CN112019331A - Encryption and decryption method and system for quantum secret communication - Google Patents

Encryption and decryption method and system for quantum secret communication Download PDF

Info

Publication number
CN112019331A
CN112019331A CN202010800104.6A CN202010800104A CN112019331A CN 112019331 A CN112019331 A CN 112019331A CN 202010800104 A CN202010800104 A CN 202010800104A CN 112019331 A CN112019331 A CN 112019331A
Authority
CN
China
Prior art keywords
node
key
quantum
relay
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010800104.6A
Other languages
Chinese (zh)
Other versions
CN112019331B (en
Inventor
富尧
钟一民
王泽军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruban Quantum Technology Co Ltd
Nanjing Ruban Quantum Technology Co Ltd
Original Assignee
Ruban Quantum Technology Co Ltd
Nanjing Ruban Quantum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruban Quantum Technology Co Ltd, Nanjing Ruban Quantum Technology Co Ltd filed Critical Ruban Quantum Technology Co Ltd
Priority to CN202010800104.6A priority Critical patent/CN112019331B/en
Publication of CN112019331A publication Critical patent/CN112019331A/en
Application granted granted Critical
Publication of CN112019331B publication Critical patent/CN112019331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes

Abstract

The invention provides an encryption and decryption method and system for quantum secret communication, wherein a relay node directly connected with a target node is used as an odd node, an adjacent relay node of the relay node is used as an even node, and the like; when the starting node and the target node carry out data transmission, each odd node transmits the exclusive OR of the quantum keys between the odd node and two adjacent nodes to the starting node, and each even node transmits the exclusive OR of the quantum keys between the even node and two adjacent nodes to the target node. The starting node uses the own key to carry out XOR with the received key to obtain an encryption key, and the target node uses the own key to carry out XOR with the received key data to obtain a decryption key. The invention does not transmit a specific relay key in the relay node, so that the requirement that the relay key needs to pass through all the relay nodes hop by hop does not exist, the credibility requirement on the relay node is reduced, and the security of confidential information transmission can be fully ensured.

Description

Encryption and decryption method and system for quantum secret communication
Technical Field
The invention relates to the field of quantum secure communication, in particular to an encryption and decryption method and system for quantum secure communication.
Background
The encryption and decryption of the existing quantum secret communication are mainly based on the hop-by-hop transfer of a secret key by a trusted relay, the flow is shown in fig. 1, for example, an initial node needs to send data to a target node, the initial node firstly carries out quantum secret communication negotiation with an adjacent node (set as a first hop node) to obtain a quantum secret key K, the initial node carries out encryption operation (generally, exclusive or operation) on the data by using the quantum secret key K and then sends the encrypted information to the target node through classical communication; carrying out quantum secret communication negotiation on a first hop node and adjacent nodes (a second hop node is set, and a third hop node, a fourth hop node …, an Nth hop node and a target node are set in sequence below) to obtain a quantum key K1, and then encrypting the quantum key K by the first hop node through K1 and transmitting the encrypted quantum key K to the second hop node through classical communication; the second hop node and the third hop node carry out quantum secret communication negotiation to obtain a quantum key K2, and then the second hop node can encrypt the quantum key K by using K2 and then transmits the quantum key K to the third node through classical communication; in this way, the quantum key K can be finally delivered to the destination node in an encrypted manner. It can be seen that such a key relay method requires that the quantum key K passes through each intermediate node hop by hop, and has a high requirement on the security of the intermediate nodes.
To overcome this drawback, in the prior art, patent 2017114705711 discloses a quantum key relay method, and specifically discloses the following: as shown in fig. 2, a is an originating node, B is a target node, C1C2C3 is a relay node, and so on. The starting node A and the C1 negotiate out quantum keys K1, C1 and C2 in a quantum secret communication mode, negotiate out quantum keys K2, C2 and C3 in a quantum secret communication mode, negotiate out quantum keys K3 and C3 and a target node B in a quantum secret communication mode, and negotiate out quantum key K4. When A needs to send data to a target node B, the A firstly encrypts the data to be sent by using a quantum key K1 and then sends the encrypted data to the target node B through classical communication; then the relay node C1 XOR-transmits the quantum key K1 and the quantum key K2 to the target node B through a classical channel, the relay node C2 XOR-transmits the K2 and the K3 to the target node B through the classical channel, the relay node C3 XOR-transmits the K3 and the K4 to the target node B through the classical channel, and finally the target node B can decrypt the quantum key K1 by using the information.
The technical scheme is equivalent to that K1 is used as a relay key, then a subsequent relay node directly sends the XOR of the relay key and the negotiation key of the adjacent node to a target node, the negotiation keys of the relay nodes are respectively solved in the reverse direction of the target node, and finally the relay key K1 is inverted, wherein the relay key K1 used for encryption is generated at the first relay node C1 besides the initial node A, and a certain leakage risk still exists. In addition, in this scheme, the communication pressure at the target node B is high, and the target node needs to calculate the relay key K1 according to the received adjacent exclusive or values of all nodes, which is also high in calculation pressure.
Disclosure of Invention
The purpose of the invention is as follows: in order to overcome the defects of the prior art, the invention provides an encryption and decryption method and system for quantum secure communication. The invention overcomes the inertia thinking of the prior art, and does not transmit a specific relay key in the relay node, so that the requirement that the relay key needs to pass through all the relay nodes hop by hop does not exist, and the credibility requirement on the relay node is reduced. In the invention, the key used by the starting node for encrypting data and the key used by the target node for decrypting are obtained by quantum key calculation of each relay node in the link, so that the security of secret information transmission can be fully ensured.
The invention content is as follows: in order to achieve the above object, in one aspect, the present invention provides an encryption and decryption method for quantum secure communication, including the steps of:
(1) establishing a quantum channel between the starting node and the target node;
(2) dividing each relay node between the starting node and the target node into an odd node and an even node: taking a relay node directly connected with a target node as an odd node, taking an adjacent relay node of the relay node as an even node, and repeating the steps until all the relay nodes are divided;
(3) configuring quantum keys of the relay nodes and adjacent nodes for each relay node;
(4) before the starting node sends data T to the target node, each odd node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the starting node, and simultaneously, each even node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the target node;
after receiving the key data transmitted by all odd nodes, the initial node firstly carries out XOR on the data T to be transmitted by using a quantum key of the initial node, then carries out XOR on the calculation result and all the received key data to obtain encrypted data, and finally transmits the encrypted data to the target node through classical communication;
and after receiving the key data transmitted by all the even nodes, the target node uses the quantum key of the target node to XOR all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
Several alternatives are provided below, but not as an additional limitation to the above general solution, but merely as a further addition or preference, each alternative being combinable individually for the above general solution or among several alternatives without technical or logical contradictions.
Optionally, in the step (3), the method for configuring the quantum key for each relay node includes:
the quantum key between each relay node and the adjacent node is stored in each relay node in advance; or the like, or, alternatively,
and pre-configuring a quantum key negotiation method between adjacent nodes in the link, and negotiating a quantum key with the adjacent nodes according to the quantum key negotiation method when each relay node communicates with the adjacent nodes.
Optionally, the quantum key agreement method is a quantum key agreement method specified by the BB84 protocol.
Optionally, the quantum key agreement method is a quantum key agreement method specified by a BB84 protocol based on a spoofing state.
On the other hand, the invention also provides an encryption and decryption system for quantum secret communication, which comprises a communication link consisting of an initial node, a target node and a plurality of relay nodes arranged between the initial node and the target node;
a quantum channel is established between the starting node and the target node;
in a communication link, quantum communication is carried out between adjacent nodes through quantum keys; all relay nodes are divided into two categories: the system comprises odd nodes and even nodes, wherein a relay node directly connected with a target node is the odd node, an adjacent relay node of the relay node is the even node, and the rest is done in sequence;
before the starting node sends data T to the target node, each odd node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the starting node, and simultaneously, each even node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the target node;
after receiving the key data transmitted by all odd nodes, the initial node firstly carries out XOR on the data T to be transmitted by using a quantum key of the initial node, then carries out XOR on the calculation result and all the received key data to obtain encrypted data, and finally transmits the encrypted data to the target node through classical communication;
and after receiving the key data transmitted by all the even nodes, the target node uses the quantum key of the target node to XOR all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
For the above system, the present invention also proposes the following alternatives, which can be combined individually for the above overall scheme or be combined among a plurality of alternatives, without technical or logical contradictions.
Optionally, in the encryption and decryption system, the quantum key between adjacent nodes is pre-stored in each node, or is obtained by performing key agreement before each node communicates with an adjacent node.
Optionally, in the encryption and decryption system, the quantum key between adjacent nodes is obtained based on a BB84 protocol negotiation.
Optionally, in the encryption and decryption system, the quantum key between the adjacent nodes is obtained by negotiation using a BB84 protocol based on a spoofing state.
Has the advantages that:
1. the invention does not transmit a specific relay key in the relay node, so that the requirement that the relay key needs to pass through all the relay nodes hop by hop does not exist, and the credibility requirement on the relay node is reduced.
2. In the invention, the key used by the starting node for encrypting data and the key used by the target node for decrypting are obtained by quantum key calculation of each relay node in the link, so that the security of secret information transmission can be fully ensured.
3. In the invention, the initial node calculates the key data transmitted by the odd node, the target node calculates the key data transmitted by the even node, and the calculation amount can be distributed to the initial node and the target node.
Drawings
Fig. 1 is a schematic flow chart of a key relay in the prior art;
FIG. 2 is a schematic flow chart of another key relay in the prior art;
fig. 3 is a block diagram of an encryption/decryption system for quantum secure communication according to embodiment 1;
FIG. 4 is a flowchart of an encryption/decryption method according to embodiment 2;
fig. 5 is a flowchart of the encryption and decryption method according to embodiment 3.
Detailed Description
The invention will be further described with reference to the accompanying drawings and specific embodiments. It is to be understood that the present invention may be embodied in various forms, and that there is no intention to limit the invention to the specific embodiments illustrated, but on the contrary, the intention is to cover some exemplary and non-limiting embodiments shown in the attached drawings and described below.
It is to be understood that the features listed above for the different embodiments may be combined with each other to form further embodiments within the scope of the invention, where technically feasible. Furthermore, the particular examples and embodiments of the invention described are non-limiting, and various modifications may be made in the structure, steps, and sequence set forth above without departing from the scope of the invention.
The invention aims to overcome the inertial thinking of the prior art and provides a scheme which does not transmit a specific relay key in a relay node and can also realize quantum secret communication between an initiating node and a target node.
In view of the above, the present invention provides an encryption and decryption method and system for quantum secure communication. The following detailed description is to be read with reference to the drawings and the accompanying detailed description.
Example 1:
the present embodiment proposes an encryption and decryption method for quantum secure communication, which is implemented in the encryption and decryption system for quantum secure communication shown in fig. 3, in which the number of relay nodes is n.
The whole method comprises the following steps:
(1) a quantum channel is established between the starting node and the target node.
(2) Dividing n relay nodes between an initial node and a target node into odd nodes and even nodes, wherein the dividing rule is as follows: taking a relay node directly connected with a target node as an odd node, taking an adjacent relay node of the relay node as an even node, and repeating the steps until all the relay nodes are divided; as shown in fig. 3, among the n relay nodes, the relay node directly connected to the target node is numbered B1, and then sequentially numbered in the direction of the start node, the next relay node connected to the relay node B1 is numbered B2, the next relay node connected to the relay node B2 is numbered B3 … …, and the relay node directly connected to the start node is numbered Bn, then B1, B3, and B5 … … are odd nodes, and the rest are even nodes.
(3) Each relay node is configured with its quantum key with its neighboring nodes. Here, the quantum key between the adjacent nodes may be pre-stored in each node, or may be obtained by each node performing real-time negotiation before communicating with the adjacent node according to a pre-set key negotiation method, and the negotiation method may include various methods, for example, the quantum key between the adjacent nodes is obtained by negotiation based on the BB84 protocol, or the quantum key between the adjacent nodes is obtained by negotiation based on the BB84 protocol in a spoofed state.
It should be noted that, in the present invention, the configuration (negotiation) manner of the quantum key between adjacent nodes is not limited, and all feasible key generation methods should be included in the scope of the present invention.
(4) Before the starting node sends data T to the target node, each odd node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the starting node, and simultaneously, each even node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the target node;
after receiving the key data transmitted by all odd nodes, the initial node firstly carries out XOR on the data T to be transmitted by using a quantum key of the initial node, then carries out XOR on the calculation result and all the received key data to obtain encrypted data, and finally transmits the encrypted data to the target node through classical communication;
and after receiving the key data transmitted by all the even nodes, the target node uses the quantum key of the target node to XOR all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
In the present invention, the number of relay nodes is not limited, that is, n may be an odd number or an even number, and the following description will be made by embodiments 2 and 3 with respect to the case where n is an odd number or an even number.
Example 2:
the flow of this embodiment is shown in fig. 4, where the starting node in the entire communication link is a, the target node is E, and there are 3 relay nodes, which are B, C, D respectively.
When A initiates a communication demand, firstly, a quantum communication link is established between A and E, then quantum keys are negotiated between adjacent nodes in a quantum secret communication mode, the shared quantum key between the node A and the node B is K1, the shared quantum key between B and C is K2, the shared quantum key between C and D is K3, and the shared quantum key between D and E is K4. When the quantum communication link is established, odd and even nodes are identified for the intermediate node, and the specific rule is as follows: starting from the target node, the relay nodes directly adjacent to the target node are odd nodes, and then the relay nodes are sequentially encoded according to odd numbers and even numbers, for example, D in fig. 4 is an odd node, C is an even node, and B is an odd node. After parity of each relay node is confirmed, then the odd node conducts exclusive-OR encryption on two quantum keys negotiated with adjacent nodes and transmits the encrypted quantum keys to the initial node, the initial node conducts exclusive-OR encryption on data by utilizing the known quantum keys and then conducts exclusive-OR operation on the data and the received quantum keys, and after the exclusive-OR encryption is completed, the initial node sends the encrypted data to the target node through a classical channel. Similarly, an even number relay node in the quantum communication link transmits two quantum keys negotiated by the relay node and an adjacent node after XOR operation to a target node through a classical channel, and the target node can decrypt encrypted information sent by an initial node by using the known quantum key and the quantum key transmitted by the even number relay node. As shown in fig. 3, the quantum key of the start node a itself is K1, the received quantum keys of the odd nodes are K3 xor K4 of the D node and K1 xor K2 of the B node, so that the encryption key of the start node is K1 ≦ K4 (K3 ≦ K3526); the quantum key of the target node E is K4, and the received quantum key of the even node is K2 xor K3 of the C node, so that the decryption key of the target node is K4 × (K2 ×) K3.
Example 3:
the flow of this embodiment is shown in fig. 5, where the starting node is a, the target node is D, and there are 2 relay nodes in the entire communication link, which are B, C respectively. According to the identification of the parity of the relay node, C is an odd node, B is an even node, the quantum key of the starting node A is K1, the received quantum key of the odd node is K2 XOR K3 of the C node, so that the encryption key of the starting node is K1 ^ K3 (K2 ^ K3); the quantum key of the target node D is K3, and the received quantum key of the even node is K1 xor K2 of the node B, so the decryption key of the target node is K3 × (K1 ×) K2.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. An encryption and decryption method for quantum secure communication, comprising the steps of:
(1) establishing a quantum channel between the starting node and the target node;
(2) dividing each relay node between the starting node and the target node into an odd node and an even node: taking a relay node directly connected with a target node as an odd node, taking an adjacent relay node of the relay node as an even node, and repeating the steps until all the relay nodes are divided;
(3) configuring quantum keys of the relay nodes and adjacent nodes for each relay node;
(4) before the starting node sends data T to the target node, each odd node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the starting node, and simultaneously, each even node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the target node;
after receiving the key data transmitted by all odd nodes, the initial node firstly carries out XOR on the data T to be transmitted by using a quantum key of the initial node, then carries out XOR on the calculation result and all the received key data to obtain encrypted data, and finally transmits the encrypted data to the target node through classical communication;
and after receiving the key data transmitted by all the even nodes, the target node uses the quantum key of the target node to XOR all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
2. The encryption and decryption method for quantum secure communication according to claim 1, wherein in the step (3), the method for configuring the quantum key for each relay node comprises:
the quantum key between each relay node and the adjacent node is stored in each relay node in advance; or the like, or, alternatively,
and pre-configuring a quantum key negotiation method between adjacent nodes in the link, and negotiating a quantum key with the adjacent nodes according to the quantum key negotiation method when each relay node communicates with the adjacent nodes.
3. The encryption and decryption method for quantum secure communication according to claim 2, wherein the quantum key agreement method is a quantum key agreement method specified by BB84 protocol.
4. The encryption and decryption method for quantum secure communication according to claim 2, wherein the quantum key agreement method is a quantum key agreement method specified by BB84 protocol based on a spoofed state.
5. An encryption and decryption system for quantum secure communication, comprising a communication link consisting of an originating node, a destination node and a plurality of relay nodes arranged between the originating node and the destination node,
a quantum channel is established between the starting node and the target node;
in a communication link, quantum communication is carried out between adjacent nodes through quantum keys; all relay nodes are divided into two categories: the system comprises odd nodes and even nodes, wherein a relay node directly connected with a target node is the odd node, an adjacent relay node of the relay node is the even node, and the rest is done in sequence;
before the starting node sends data T to the target node, each odd node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the starting node, and simultaneously, each even node transmits the exclusive OR of the quantum key between itself and two adjacent nodes to the target node;
after receiving the key data transmitted by all odd nodes, the initial node firstly carries out XOR on the data T to be transmitted by using a quantum key of the initial node, then carries out XOR on the calculation result and all the received key data to obtain encrypted data, and finally transmits the encrypted data to the target node through classical communication;
and after receiving the key data transmitted by all the even nodes, the target node uses the quantum key of the target node to XOR all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
6. The encryption and decryption system for quantum secure communication according to claim 5, wherein the quantum key between the adjacent nodes is pre-stored in each node or obtained by each node through key agreement before communicating with the adjacent nodes.
7. The encryption and decryption system for quantum secure communication according to claim 6, wherein the quantum key between the adjacent nodes is obtained based on BB84 protocol negotiation.
8. The encryption and decryption system for quantum secure communication according to claim 6, wherein the quantum key between the adjacent nodes is obtained by employing a BB84 protocol negotiation based on a spoof state.
CN202010800104.6A 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication Active CN112019331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010800104.6A CN112019331B (en) 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010800104.6A CN112019331B (en) 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication

Publications (2)

Publication Number Publication Date
CN112019331A true CN112019331A (en) 2020-12-01
CN112019331B CN112019331B (en) 2023-09-26

Family

ID=73504173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010800104.6A Active CN112019331B (en) 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication

Country Status (1)

Country Link
CN (1) CN112019331B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079008A (en) * 2021-04-26 2021-07-06 北京玻色量子科技有限公司 Data communication method, device and system
CN114362936A (en) * 2020-12-30 2022-04-15 广东国腾量子科技有限公司 Secret key relay method in communication network based on quantum secrecy
CN117579276A (en) * 2024-01-16 2024-02-20 浙江国盾量子电力科技有限公司 Quantum encryption method for feeder terminal and quantum board card module

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100299526A1 (en) * 2008-01-25 2010-11-25 Qinetiq Limited Network having quantum key distribution
US20130251145A1 (en) * 2010-12-02 2013-09-26 Qinetiq Limited Quantum key distribution
CN109995515A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of quantum key trunking method
CN109995511A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of mobile secret communication method based on quantum key distribution network
CN110808837A (en) * 2019-11-21 2020-02-18 国网福建省电力有限公司 Quantum key distribution method and system based on tree-shaped QKD network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100299526A1 (en) * 2008-01-25 2010-11-25 Qinetiq Limited Network having quantum key distribution
US20130251145A1 (en) * 2010-12-02 2013-09-26 Qinetiq Limited Quantum key distribution
CN109995515A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of quantum key trunking method
CN109995511A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of mobile secret communication method based on quantum key distribution network
CN110808837A (en) * 2019-11-21 2020-02-18 国网福建省电力有限公司 Quantum key distribution method and system based on tree-shaped QKD network

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114362936A (en) * 2020-12-30 2022-04-15 广东国腾量子科技有限公司 Secret key relay method in communication network based on quantum secrecy
CN113079008A (en) * 2021-04-26 2021-07-06 北京玻色量子科技有限公司 Data communication method, device and system
WO2022228262A1 (en) * 2021-04-26 2022-11-03 北京玻色量子科技有限公司 Data communication method, apparatus, and system
CN117579276A (en) * 2024-01-16 2024-02-20 浙江国盾量子电力科技有限公司 Quantum encryption method for feeder terminal and quantum board card module
CN117579276B (en) * 2024-01-16 2024-03-29 浙江国盾量子电力科技有限公司 Quantum encryption method for feeder terminal and quantum board card module

Also Published As

Publication number Publication date
CN112019331B (en) 2023-09-26

Similar Documents

Publication Publication Date Title
CN110581763B (en) Quantum key service block chain network system
US8254581B2 (en) Lightweight key distribution and management method for sensor networks
US8345875B2 (en) System and method of creating and sending broadcast and multicast data
RU2421922C2 (en) METHOD AND DEVICE TO ESTABLISH SAFETY ASSOCIATIONS BETWEEN UNITS OF WIRELESS SELF-ORGANISING SINGLE-RANGE (ad-hoc) NETWORK
CN112019331B (en) Encryption and decryption method and system for quantum secret communication
CN104994112A (en) Method for encrypting communication data chain between unmanned aerial vehicle and ground station
US20100042841A1 (en) Updating and Distributing Encryption Keys
WO2023082599A1 (en) Blockchain network security communication method based on quantum key
WO2022142307A1 (en) Secure relay-based quantum communication method and communication network
CN106685969A (en) Hybrid-encrypted information transmission method and transmission system
CN100594691C (en) Data transmission encryption method of MANET network
CN110855438B (en) Quantum key distribution method and system based on annular QKD network
JP2022519688A (en) End-to-end double ratchet encryption with epoch key exchange
CN102098318A (en) Method for performing end-to-end anonymity safety communication of hop network
Kapur et al. Secure data transfer in MANET using symmetric and asymmetric cryptography
KR20160020866A (en) Method and system for providing service encryption in closed type network
CN101588345A (en) Methods and devices for transmitting, transferring and receiving information and communication system between stations
AU2002346319B2 (en) Shared data refining device and shared data refining method
GB2604666A (en) Key exchange protocol chaining
CN114331423A (en) Digital currency exchange method and system based on quantum communication
CN110380848B (en) Method for safely communicating fixed sensor node and mobile sink node in underwater acoustic communication
EP2047631B1 (en) Method for establishing a secret key between two nodes in a communication network
CN114285550A (en) Quantum security key service network, system and node device
CN114244499A (en) Group communication method and system based on tree structure symmetric key pool
CN114079877B (en) Group communication method and system based on hierarchical symmetric key pool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant