CN112929168A - Quantum-based key distribution method - Google Patents

Quantum-based key distribution method Download PDF

Info

Publication number
CN112929168A
CN112929168A CN202110164642.5A CN202110164642A CN112929168A CN 112929168 A CN112929168 A CN 112929168A CN 202110164642 A CN202110164642 A CN 202110164642A CN 112929168 A CN112929168 A CN 112929168A
Authority
CN
China
Prior art keywords
key
quantum
quantum key
pool
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110164642.5A
Other languages
Chinese (zh)
Inventor
田宝同
方小牛
张炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Huadian Big Data Technology Co ltd
Original Assignee
Anhui Huadian Big Data Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Huadian Big Data Technology Co ltd filed Critical Anhui Huadian Big Data Technology Co ltd
Priority to CN202110164642.5A priority Critical patent/CN112929168A/en
Publication of CN112929168A publication Critical patent/CN112929168A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Abstract

The invention discloses a quantum key distribution method, which relates to the field of quantum keys and comprises the steps that firstly, a user A sends a confidential file to a user B; secondly, after a request, a key a is randomly used in the quantum key pool A, then the key is sent to the quantum key pool B, and the quantum key pool B sends the key to the quantum key pool C and finally sends the key to the user B; thirdly, the quantum key checker judges whether the keys in each quantum key pool are normally used; fourthly, the quantum key terminal sends an instruction to the quantum key generator to enable the quantum key generator to automatically generate a group of keys; according to the invention, the plurality of quantum key pools are arranged, the quantum key pools are internally provided with the unidirectionally corresponding keys, and the quantum key checker checks each quantum key pool, so that the abnormal place can be accurately obtained, and a new key group can be generated for supplementing through the quantum key generator at the first time after the keys are consumed every time, thereby being convenient and rapid.

Description

Quantum-based key distribution method
Technical Field
The invention relates to the field of quantum keys, in particular to a quantum key distribution method.
Background
The security of Quantum Key Distribution (QKD) is based on the basic principle of quantum mechanics, and unconditional and safe secret communication can be realized by combining a one-time pad cryptosystem. Therefore, attention is being paid to the information protection technology as a new one. However, the optical and electrical devices used to build an actual QKD system may have non-ideal characteristics that are not in accordance with theoretical requirements, and it is easy for an attacker to manipulate non-ideal light sources and detection devices to attack the implementation process of the QKD protocol. For example, photon number splitting attacks and phase partial randomization attacks directed to non-ideal characteristics of the light source; the method aims at the pseudo attack, the time-shifting attack, the blinding attack and the like of the non-ideal characteristic of the detector. Whereas in QKD systems most attacks by attackers are directed to detector vulnerabilities, Lo et al propose measuring device independent quantum key distribution (MDI-QKD) in 2012. In this protocol, both parties of communication transmit light pulses to an untrusted third party for Bell-state measurement to extract a security key. Because the measurement process of the MDI-QKD protocol is carried out by a third party, all attacks aiming at detector bugs in the QKD system can be effectively solved, and the communication distance is prolonged to be twice of the original distance. The MDI-QKD protocol can be implemented using low detection efficiency optics and high loss channels. And the system can also be combined with a decoy state technology to avoid the attack to the non-ideal light source. Therefore, MDI-QKD research can enable quantum key distribution to be more quickly put into practical application from theoretical research.
In the practical application environment of quantum secret communication, the quantum virtual private network gateway supplements the key quantity required by each service in a mode of periodically obtaining a fixed-length key, but when the data flow of the transmission service is too large or too small, the situation of insufficient key quantity supplementation or transition of supplementation may occur, so that the use efficiency of the quantum key is influenced, and further the operation efficiency of a quantum secret communication system is influenced.
Disclosure of Invention
In order to solve the above-mentioned deficiencies in the background art, the present invention provides a quantum-key-based distribution method, wherein a plurality of quantum key pools are provided, and a corresponding one-way key is further provided in each quantum key pool, and each quantum key pool is checked by a quantum key checker, so that an abnormal place can be accurately obtained, and meanwhile, after the key is consumed each time, a new key group can be generated by a quantum key generator for the first time to supplement, which is convenient and fast.
The purpose of the invention can be realized by the following technical scheme:
a quantum key distribution method comprises
A user group for sending messages;
the key pool group: the system comprises three quantum key pools for transmitting keys, wherein the keys are consumed after being used;
quantum key checker: checking the number and the defect of the keys in the key pool group, and marking the keys as abnormal when problems occur;
quantum key terminal: used for recording the abnormity and feeding back the information;
the quantum key generator: after the key is used, generating a new key, and distributing the new key into a quantum key pool;
the method comprises the following steps:
s1, the user A sends the secret file to the user B and requests to use the quantum key;
s2, after a request, randomly using a key a in the quantum key pool A, then sending the key a to the quantum key pool B to obtain a corresponding key B, then sending the key B to the quantum key pool C to obtain a corresponding key C, and finally sending the key C to the user B;
s3, the quantum key checker judges whether the key in each quantum key pool is used normally, and sends the result to the quantum key terminal;
and S4, the quantum key terminal sends an instruction to the quantum key generator, so that the quantum key generator automatically generates a group of keys, and the keys are distributed in the quantum key pools.
Further, the keys in the three quantum key pools are in a single-direction corresponding relation.
Further, the individual correspondence relationship is that the key in the quantum key pool a corresponds to the key in the quantum key pool B, and the key in the quantum key pool B corresponds to the key in the quantum key pool C.
Further, the S3 specifically includes:
s3.1, after the quantum key pool B receives the key of the quantum key pool A and sends the corresponding key, the quantum key checker checks the quantum key pool B to judge whether the abnormality occurs;
s3.2, after the quantum key pool C receives the key of the quantum key pool B and sends the corresponding key, the quantum key checker checks the quantum key pool C to judge whether the abnormality occurs;
and after the abnormity occurs, the abnormity is directly sent to the quantum key terminal.
Further, in S3.1, specifically, the quantum key checker determines whether the number of keys in the key pool B is reduced, and after reducing one key, it indicates that the key is normally sent.
Further, when the number of the keys in the key pool B is not reduced, the missing keys are found, then the missing keys and the corresponding keys in the key pool C are deleted, and the result is fed back to the quantum key terminal.
Further, in S3.2, specifically, the quantum key checker determines whether the number of keys in the key pool C is reduced, and after reducing one key, it indicates that the key is normally sent.
Further, when the number of the keys in the key pool C is not reduced, the missing keys are found and deleted, and the result is fed back to the quantum key terminal.
The invention has the beneficial effects that:
according to the invention, the plurality of quantum key pools are arranged, the quantum key pools are internally provided with the unidirectionally corresponding keys, and the quantum key checker checks each quantum key pool, so that the abnormal place can be accurately obtained, and meanwhile, after the keys are consumed each time, a new key group can be generated by the quantum key generator for supplement at the first time, so that the method is convenient and fast.
Drawings
The invention will be further described with reference to the accompanying drawings.
FIG. 1 is an overall flow chart of the present invention;
fig. 2 is a flow chart of the quantum key checker of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the description of the present invention, it is to be understood that the terms "opening," "upper," "lower," "thickness," "top," "middle," "length," "inner," "peripheral," and the like are used in an orientation or positional relationship that is merely for convenience in describing and simplifying the description, and do not indicate or imply that the referenced component or element must have a particular orientation, be constructed and operated in a particular orientation, and thus should not be considered as limiting the present invention.
A quantum-based key distribution method, as shown in FIGS. 1 and 2, includes
A user group for sending messages;
the key pool group: the system comprises three quantum key pools for transmitting keys, wherein the keys are consumed after being used;
quantum key checker: checking the number and the defect of the keys in the key pool group, and marking the keys as abnormal when problems occur;
quantum key terminal: used for recording the abnormity and feeding back the information;
the quantum key generator: after the key is used, generating a new key, and distributing the new key into a quantum key pool;
the method comprises the following steps:
s1, the user A sends the secret file to the user B and requests to use the quantum key;
s2, after a request, randomly using a key a in the quantum key pool A, then sending the key a to the quantum key pool B to obtain a corresponding key B, then sending the key B to the quantum key pool C to obtain a corresponding key C, and finally sending the key C to the user B;
s3, the quantum key checker judges whether the key in each quantum key pool is used normally, and sends the result to the quantum key terminal;
the S3 specifically includes:
s3.1, after the quantum key pool B receives the key of the quantum key pool A and sends the corresponding key, the quantum key checker checks the quantum key pool B to judge whether the abnormality occurs;
s3.1 specifically comprises the steps of firstly judging whether the number of keys in a key pool B is reduced or not through a quantum key checker, and indicating that the keys are normally sent after one key is reduced; and when the number of the keys is not reduced, finding the missing key, deleting the missing key and the corresponding key in the key pool C, and feeding the result back to the quantum key terminal.
S3.2, after the quantum key pool C receives the key of the quantum key pool B and sends the corresponding key, the quantum key checker checks the quantum key pool C to judge whether the abnormality occurs;
s3.2 specifically, whether the number of keys in the key pool C is reduced or not is judged through a quantum key checker, and after one key is reduced, the key is normally sent; and when the number of the keys is not reduced, finding the missing keys and deleting the keys, and feeding the result back to the quantum key terminal.
And after the abnormity occurs, the abnormity is directly sent to the quantum key terminal.
And S4, the quantum key terminal sends an instruction to the quantum key generator, so that the quantum key generator automatically generates a group of keys, and the keys are distributed in the quantum key pools.
In the description herein, references to the description of "one embodiment," "an example," "a specific example" or the like are intended to mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed.

Claims (8)

1. A quantum key distribution method is characterized by comprising
A user group for sending messages;
the key pool group: the system comprises three quantum key pools for transmitting keys, wherein the keys are consumed after being used;
quantum key checker: checking the number and the defect of the keys in the key pool group, and marking the keys as abnormal when problems occur;
quantum key terminal: used for recording the abnormity and feeding back the information;
the quantum key generator: after the key is used, generating a new key, and distributing the new key into a quantum key pool;
the method comprises the following steps:
s1, the user A sends the secret file to the user B and requests to use the quantum key;
s2, after a request, randomly using a key a in the quantum key pool A, then sending the key a to the quantum key pool B to obtain a corresponding key B, then sending the key B to the quantum key pool C to obtain a corresponding key C, and finally sending the key C to the user B;
s3, the quantum key checker judges whether the key in each quantum key pool is used normally, and sends the result to the quantum key terminal;
and S4, the quantum key terminal sends an instruction to the quantum key generator, so that the quantum key generator automatically generates a group of keys, and the keys are distributed in the quantum key pools.
2. The quantum-based key distribution method of claim 1, wherein the keys in the three quantum key pools have a unidirectional individual correspondence.
3. The quantum-based key distribution method of claim 2, wherein the individual correspondence relationship is that the key in quantum key pool a corresponds to the key in quantum key pool B, and the key in quantum key pool B corresponds to the key in quantum key pool C.
4. The quantum-based key distribution method according to claim 1, wherein the S3 specifically includes:
s3.1, after the quantum key pool B receives the key of the quantum key pool A and sends the corresponding key, the quantum key checker checks the quantum key pool B to judge whether the abnormality occurs;
s3.2, after the quantum key pool C receives the key of the quantum key pool B and sends the corresponding key, the quantum key checker checks the quantum key pool C to judge whether the abnormality occurs;
and after the abnormity occurs, the abnormity is directly sent to the quantum key terminal.
5. The quantum-based key distribution method according to claim 4, wherein the S3.1 specifically is that the quantum key checker first determines whether the number of keys in the key pool B is reduced, and after reducing one key, it indicates that the key is normally sent.
6. The quantum-based key distribution method of claim 5, wherein when the number of keys in the key pool B is not decreased, a missing key is found, and then the missing key and the corresponding key in the key pool C are deleted, and the result is fed back to the quantum key terminal.
7. The quantum-based key distribution method according to claim 4, wherein the S3.2 is specifically configured to determine, by the quantum key checker, whether the number of keys in the key pool C is decreased, and after one key is decreased, it indicates that the key is normally sent.
8. The quantum-based key distribution method of claim 7, wherein when the number of keys in the key pool C is not decreased, the missing keys are found and deleted, and the result is fed back to the quantum key terminal.
CN202110164642.5A 2021-02-05 2021-02-05 Quantum-based key distribution method Withdrawn CN112929168A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110164642.5A CN112929168A (en) 2021-02-05 2021-02-05 Quantum-based key distribution method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110164642.5A CN112929168A (en) 2021-02-05 2021-02-05 Quantum-based key distribution method

Publications (1)

Publication Number Publication Date
CN112929168A true CN112929168A (en) 2021-06-08

Family

ID=76170903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110164642.5A Withdrawn CN112929168A (en) 2021-02-05 2021-02-05 Quantum-based key distribution method

Country Status (1)

Country Link
CN (1) CN112929168A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103490891A (en) * 2013-08-23 2014-01-01 中国科学技术大学 Method for updating and using secret key in power grid SSL VPN
WO2014194858A1 (en) * 2013-06-08 2014-12-11 安徽量子通信技术有限公司 Mobile secret communications method based on quantum key distribution network
CN105915337A (en) * 2016-05-27 2016-08-31 安徽问天量子科技股份有限公司 Quantum encryption microwave relay communication system and quantum encryption microwave relay communication method
CN106961327A (en) * 2017-02-27 2017-07-18 北京邮电大学 Key management system and method based on quantum key pond
CN107094076A (en) * 2017-04-14 2017-08-25 江苏亨通问天量子信息研究院有限公司 Secret communication method and communication system based on quantum true random number
CN107294708A (en) * 2017-06-26 2017-10-24 国家电网公司 A kind of quantum key optimum allocation method and device based on message flow
CN107483196A (en) * 2017-09-08 2017-12-15 中南大学 Data stream encryption system and its implementation based on continuous variable quantum key distribution
CN108696353A (en) * 2018-05-30 2018-10-23 厦门科华恒盛股份有限公司 A kind of distribution method of quantum key and system, service station
CN109787751A (en) * 2017-11-14 2019-05-21 阿里巴巴集团控股有限公司 The dissemination system and its distribution method and data processing method of quantum key
CN112134695A (en) * 2020-08-14 2020-12-25 江苏亨通问天量子信息研究院有限公司 Cloud platform management method and system based on quantum key distribution technology

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014194858A1 (en) * 2013-06-08 2014-12-11 安徽量子通信技术有限公司 Mobile secret communications method based on quantum key distribution network
CN104243143A (en) * 2013-06-08 2014-12-24 安徽量子通信技术有限公司 Mobile secret communication method based on quantum key distribution network
CN103490891A (en) * 2013-08-23 2014-01-01 中国科学技术大学 Method for updating and using secret key in power grid SSL VPN
CN105915337A (en) * 2016-05-27 2016-08-31 安徽问天量子科技股份有限公司 Quantum encryption microwave relay communication system and quantum encryption microwave relay communication method
CN106961327A (en) * 2017-02-27 2017-07-18 北京邮电大学 Key management system and method based on quantum key pond
CN107094076A (en) * 2017-04-14 2017-08-25 江苏亨通问天量子信息研究院有限公司 Secret communication method and communication system based on quantum true random number
CN107294708A (en) * 2017-06-26 2017-10-24 国家电网公司 A kind of quantum key optimum allocation method and device based on message flow
CN107483196A (en) * 2017-09-08 2017-12-15 中南大学 Data stream encryption system and its implementation based on continuous variable quantum key distribution
CN109787751A (en) * 2017-11-14 2019-05-21 阿里巴巴集团控股有限公司 The dissemination system and its distribution method and data processing method of quantum key
CN108696353A (en) * 2018-05-30 2018-10-23 厦门科华恒盛股份有限公司 A kind of distribution method of quantum key and system, service station
CN112134695A (en) * 2020-08-14 2020-12-25 江苏亨通问天量子信息研究院有限公司 Cloud platform management method and system based on quantum key distribution technology

Similar Documents

Publication Publication Date Title
US11140141B2 (en) Multiparty key exchange
Angel et al. Unobservable communication over fully untrusted infrastructure
US8144874B2 (en) Method for obtaining key for use in secure communications over a network and apparatus for providing same
CN108681853A (en) Logistics information transmission method, system and device based on block chain
EP0872977A2 (en) System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection
EP1575210A1 (en) Method and apparatus for hybrid group key management
CN112104604B (en) System and method for realizing secure access service based on electric power Internet of things management platform
CN108964893B (en) Key processing method, device, equipment and medium
CN111082929A (en) Method for realizing encrypted instant communication
Alshowkan et al. Authentication of smart grid communications using quantum key distribution
CN110798402B (en) Service message processing method, device, equipment and storage medium
Guangjun et al. Secure network coding against intra/inter-generation pollution attacks
CN110519238A (en) A kind of Internet of Things security system and communication means based on cryptographic technique
CN112929168A (en) Quantum-based key distribution method
EP2892206A1 (en) A system and method for push framework security
WO2024027070A1 (en) Terminal device authentication method and system based on identification public key, and computer-readable storage medium
Siddiqui et al. Hardware assisted security architecture for smart grid
CN113037611B (en) Mobile safety instant communication method based on multiple public IM channels
US11659384B2 (en) Data center 5G network encrypted multicast-based authority authentication method and system
US20200322146A1 (en) Protecting Sensors and Emitters
CN103746899B (en) mail reading system and method
Qin et al. Flexible encryption for reliable transmission based on the P4 programmable platform
Yang et al. Industry trusted network communication based on quantum encryption
Lokesh et al. A review on analysis of transport layer security in open quantum safe cryptographic algorithm
Dalai et al. A novel approach for message authentication to prevent parameter tampering attack in web applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20210608