CN113395158B - Message authentication key generation method and device and message authentication system - Google Patents

Message authentication key generation method and device and message authentication system Download PDF

Info

Publication number
CN113395158B
CN113395158B CN202110945624.0A CN202110945624A CN113395158B CN 113395158 B CN113395158 B CN 113395158B CN 202110945624 A CN202110945624 A CN 202110945624A CN 113395158 B CN113395158 B CN 113395158B
Authority
CN
China
Prior art keywords
key
message authentication
security
keys
post
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110945624.0A
Other languages
Chinese (zh)
Other versions
CN113395158A (en
Inventor
刘鹏
姚海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zhongchuangwei Nanjing Quantum Communication Technology Co ltd
Original Assignee
Beijing Zhongchuangwei Nanjing Quantum Communication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zhongchuangwei Nanjing Quantum Communication Technology Co ltd filed Critical Beijing Zhongchuangwei Nanjing Quantum Communication Technology Co ltd
Priority to CN202110945624.0A priority Critical patent/CN113395158B/en
Publication of CN113395158A publication Critical patent/CN113395158A/en
Application granted granted Critical
Publication of CN113395158B publication Critical patent/CN113395158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method, a device and a system for generating a message authentication key, wherein the method for generating the message authentication key comprises the following steps: carrying out post-processing on the original key to obtain a post-processing key; performing security evaluation on the post-processing key, and deducting the key with inconsistent security coefficient in the post-processing key to obtain a secure key; a portion of the security keys is selected as a message authentication key. Therefore, the authentication key of the application is generated from the obtained security key, and the authentication key does not need to be replaced by special equipment such as a key gun, so that the message authentication key can be replaced conveniently in time through the quantum key distribution network. In addition, the key extracted in the processes of vector comparison, error correction and privacy enhancement is stored in the key pool firstly, and then the message authentication is carried out, so that the message authentication is carried out only once, and the security of the message authentication key is improved.

Description

Message authentication key generation method and device and message authentication system
Technical Field
The present application relates to the field of quantum communication technologies, and in particular, to a method and an apparatus for generating a message authentication key, and a message authentication system.
Background
The quantum communication provides absolute security assurance which cannot be intercepted and cracked by calculation based on three principles of uncertainty, measurement collapse and unclonable in quantum mechanics, and theoretically ensures unconditional security of information. Has great application value and prospect in the information security field of national security, finance and the like, and gradually enters the daily life of people.
One of the ways quantum communication is implemented is quantum key distribution. The method comprises the steps that Alice emits single photons, Bob detects and receives the single photons, and then the single photons are subjected to basis vector comparison, error correction, secret amplification and the like, so that the same group of secret keys are generated at the Alice and the Bob. In each step of vector comparison, error correction and privacy amplification, data interaction is required to be completed through a QKD classical network, and data integrity is guaranteed without being tampered by a man-in-the-middle.
The existing message authentication Key is a fixed Key preset by both communication parties, the message authentication process of links such as basis vector comparison, error correction and privacy enhancement is shown in fig. 1, an original Key is subjected to basis vector comparison to extract a signed Key, the signed Key is subjected to error correction to extract a Corrected Key, the Corrected Key is subjected to privacy enhancement to extract a Final secure Key Final Key, and Alice and Bob need to perform message authentication between each step of the links such as basis vector comparison, error correction and privacy enhancement.
Disclosure of Invention
The application provides a method and a device for generating a message authentication key and a message authentication system, which aim to solve the problem that the message authentication key is complicated to replace in the prior art.
A first aspect of the present application provides a method for generating a message authentication key, including the following steps:
extracting a Sifted Key from an original Key obtained by quantum Key distribution through basis vector comparison, and putting the Sifted Key into a Key pool;
extracting a Corrected Key from the Sifted Key through an error correction process, and putting the Corrected Key into a Key pool;
extracting a Final Key from the Corrected Key through a security enhancement process, and putting the Final Key into a Key pool;
performing message authentication on the key in the key pool to obtain a post-processing key;
performing security evaluation on the post-processing key, and deducting the key with the security coefficient larger than a preset security coefficient threshold value in the post-processing key to obtain a security key;
a portion of the security keys is selected as a message authentication key.
Preferably, the performing security evaluation on the post-processing key and deducting a key with a non-compliant security coefficient in the post-processing key to obtain the secure key includes:
acquiring an authentication time epsilon required by the post-processing key according to the key length n and the message authentication;
evaluating the safety coefficient of the post-processing key according to the key length n and the authentication time epsilon;
and deducting the key with the safety coefficient larger than the preset safety coefficient threshold value in the post-processing key to obtain the safe key.
Preferably, the selecting a part of the security keys as the message authentication keys comprises:
selecting a part of keys from the security keys as message authentication keys in a sequential manner;
or selecting a part of keys from the security keys as message authentication keys according to a reverse order mode;
or selecting a part of keys from the security keys as message authentication keys in an intermediate order;
or a part of the key is selected from the security key as the message authentication key in a random manner.
Preferably, the preset safety factor threshold is set according to the authentication time and the operation speed of the super computer.
A second aspect of the present application provides a message authentication key generation apparatus, including:
the system comprises a base vector comparison module, a Key pool and a Key management module, wherein the base vector comparison module is used for extracting a Sifted Key from an original Key obtained by quantum Key distribution through base vector comparison and putting the Sifted Key into the Key pool;
the error correction module is used for extracting a Corrected Key from the Sifted Key through an error correction process and putting the Corrected Key into a Key pool;
the secrecy enhancement module is used for extracting the Final Key from the Corrected Key through the secrecy enhancement process and putting the Final Key into the Key pool;
the message authentication module is used for performing message authentication on the keys in the key pool to obtain a post-processing key;
the security evaluation module is used for carrying out security evaluation on the post-processing key and deducting the key with the security coefficient larger than a preset security coefficient threshold value in the post-processing key to obtain a security key;
and the message authentication key generation module is used for selecting a part of keys in the security keys as the message authentication keys.
Preferably, the security assessment module comprises:
the acquisition module is used for acquiring the authentication time epsilon required by the post-processing key according to the key length n and the message authentication;
the evaluation module is used for evaluating the safety coefficient of the post-processing key according to the key length n and the authentication time epsilon;
and the safety key generation module is used for deducting the key with the safety coefficient larger than the preset safety coefficient threshold value in the post-processing key to obtain the safety key.
Preferably, the message authentication key generation module includes:
the selection module is used for selecting a part of keys from the security keys in a sequence mode to be used as message authentication keys;
or selecting a part of keys from the security keys as message authentication keys according to a reverse order mode;
or selecting a part of keys from the security keys as message authentication keys in an intermediate order;
or a part of the key is selected from the security key as the message authentication key in a random manner.
A third aspect of the present application provides a message authentication system, wherein when a message authentication key of the message authentication system needs to be replaced, a new message authentication key is obtained by any one of the above message authentication key generation methods, and is used as a key for next message authentication.
Compared with the prior art, the message authentication key generation method, the message authentication key generation device and the message authentication system have the following advantages:
1. the message authentication key generation method comprises the following steps: carrying out post-processing on the original key to obtain a post-processing key; performing security evaluation on the post-processing key, and deducting the key higher than the security coefficient threshold value to obtain a security key; a portion of the security keys is selected as a message authentication key. Therefore, the authentication key of the application is generated from the obtained security key, and the authentication key does not need to be replaced by special equipment such as a key gun, so that the message authentication key can be replaced conveniently in time through the quantum key distribution network.
2. The method and the device have the advantages that the secret keys extracted in the processes of vector comparison, error correction and privacy enhancement are stored in the secret key pool, and then message authentication is carried out, so that message authentication is not required to be carried out between every two steps from the link of vector comparison and the like, and therefore the method and the device only carry out message authentication once, the time of measuring and calculating by a secret stealing party is shortened, and the safety of the message authentication secret keys is improved.
3. The security evaluation is further carried out on the obtained post-processing secret key, so that the possibly unsafe part is deducted, and the obtained message authentication secret key meets the requirement of information theory security.
Drawings
In order to more clearly explain the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a diagram illustrating a message authentication process in the prior art;
FIG. 2 is a schematic diagram of a message authentication key generation process and a message authentication process according to the present application;
fig. 3 is a schematic structural diagram of a message authentication key generation apparatus according to the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
A first aspect of the present application provides a message authentication key generation method, which may refer to the schematic diagram shown in fig. 2, and the method includes the following steps:
the method comprises the steps of carrying out post-processing on an original Key to obtain a post-processing Key, wherein the post-processing step comprises the steps of basis vector comparison, error correction, confidentiality enhancement and the like, and specifically comprises the steps of obtaining the original Key through quantum Key distribution, carrying out post-processing on the original Key, namely extracting a Sifted Key from the original Key through basis vector comparison, extracting a Corrected Key from the Sifted Key through an error correction process, and extracting a Final secure Key Final Key from the calibrated Key through a confidentiality enhancement process.
And carrying out security evaluation on the post-processing key, and deducting the key with inconsistent security coefficient in the post-processing key to obtain the secure key. The safety factor of the method is set according to the authentication time and the operation speed of the super computer, the higher the running speed of the super computer is, the smaller the required preset safety factor threshold value is, and the longer the time required by message authentication is, the smaller the required preset safety factor is. For example, the post-processing key is obtained by f (n, ε) according to the key length n and the authentication time ε required for message authentication1,ε2…εn) Calculating the safety factor of the post-processing key, and assuming that the safety factor is set to 10-16When the message is authenticated, the later processing key safety factor is more than 10 within the longer time required by the current message authentication of the super computer-16There is a possibility of being calculated, otherwise there is no possibility of being calculated, and therefore it is necessary to make the post-processing key security factor greater than 10-16The key is deducted, so that the security key is obtained and the security of the information theory is met.
A portion of the security keys is selected as a message authentication key. The amount of the specifically selected message authentication key can be determined according to system requirements or the number of keys obtained by quantum key distribution, and a part of keys are selected from the security keys as the message authentication key in a sequential manner, namely, a part of keys are selected from the security keys in sequence from the first obtained key; or selecting a part of keys from the security keys as message authentication keys according to a reverse mode, namely selecting a part of keys from the last obtained key according to a sequence from back to front; or selecting a part of keys from the security keys as message authentication keys in an intermediate sequence mode, namely selecting one key at intervals in a sequence from front to back or from back to front so as to obtain a final message authentication key; or a part of the key is selected from the security key as the message authentication key in a random manner.
In summary, in the field of quantum communication, message authentication is required to be performed at each step for links such as basis, error correction, secret amplification, and the like, and in order to achieve the purpose of information theory security, an existing message authentication key is usually a fixed key preset for both communication parties, and the preset fixed key is generated by a device other than both communication parties, so that the existing message authentication key needs to be carried to the both communication parties by a special device by a special person to perform key replacement on the device, and thus the message authentication key cannot be replaced in time, and the replacement step is complicated. The authentication key is generated from the obtained safe key, and the authentication key does not need to be replaced by special equipment such as a key gun, so that the message authentication key can be replaced timely and conveniently through a quantum key distribution network.
In addition, the existing message authentication key is usually a fixed key preset by both communication parties, each step of links such as basis vector comparison, error correction, privacy enhancement and the like requires message authentication, and the message authentication of each link requires a certain time, so that a message authentication key can be measured and calculated by a secret stealing party from the basis vector comparison, the probability of measuring and calculating the message authentication key by the secret stealing party is high, and the safety of the message authentication key is low. Therefore, for Alice and Bob in the present application to perform post-processing on the original secret key, respectively, store post-processed data in their respective secret key pools, and perform message authentication, reference may be made to the schematic diagram shown in fig. 2, which includes the following specific steps:
extracting a Sifted Key from an original Key through basis vector comparison, and putting the Sifted Key into a Key pool; extracting a Corrected Key from the Sifted Key through an error correction process, and putting the Corrected Key into a Key pool; extracting a Final Key from the Corrected Key through a security enhancement process, and putting the Final Key into a Key pool; and performing message authentication on the key in the key pool to obtain a post-processing key. Therefore, the key extracted in the processes of vector comparison, error correction and privacy enhancement is stored in the key pool and then the message authentication is carried out, so that the message authentication is not required to be carried out between each step from the link of vector comparison and the like, and the message authentication is carried out only once, so that the time for measuring and calculating by a thief is shortened, and the security of the message authentication key is improved.
A second aspect of the present application provides a message authentication key generation apparatus, where the structure of the apparatus may refer to the schematic diagram shown in fig. 3, and the specific structure includes:
the post-processing module is used for carrying out post-processing on the original key to obtain a post-processing key;
the security evaluation module is used for carrying out security evaluation on the post-processing key and deducting the key with inconsistent security coefficient in the post-processing key to obtain a security key;
and the message authentication key generation module is used for selecting a part of keys in the security keys as the message authentication keys.
Wherein the post-processing module comprises:
the base vector comparison module is used for extracting a Sifted Key from the original Key through base vector comparison and putting the Sifted Key into a Key pool;
the error correction module is used for extracting a Corrected Key from the Sifted Key through an error correction process and putting the Corrected Key into a Key pool;
the security enhancement is used for extracting the Final Key from the Corrected Key through the security enhancement process and putting the Final Key into a Key pool;
and the message authentication module is used for performing message authentication on the key in the key pool to obtain a post-processing key.
Wherein the security assessment module comprises:
the acquisition module is used for acquiring the authentication time epsilon required by the post-processing key according to the key length n and the message authentication;
the evaluation module is used for evaluating the safety coefficient of the post-processing key according to the key length n and the authentication time epsilon;
and the safety key generation module is used for deducting the key with the safety coefficient higher than the safety coefficient threshold value in the post-processing key to obtain the safety key.
Wherein the message authentication key generation module comprises:
the selection module is used for selecting a part of keys from the security keys in a sequence mode to be used as message authentication keys;
or selecting a part of keys from the security keys as message authentication keys according to a reverse order mode;
or selecting a part of keys from the security keys as message authentication keys in an intermediate order;
or a part of the key is selected from the security key as the message authentication key in a random manner.
A third aspect of the present application provides a message authentication system, where when a message authentication key of the message authentication system needs to be replaced, for example, after the system runs for a fixed time, a just-replaced period of the message authentication key is reached; or the message authentication key is compromised; or after a certain number of times of use, etc., a new message authentication key can be obtained according to any one of the above message authentication key generation methods, and used as a key for next message authentication.
The present application has been described in detail with reference to specific embodiments and illustrative examples, but the description is not intended to limit the application. Those skilled in the art will appreciate that various equivalent substitutions, modifications or improvements may be made to the presently disclosed embodiments and implementations thereof without departing from the spirit and scope of the present disclosure, and these fall within the scope of the present disclosure. The protection scope of this application is subject to the appended claims.

Claims (8)

1. A method for generating a message authentication key, the method comprising the steps of:
extracting a Sifted Key from an original Key obtained by quantum Key distribution through basis vector comparison, and putting the Sifted Key into a Key pool;
extracting a Corrected Key from the Sifted Key through an error correction process, and putting the Corrected Key into a Key pool;
extracting a Final Key from the Corrected Key through a security enhancement process, and putting the Final Key into a Key pool;
performing message authentication on the key in the key pool to obtain a post-processing key;
performing security evaluation on the post-processing key, and deducting the key with the security coefficient larger than a preset security coefficient threshold value in the post-processing key to obtain a security key;
a portion of the security keys is selected as a message authentication key.
2. The method of claim 1, wherein the evaluating the security of the post-processing key and subtracting the key with non-compliant security coefficient from the post-processing key to obtain the secure key comprises:
acquiring an authentication time epsilon required by the post-processing key according to the key length n and the message authentication;
evaluating the safety coefficient of the post-processing key according to the key length n and the authentication time epsilon;
and deducting the key with the safety coefficient larger than the preset safety coefficient threshold value in the post-processing key to obtain the safe key.
3. The message authentication key generation method of claim 2, wherein the selecting a part of the security keys as the message authentication key comprises:
selecting a part of keys from the security keys as message authentication keys in a sequential manner;
or selecting a part of keys from the security keys as message authentication keys according to a reverse order mode;
or selecting a part of keys from the security keys as message authentication keys in an intermediate order;
or a part of the key is selected from the security key as the message authentication key in a random manner.
4. The message authentication key generation method according to claim 3, wherein the preset security coefficient threshold is set according to an authentication time and an operation speed of the supercomputer.
5. A message authentication key generation apparatus for performing the message authentication key generation method of any one of claims 1 to 4, the apparatus comprising:
the system comprises a base vector comparison module, a Key pool and a Key management module, wherein the base vector comparison module is used for extracting a Sifted Key from an original Key obtained by quantum Key distribution through base vector comparison and putting the Sifted Key into the Key pool;
the error correction module is used for extracting a Corrected Key from the Sifted Key through an error correction process and putting the Corrected Key into a Key pool;
the secrecy enhancement module is used for extracting the Final Key from the Corrected Key through the secrecy enhancement process and putting the Final Key into the Key pool;
the message authentication module is used for performing message authentication on the keys in the key pool to obtain a post-processing key;
the security evaluation module is used for carrying out security evaluation on the post-processing key and deducting the key with the security coefficient larger than a preset security coefficient threshold value in the post-processing key to obtain a security key;
and the message authentication key generation module is used for selecting a part of keys in the security keys as the message authentication keys.
6. The message authentication key generation apparatus according to claim 5, wherein the security evaluation module includes:
the acquisition module is used for acquiring the authentication time epsilon required by the post-processing key according to the key length n and the message authentication;
the evaluation module is used for evaluating the safety coefficient of the post-processing key according to the key length n and the authentication time epsilon;
and the safety key generation module is used for deducting the key with the safety coefficient larger than the preset safety coefficient threshold value in the post-processing key to obtain the safety key.
7. The message authentication key generation apparatus according to claim 6, wherein the message authentication key generation module includes:
the selection module is used for selecting a part of keys from the security keys in a sequence mode to be used as message authentication keys;
or selecting a part of keys from the security keys as message authentication keys according to a reverse order mode;
or selecting a part of keys from the security keys as message authentication keys in an intermediate order;
or a part of the key is selected from the security key as the message authentication key in a random manner.
8. A message authentication system, characterized in that, when the message authentication key of the message authentication system needs to be replaced, a new message authentication key is obtained by the message authentication key generation method according to any one of claims 1 to 4, and is used as the key for the next message authentication.
CN202110945624.0A 2021-08-18 2021-08-18 Message authentication key generation method and device and message authentication system Active CN113395158B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110945624.0A CN113395158B (en) 2021-08-18 2021-08-18 Message authentication key generation method and device and message authentication system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110945624.0A CN113395158B (en) 2021-08-18 2021-08-18 Message authentication key generation method and device and message authentication system

Publications (2)

Publication Number Publication Date
CN113395158A CN113395158A (en) 2021-09-14
CN113395158B true CN113395158B (en) 2022-01-18

Family

ID=77622762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110945624.0A Active CN113395158B (en) 2021-08-18 2021-08-18 Message authentication key generation method and device and message authentication system

Country Status (1)

Country Link
CN (1) CN113395158B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113990429B (en) * 2021-12-29 2022-03-15 医典云(南京)数据科技有限公司 Electronic medical record data protection method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140054647A (en) * 2012-10-29 2014-05-09 에스케이텔레콤 주식회사 Method for enhancing security of secret key generated in quantum key distribution system
CN109560917A (en) * 2017-09-26 2019-04-02 科大国盾量子技术股份有限公司 A kind of QKD method, equipment and system
CN109936445A (en) * 2017-12-18 2019-06-25 科大国盾量子技术股份有限公司 A kind of key error correction method and quantum key distribution system
CN110247765A (en) * 2019-06-25 2019-09-17 湖北凯乐量子通信光电科技有限公司 A kind of quantum secure data link communications system
CN110351085A (en) * 2019-07-22 2019-10-18 华北电力大学 A kind of method and system for quantum key distribution post-processing
CN112769558A (en) * 2020-12-31 2021-05-07 华南师范大学 Code rate self-adaptive QKD post-processing method and system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5384781B2 (en) * 2005-08-18 2014-01-08 日本電気株式会社 Secret communication system and method for generating shared secret information
CN105991285B (en) * 2015-02-16 2019-06-11 阿里巴巴集团控股有限公司 Identity identifying method, apparatus and system for quantum key distribution process
KR101830339B1 (en) * 2016-05-20 2018-03-29 한국전자통신연구원 Apparatus for quantum key distribution on a quantum network and method using the same

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20140054647A (en) * 2012-10-29 2014-05-09 에스케이텔레콤 주식회사 Method for enhancing security of secret key generated in quantum key distribution system
CN109560917A (en) * 2017-09-26 2019-04-02 科大国盾量子技术股份有限公司 A kind of QKD method, equipment and system
CN109936445A (en) * 2017-12-18 2019-06-25 科大国盾量子技术股份有限公司 A kind of key error correction method and quantum key distribution system
CN110247765A (en) * 2019-06-25 2019-09-17 湖北凯乐量子通信光电科技有限公司 A kind of quantum secure data link communications system
CN110351085A (en) * 2019-07-22 2019-10-18 华北电力大学 A kind of method and system for quantum key distribution post-processing
CN112769558A (en) * 2020-12-31 2021-05-07 华南师范大学 Code rate self-adaptive QKD post-processing method and system

Also Published As

Publication number Publication date
CN113395158A (en) 2021-09-14

Similar Documents

Publication Publication Date Title
Linnartz et al. New shielding functions to enhance privacy and prevent misuse of biometric templates
CN102904726B (en) Classical channel message authentication method and device for quantum key distribution system
US20100217986A1 (en) Authenticated secret sharing
Bao et al. A new chaotic system for image encryption
CN106027245A (en) Key sharing method and device
Massoud et al. A novel and efficient multiparty quantum secret sharing scheme using entangled states
CN113395158B (en) Message authentication key generation method and device and message authentication system
CN108599934A (en) It is a kind of to test safe and secret Enhancement Method for quantum key distribution
CN105553667A (en) Dynamic password generating method
CN113141247A (en) Homomorphic encryption method, device and system and readable storage medium
CN106358184A (en) Point-to-point identity authentication method
CN115473703A (en) Identity-based ciphertext equivalence testing method, device, system and medium for authentication
Sharma et al. A new secure model for quantum key distribution protocol
EP3379408B1 (en) Updatable random functions
CN109617686A (en) A kind of improved Key Exchange Protocol algorithm based on lattice
CN112769567A (en) Block chain HD private key retrieving method
CN113285800B (en) Coherent state-based continuous variable quantum identity authentication method and system
CN109039603A (en) A kind of half quantum key delivering method of fault tolerant based on decoherence free subspace
Yu et al. On the value of order number and power in secret image sharing
Qu et al. More efficient tightly-secure lattice-based IBE with equality test
CN113963468A (en) Unlocking code generation method and device
Qin et al. A proactive quantum secret sharing scheme based on GHZ state
Mone Future-proof encryption
Sobota et al. Application of quantum cryptography protocols in authentication process
CN112217632A (en) Identity authentication method and device based on intelligent contract and Hash chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right

Effective date of registration: 20220729

Granted publication date: 20220118

PP01 Preservation of patent right