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention
Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.
Claims (10)
1. the anti-quantum calculation wired home quantum cloud storage method based on quantum key card, which is characterized in that including intelligent family
Front yard component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home gateway and shifting
Dynamic terminal, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, each quantum key
Private key, unsymmetrical key pond and public key pointer random number are stored in card, wherein unsymmetrical key pond is stored with the public affairs of each side
Key obtains public key corresponding with either one private key in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys, the quantum key card of the home gateway are also stored in the quantum key card of the mobile terminal
It is inside also stored with the second pool of symmetric keys, third pool of symmetric keys, and institute are also stored in the quantum key card of the secure cloud
Some pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is using the quantum key card of both sides using non-
Symmetry algorithm is signed and is verified to file;
Text is forwarded between the wired home component and quantum communications service station and between quantum communications service station and secure cloud
When part, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
2. the anti-quantum calculation wired home quantum cloud storage method based on quantum key card as described in claim 1, special
Sign is, when the wired home component communicates storage file to secure cloud, includes: at wired home component
File is signed using private key to obtain file signature;
It generates and utilizes true random number RMAnd utilize true random number RMKey K is extracted from pool of symmetric keysM;
Utilize key KMEncryption file and file signature obtain file cipher text, then by file cipher text together with true random number RMIt sends
To quantum communications service station.
3. the anti-quantum calculation wired home quantum cloud storage method based on quantum key card as claimed in claim 2, special
Sign is, the wired home component and secure cloud and same quantum communications service station direct communication take in the quantum communications
Business station includes:
Receive file cipher text and true random number R from the wired home componentM;
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM;
Utilize key KMDecryption file cipher text obtains file and file signature;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature, which are encrypted, using key Kss obtains file cipher text, it then will be literary
Part ciphertext is sent to the secure cloud together with true random number Rss.
4. the anti-quantum calculation wired home quantum communications method based on quantum key card as claimed in claim 2, feature
It is, the wired home component and quantum communications service station QMDirect communication, the secure cloud and quantum communications service station Qss
Direct communication;In the quantum communications service station QMInclude:
Receive file cipher text and true random number R from the wired home componentM;
Utilize true random number RMKey K is extracted from pool of symmetric keys corresponding with wired home componentM;
Utilize key KMDecryption file cipher text obtains file and file signature;
To the true random number RMAnd file and file signature stood between sign and station between the mode that encrypts until being sent to
Quantum communications service station Qss;
Include: in the quantum communications service station Qss
File and file signature are obtained by the way of decrypting between verifying and standing between station;
It signs obtain dual signature again to the obtained file of decryption and file signature using private key;
It generates using true random number Rss and extracts key Kss from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature, which are encrypted, using key Kss obtains file cipher text, it then will be literary
Part ciphertext is sent to the secure cloud together with true random number Rss.
5. the anti-quantum calculation wired home quantum communications method based on quantum key card as described in claim 3 or 4, special
Sign is, includes: in the secure cloud
Receive file cipher text and true random number Rss from the quantum communications service station with secure cloud direct communication;
Key Kss is extracted from third pool of symmetric keys using true random number Rss;
The file, the file signature and the dual signature are obtained using key Kss decryption file cipher text;
It is obtained using unsymmetrical key pond in conjunction with the public key pointer random number in the quantum communications service station with secure cloud direct communication
The public key in quantum communications service station;
The dual signature is verified using the public key in the quantum communications service station;
Wired home component is obtained using unsymmetrical key pond in conjunction with public key pointer random number corresponding with wired home component
Public key;
The file signature is verified using the public key of the wired home component;
Storage is encrypted after being verified.
6. the anti-quantum calculation wired home quantum communications method based on quantum key card as claimed in claim 5, feature
It is, the wired home component further includes household equipment, and the household equipment is accessed via the home gateway to secure cloud
File;The household equipment to the home gateway send file when include:
It signs to file;
The key K of true random number form is generated using quantum key card;
File is encrypted using key K and file signature obtains ciphertext, and uses the public key encryption key K of home gateway;
The key K and ciphertext of encryption are sent to home gateway;
Home gateway is decrypted with after verifying, and obtained file is sent to secure cloud.
7. the anti-quantum calculation wired home quantum communications method based on quantum key card as described in claim 1, feature
It is, when the wired home component downloads file from secure cloud, comprising:
Downloading request is sent to secure cloud via quantum communications service station;
Secure cloud mutually should download request and extract corresponding document;
Quantum communications service station is sent to after file is signed and encrypted;
Intelligence is sent to after carrying out dual signature and encryption to obtained file and file signature after the decryption of quantum communications service station
It can family's component;
Wired home component is accordingly decrypted and is verified.
8. the anti-quantum calculation wired home quantum communications method based on quantum key card as described in claim 1, feature
It is, each side also sends corresponding identity when communicating, recipient is on-demand in quantum key card using the identity
Obtain public key pointer random number corresponding with identity.
9. the anti-quantum calculation wired home quantum communications method based on quantum key card as claimed in claim 8, feature
It is, legitimate user's list is stored in the secure cloud, and secure cloud verifies other side's identity according to the identity.
10. the anti-quantum calculation wired home quantum cloud storage system based on quantum key card, which is characterized in that including intelligent family
Front yard component via quantum communications service station to secure cloud accessing file, wherein the wired home component includes home gateway and shifting
Dynamic terminal, each wired home component and quantum communications service station and secure cloud are respectively provided with quantum key card, each quantum key
Private key, unsymmetrical key pond and public key pointer random number are stored in card, wherein unsymmetrical key pond is stored with the public affairs of each side
Key obtains public key corresponding with either one private key in combination with unsymmetrical key pond by public key pointer random number;
The first pool of symmetric keys, the quantum key card of the home gateway are also stored in the quantum key card of the mobile terminal
It is inside also stored with the second pool of symmetric keys, third pool of symmetric keys, and institute are also stored in the quantum key card of the secure cloud
Some pool of symmetric keys are also stored in the quantum key card in the quantum communications service station simultaneously;
When the wired home component communicates accessing file with secure cloud, the file is using the quantum key card of both sides using non-
Symmetry algorithm is signed and is verified to file;
Text is forwarded between the wired home component and quantum communications service station and between quantum communications service station and secure cloud
When part, key is generated using corresponding pool of symmetric keys, coded communication is carried out using symmetry algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910027000.3A CN109951513B (en) | 2019-01-11 | 2019-01-11 | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910027000.3A CN109951513B (en) | 2019-01-11 | 2019-01-11 | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109951513A true CN109951513A (en) | 2019-06-28 |
CN109951513B CN109951513B (en) | 2021-10-22 |
Family
ID=67007268
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910027000.3A Active CN109951513B (en) | 2019-01-11 | 2019-01-11 | Quantum-resistant computing smart home quantum cloud storage method and system based on quantum key card |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109951513B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519223A (en) * | 2019-07-12 | 2019-11-29 | 如般量子科技有限公司 | Anti- quantum calculation data isolation method and system based on asymmetric key pair |
CN112134695A (en) * | 2020-08-14 | 2020-12-25 | 江苏亨通问天量子信息研究院有限公司 | Cloud platform management method and system based on quantum key distribution technology |
CN114244551A (en) * | 2021-09-28 | 2022-03-25 | 自然资源部第三地形测量队 | Data application protection method and device and field painting checking method |
CN114255533A (en) * | 2022-01-28 | 2022-03-29 | 无锡融卡科技有限公司 | Intelligent lock system and implementation method thereof |
CN114301595A (en) * | 2020-09-22 | 2022-04-08 | 如般量子科技有限公司 | Quantum secret communication system based on witness and communication method thereof |
CN115174145A (en) * | 2022-05-30 | 2022-10-11 | 青岛海尔科技有限公司 | Equipment control method and edge gateway equipment |
CN115242785A (en) * | 2022-09-22 | 2022-10-25 | 长江量子(武汉)科技有限公司 | Secure communication method between desktop cloud server and terminal |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103475464A (en) * | 2013-08-20 | 2013-12-25 | 国家电网公司 | Power special quantum encryption gateway system |
US20140331050A1 (en) * | 2011-04-15 | 2014-11-06 | Quintessence Labs Pty Ltd. | Qkd key management system |
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
CN106961327A (en) * | 2017-02-27 | 2017-07-18 | 北京邮电大学 | Key management system and method based on quantum key pond |
US20180205541A1 (en) * | 2014-07-25 | 2018-07-19 | Cheng-Han KO | Multiple encrypting method and system for encrypting a file and/or a protocol |
CN109104276A (en) * | 2018-07-31 | 2018-12-28 | 如般量子科技有限公司 | A kind of cloud storage method of controlling security and system based on pool of keys |
CN109150835A (en) * | 2018-07-20 | 2019-01-04 | 国科量子通信网络有限公司 | Method, apparatus, equipment and the computer readable storage medium of cloud data access |
CN109150519A (en) * | 2018-09-20 | 2019-01-04 | 如般量子科技有限公司 | Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond |
-
2019
- 2019-01-11 CN CN201910027000.3A patent/CN109951513B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140331050A1 (en) * | 2011-04-15 | 2014-11-06 | Quintessence Labs Pty Ltd. | Qkd key management system |
CN103475464A (en) * | 2013-08-20 | 2013-12-25 | 国家电网公司 | Power special quantum encryption gateway system |
US20180205541A1 (en) * | 2014-07-25 | 2018-07-19 | Cheng-Han KO | Multiple encrypting method and system for encrypting a file and/or a protocol |
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
CN106961327A (en) * | 2017-02-27 | 2017-07-18 | 北京邮电大学 | Key management system and method based on quantum key pond |
CN109150835A (en) * | 2018-07-20 | 2019-01-04 | 国科量子通信网络有限公司 | Method, apparatus, equipment and the computer readable storage medium of cloud data access |
CN109104276A (en) * | 2018-07-31 | 2018-12-28 | 如般量子科技有限公司 | A kind of cloud storage method of controlling security and system based on pool of keys |
CN109150519A (en) * | 2018-09-20 | 2019-01-04 | 如般量子科技有限公司 | Anti- quantum calculation cloud storage method of controlling security and system based on public keys pond |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110519223B (en) * | 2019-07-12 | 2023-05-05 | 如般量子科技有限公司 | Anti-quantum computing data isolation method and system based on asymmetric key pair |
CN110519223A (en) * | 2019-07-12 | 2019-11-29 | 如般量子科技有限公司 | Anti- quantum calculation data isolation method and system based on asymmetric key pair |
CN112134695A (en) * | 2020-08-14 | 2020-12-25 | 江苏亨通问天量子信息研究院有限公司 | Cloud platform management method and system based on quantum key distribution technology |
CN112134695B (en) * | 2020-08-14 | 2022-09-06 | 江苏亨通问天量子信息研究院有限公司 | Cloud platform management method and system based on quantum key distribution technology |
CN114301595A (en) * | 2020-09-22 | 2022-04-08 | 如般量子科技有限公司 | Quantum secret communication system based on witness and communication method thereof |
CN114301595B (en) * | 2020-09-22 | 2023-09-29 | 如般量子科技有限公司 | Quantum secret communication system based on witness and communication method thereof |
CN114244551A (en) * | 2021-09-28 | 2022-03-25 | 自然资源部第三地形测量队 | Data application protection method and device and field painting checking method |
CN114244551B (en) * | 2021-09-28 | 2024-01-30 | 自然资源部第三地形测量队 | Data application protection method, equipment and wild external painting verification method |
CN114255533A (en) * | 2022-01-28 | 2022-03-29 | 无锡融卡科技有限公司 | Intelligent lock system and implementation method thereof |
CN114255533B (en) * | 2022-01-28 | 2024-04-16 | 无锡融卡科技有限公司 | Intelligent lock system and implementation method thereof |
CN115174145B (en) * | 2022-05-30 | 2023-12-19 | 青岛海尔科技有限公司 | Equipment control method and edge gateway equipment |
CN115174145A (en) * | 2022-05-30 | 2022-10-11 | 青岛海尔科技有限公司 | Equipment control method and edge gateway equipment |
CN115242785A (en) * | 2022-09-22 | 2022-10-25 | 长江量子(武汉)科技有限公司 | Secure communication method between desktop cloud server and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN109951513B (en) | 2021-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110247765B (en) | Quantum secret data chain communication system | |
CN109951513A (en) | Anti- quantum calculation wired home quantum cloud storage method and system based on quantum key card | |
CN106104562B (en) | System and method for securely storing and recovering confidential data | |
CN103354498B (en) | A kind of file encryption transmission method of identity-based | |
CN109495250A (en) | Anti- quantum calculation wired home communication means based on key card | |
CN109495274A (en) | A kind of decentralization smart lock electron key distribution method and system | |
US10742426B2 (en) | Public key infrastructure and method of distribution | |
CN102685749B (en) | Wireless safety authentication method orienting to mobile terminal | |
CN108243166A (en) | A kind of identity identifying method and system based on USBKey | |
CN104023013A (en) | Data transmission method, server side and client | |
CN109495251A (en) | Anti- quantum calculation wired home cloud storage method and system based on key card | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN110247881A (en) | Identity identifying method and system based on wearable device | |
CN109474419A (en) | A kind of living body portrait photo encryption and decryption method and encrypting and deciphering system | |
CN110535626A (en) | The quantum communications service station secret communication method and system of identity-based | |
CN110224816A (en) | Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number | |
CN110493162A (en) | Identity identifying method and system based on wearable device | |
CN110505055A (en) | Based on unsymmetrical key pond to and key card outer net access identity authentication method and system | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
CN106230840B (en) | A kind of command identifying method of high security | |
CN109104278A (en) | A kind of encrypting and decrypting method | |
CN109889329A (en) | Anti- quantum calculation wired home quantum communications method and system based on quantum key card | |
CN115333845B (en) | Privacy data verification method based on subset | |
CN107104888A (en) | A kind of safe instant communicating method | |
CN201717885U (en) | Code providing equipment and code identification system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |