CN100365973C - Quanta identity authentication system based on phase modulation - Google Patents

Quanta identity authentication system based on phase modulation Download PDF

Info

Publication number
CN100365973C
CN100365973C CNB2004100675821A CN200410067582A CN100365973C CN 100365973 C CN100365973 C CN 100365973C CN B2004100675821 A CNB2004100675821 A CN B2004100675821A CN 200410067582 A CN200410067582 A CN 200410067582A CN 100365973 C CN100365973 C CN 100365973C
Authority
CN
China
Prior art keywords
user
main controller
phase
phase modulator
light beams
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004100675821A
Other languages
Chinese (zh)
Other versions
CN1604524A (en
Inventor
何广强
曾贵华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jiaotong University
Original Assignee
Shanghai Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jiaotong University filed Critical Shanghai Jiaotong University
Priority to CNB2004100675821A priority Critical patent/CN100365973C/en
Publication of CN1604524A publication Critical patent/CN1604524A/en
Application granted granted Critical
Publication of CN100365973C publication Critical patent/CN100365973C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Optical Communication System (AREA)

Abstract

The present invention relates to a quantum identity authentication system based on phase modulation, which comprises an authenticating center and a user end. After quasi-single photons generated by a laser and an attenuator pass through a 50/50 beam splitting device, light beams transmitted to a user end through a first optical fiber arm pass through a user's identity card and a phase modulator and are transmitted to a beam merging device, after delayed, light beams transmitted by a second optical fiber arm are transmitted to the phase modulator, and finally, the light beams reach the beam merging device. The present invention adopts two detectors to detect single photons. The phase modulator is controlled by main controllers of the user end according to a user password, the two main controllers carry out communication through a classical channel, a synchronous clock generator provides a synchronous clock signal for the main controllers, required random numbers during registration are generated by a random number generator, and user identity information is stored in a user data database. The present invention does not need to utilize a transferring and authenticating key of BB84 protocol, and adopts phase codes to simultaneously carry out the transmission process and the authentication process of the quantum signal. The user information in the user data database is directly validated, and the authentication efficiency is enhanced.

Description

Quantum identity authentication system based on phase modulation
Technical Field
The invention relates to a quantum identity authentication system based on phase modulation, which solves the problem of user identity authentication in the field of information security and is a leading-edge subject combining multiple subjects of cryptography, optical fiber communication, quantum optics, nonlinear optics, network communication and the like.
Background
The quantum cipher is a new cipher system based on classical cryptography and quantum physics, and its safety is ensured by the property of quantum bit. The quantum unclonable theorem and the Heisenberg inaccuracy principle ensure that the quantum cipher has unconditional safety and detectability to eavesdropping, so that the quantum cipher has good performance and prospect.
In 1969, s. In 1984, the first international quantum key distribution protocol, BB84 protocol, was proposed by the scientists c.h. bennett and the cryptologist g.brassard of IBM corporation, usa. Several years later, bennett and Brassard, and their leading group, implemented quantum key distribution in free space for the first time in the laboratory using BB84 protocols using weak laser pulses as quantum signal generators. Since then, quantum cryptography based on quantum optical communication has become one of the issues of global attention, and theoretically, various researchers and scientists have conducted quantum cryptography research from different perspectives, and the contents relate to information theories such as quantum key distribution, quantum key verification, quantum data encryption, quantum secret sharing, quantum identity authentication, quantum signature, quantum bit commitment, quantum oblivious transmission, quantum multi-party computation, and quantum cryptography, and quantum error correction codes have been receiving more and more attention.
Quantum identity authentication, one of the important branches of quantum cryptography, is gaining increasing interest from various researchers. Milolav Dusek reports an identity authentication system based on quantum key distribution and classical authentication (milolav Dusek, ondrej Haderka, martin Hendrych and Robert Myska, phys. Rev. A60, 149 (1999)), in which Alice and Bob exchange quantum keys using BB84 protocol and then use the keys to perform identity authentication in a classical manner. Miloslav Dusek does not fundamentally solve the theoretical and technical problems of quantum identity authentication, and only transmits an authentication password by using the unconditional security of quantum key distribution and the detectability of eavesdropping, and then confirms the legality of the user identity by using a classical authentication scheme. Classic authentication requires three handshakes to finally confirm the validity of the user identity, resulting in low authentication efficiency. The invention discloses a quantum identity authentication system based on polarization modulation, which is provided by Chinese invention patent with the application number of 200410017011.7, adopts polarization coding, and takes optical fiber as a quantum channel to transmit quasi-single photons. The system realizes quantum identity authentication by adopting a full quantum mode for the first time, the safety of the scheme is ensured by utilizing a physical law, but the double refraction effect of the optical fiber influences the polarization state of photons, so that the error rate is increased, the polarization-dependent loss shortens the transmission distance, and the performance of the authentication system is influenced.
Internationally, quantum key distribution technology related to quantum-based identity authentication is mature, and the university of geneva, rices, has developed quantum key distribution products based on phase modulation. Aiming at the defects of the quantum identity authentication system based on polarization coding, the quantum identity authentication system based on phase modulation is designed by utilizing the generation, transmission and detection technology of quantum signals, so that the system is less influenced by external conditions, the performance is stable, and the authentication rate is high. However, no relevant literature reports are found in the work at present.
Disclosure of Invention
The invention aims to provide a novel quantum identity authentication system based on phase modulation aiming at the defects of the prior art, make up the defects of classical parts in a Miloslav Dusek identity authentication scheme, improve the authentication efficiency, overcome the adverse effect on the performance of the authentication system caused by various polarization-related damages in the quantum identity authentication system based on polarization modulation, and improve the system performance.
In order to achieve the purpose, the invention provides a quantum identity authentication system based on phase modulation, which adopts weak laser pulses as quantum signals, adopts a dynamic phase modulator as a quantum signal modulator, adopts a silicon avalanche diode working in a Geiger mode as a single photon detector, dynamically establishes user database data according to user passwords and an identity card, and ensures the safety of the system by using the unclonable theorem of unknown quantum states.
The invention relates to a quantum identity authentication system based on phase modulation, which consists of an authentication center and a user. The authentication center comprises a light path part and a control part, wherein the light path part comprises a semiconductor laser, an attenuator, a 50/50 beam splitter, a delayer, a service end phase modulator, a 50/50 beam combiner and two detectors, and the control part of the authentication center comprises a service end main controller, a user data database and a random number generator. The user terminal also comprises an optical path part and a control part, wherein the optical path part comprises a user identity card and a user terminal phase modulator, and the control part of the user terminal comprises a user terminal main controller and a synchronous clock generator.
The semiconductor laser and the attenuator are used as a quantum signal generator to generate quasi-single photons as an information carrier, the quasi-single photons respectively enter two optical fiber arms of the M-Z optical fiber interferometer after passing through a 50/50 beam splitter, a first group of light beams are transmitted to a user end through a first optical fiber arm, and the phase phi of the light beams is changed after passing through a user identity card 1 And the optical fiber is transmitted to a user side phase modulator, and then is transmitted to a beam combiner of a service side. The second group of beams passing through the secondExtension of fiber arm transmission to authentication centerAnd the timer is transmitted to the service end phase modulator through the optical fiber after time delay, and finally reaches the beam combiner. And adjusting the delayer to enable the optical paths of the first group of light beams and the second group of light beams to be equal, and enabling the two groups of light beams to generate a single photon interference phenomenon at the beam combiner. Two output ports of the beam combiner are respectively connected with two detectors, and the outputs of the two detectors are respectively connected with the main controller of the server side.
Due to the single photon interference phenomenon. The probability of a photon being detected by the first of the two detectors isThe probability of detecting a photon by the second detector is
Figure C20041006758200052
Phi 1 and phi 2 are respectively phase delays introduced by a user terminal user identity card and a user terminal phase modulator, phi 3 is phase delay introduced by a service terminal phase modulator, k is wave number, and delta L is the optical path difference of two arms of an M-Z interferometer, and a delayer at the authentication center end is adjusted to enable delta L =0. When the temperature is higher than the set temperature
Figure C20041006758200053
(n is an integer) in the presence of a catalyst,
Figure C20041006758200054
when phi is 123 When =0, P 1 =1,P 2 =0;
When phi is 123 When = pi, P 1 =0,P 2 =1。
The user end main controller controls the user end phase modulator according to the user password, the service end main controller controls the service end phase modulator according to the user information in the user data database and monitors the two detectors, and the service end main controller and the user end main controller are connected with the synchronous clock generator and communicate through a classical channel. The random number generator is connected with the server side main controller and used for generating random numbers required during registration for the server side main controller, and the user data database stores user identity information for the server side main controller.
The working process of the system comprises a registration phase and an authentication phase. A registration stage: the user makes a registration request to the authentication center, the authentication center prepares an initial single-photon sequence, and the initial single-photon sequence is divided into two groups of light beams by the beam splitter, namely a single-photon pulse 1 transmitted by a first optical fiber arm and a single-photon pulse 2 transmitted by a second optical fiber arm. Modulating the phase delay of the single photon pulse 1 by the user identity card and a phase modulator driven by a password; the service end adjusts the delayer to enable the optical distances of two optical fiber arms of the M-Z interferometer to be equal, then adjusts the single photon pulse 2 transmitted by the second optical fiber arm according to the random number, enables the single photon interference phenomenon appearing at the beam combiner and the random number to meet the one-to-one corresponding relation by adjusting the phase delay of the single photon pulse 2, and dynamically establishes user database information by taking specific operation and the random number as user identity information. And (3) an authentication stage: the method comprises the steps that after an authentication center receives an authentication request of a user, a single photon sequence is prepared, data of the corresponding user are called out from a database, a system user side adjusts the phase delay of a single photon pulse 1 passing through a first optical fiber arm of an M-Z interferometer according to an identity card and a user password, an authentication center server side adjusts the phase delay of a single photon pulse 2 passing through a second optical fiber arm of the M-Z interferometer according to the data in the database, the single photon pulse 1 and the single photon pulse 2 reach a single photon beam combiner after being transmitted through the same optical path, the single photon interference phenomenon occurs, single photon measurement is carried out through two monitoring single photon detectors, and the legality of the identity of the user is verified by comparing whether a measurement result is consistent with a random number in the data of the user.
The quantum identity authentication system based on phase modulation adopts weak laser pulses as quantum signals, and the technology is quite mature, so that the requirement of the system on a single photon source can be better met. A silicon avalanche diode which is commonly used internationally and works in a Geiger mode is used as a single photon detector, and multiple tests at home and abroad prove that the detection method is feasible. The invention adopts a phase modulation mode to encode quantum information, can transmit through the optical fiber, and is insensitive to polarization-dependent damage such as polarization mode dispersion, polarization-dependent loss and the like of the optical fiber compared with a polarization modulation mode, thereby having better performance. The system does not need to use BB84 protocol to transmit authentication keys, simultaneously carries out the transmission process and the authentication process of quantum signals, directly verifies the user information in the user data database, does not need three-way handshake, and improves the authentication efficiency.
Drawings
Fig. 1 is a schematic diagram of a quantum identity authentication system according to the present invention.
Detailed Description
The technical solution of the present invention is further described below with reference to the accompanying drawings.
The quantum identity authentication system based on phase modulation comprises an authentication center and a user, and is shown in figure 1. The authentication center comprises a light path part and a control part, wherein the light path part comprises a semiconductor laser, an attenuator, a 50/50 beam splitter, a delayer, a service end phase modulator, a 50/50 beam combiner, a detector 1 and a detector 2, and the control part of the authentication center comprises a service end main controller, a user data database and a random number generator. The user terminal also comprises an optical path part and a control part, wherein the optical path part comprises a user identity card and a user terminal phase modulator, and the user terminal control part comprises a user terminal main controller and a synchronous clock generator. The user side main controller controls the user side phase modulator according to the user password, the server side main controller controls the server side phase modulator, the server side main controller and the user side main controller are connected with the synchronous clock generator and communicate through a classical channel, the random number generator is connected with the server side main controller and used for generating random numbers required during registration for the server side main controller, and the user data database stores user identity information for the server side main controller.
At the authentication center, the system of the inventionBy attenuating the laser pulse emitted from the semiconductor laser to a large extentThe invention relates to a quasi-single photon source which takes the generated quasi-single photon as an information carrier, namely a laser source, belongs to a coherent light source, the photon number distribution of the quasi-single photon source meets Poisson distribution, when a pulse laser is attenuated to 0.1 photon per pulse on average, the probability that each pulse contains more than 1 photon is only 0.5 percent, and the optical pulse at the moment shows the property of an unclonable equivalent photon. The quasi-single photon pulse enters the fiber arm 1 and the fiber arm 2 of the M-Z fiber interferometer after passing through the 50/50 beam splitter, the light beam 1 is transmitted to the user end through the fiber arm 1, and the phase phi of the light beam is changed after passing through the user identity card 1 The optical fiber is transmitted to a user side phase modulator, and then is transmitted to a beam combiner of a service side. After the light beam 2 is transmitted to the delayer through the optical fiber arm 2, the delayer is adjusted to enable the optical paths of the optical fiber arm 1 and the optical fiber arm 2 to be equal, and the light beam is transmitted to the service end phase modulator through the optical fiber and finally reaches the beam combiner. The light beams 1 and 2 generate single photon interference phenomenon at the beam combiner. The detector 1 and the detector 2 are respectively connected with an output port 1 and an output port 2 of the beam combiner. The detector 1 and the detector 2 are avalanche diodes working in a Geiger mode, and if the phase difference of single photon pulses passing through the optical fiber arm 1 and the optical fiber arm 2 is 0 by the user identity card, the user terminal phase modulator and the server terminal phase modulator, the detector 1 detects photons; if the phase difference is pi, the detector 2 detects a photon. After receiving the registration request of the user, the authentication center generates a random number R = (R) with n bits 1 ,r 2 ,…,r n ) The user inserts an identity card to delay the phase of the single photon pulse passing through the fiber arm 1 to phi 1 Inputting n-bit password, the ith password controls the user end phase controller 1 through the user end main controller 1 to lead the phase delay of the single photon pulse 1 to be phi 2i The authentication center determines the value phi of the phase delay of a single-photon pulse 2 passing through the fiber arm 2 according to whether the ith bit of the random number is 0 or 1 3i
When r is i When =0, # 12i3i =0
When r is i Phi, =1 hour 12i3i =π
After the registration is finished, the authentication center establishes user data with the user name as the file name in the database, and the file content is
R=(r 1 ,r 2 ,…,r n ) And phi 3 =(Φ 31 ,Φ 32 ,…,Φ 3n )
In the authentication stage, the user inserts the identity card, inputs the password, and the authentication center user calls out the corresponding user file from the user data database by using phi 3 =(Φ 31 ,Φ 32 ,…,Φ 3n ) Drive server end phase modulator, monitoring detector 1 and detector 2, according to the rule: the detector 1 detects that the photon corresponds to 0; the detector 2 detects that the photon corresponds to 1, compares the collected bit string with the random number during registration, if the collected bit string is consistent with the random number during registration, the authentication is successful, and if the collected bit string is not consistent with the random number during registration, the authentication is failed.

Claims (1)

1. A quantum identity authentication system based on phase modulation comprises an authentication center and a user, and is characterized in that a light path part of the authentication center consists of a semiconductor laser, an attenuator, a 50/50 beam splitter, a delayer, a service end phase modulator, a 50/50 beam combiner and two detectors, and a control part of the authentication center consists of a service end main controller, a user data database and a random number generator; the optical path part of the user side comprises a user identity card and a user side phase modulator, and the control part of the user side comprises a user side main controller and a synchronous clock generator; the semiconductor laser and the attenuator are used as quantum signal generators, generated quasi-single photons used as information carriers respectively enter two optical fiber arms of the M-Z optical fiber interferometer after passing through a 50/50 beam splitter, a first group of light beams are transmitted to a user end through a first optical fiber arm, the phases of the light beams are changed after passing through a user identity card, the light beams are transmitted to a user end phase modulator through optical fibers and then transmitted to a beam combiner of a service end through the optical fibers, a second group of light beams are transmitted to a time delay unit of an authentication center through a second optical fiber arm, and are transmitted to the service end phase modulator through the optical fibers after time delay, and finally the light beams reach the beam combiner; the optical paths of the first group of light beams and the second group of light beams adjusted by the delayer are equal, and the two groups of light beams generate a single photon interference phenomenon at the beam combiner; two output ports of the beam combiner are respectively connected with two detectors, and the outputs of the two detectors are respectively connected with the server main controller; the user side main controller controls the user side phase modulator according to a user password, the service side main controller controls the service side phase modulator, the service side main controller and the user side main controller are connected with the synchronous clock generator and communicate through a classical channel, the random number generator is connected with the service side main controller and generates random numbers required during registration for the service side main controller, and the user data database stores user identity information for the service side main controller; after the authentication center receives the registration request of the user, the main controller of the service end determines the phase delay value of the single photon pulse passing through the second optical fiber arm according to the phase delay value of the phase modulator of the user end determined by the password input by the user and the random number generated by the random number generator, and stores the phase delay value and the random number in the user data database; in the authentication stage, the user card changes the phase of the light beam, the user inputs a password, the user-side phase modulator changes the phase of the light beam, the server-side main controller drives the server-side phase modulator according to a phase delay value stored in a user data database, the phase difference of pulses of two optical fiber arms determines the condition that the detector detects the photon, a bit string is collected according to the condition of the photon detected by the detector and is compared with a random number stored in the user data database, and therefore identity authentication is achieved.
CNB2004100675821A 2004-10-28 2004-10-28 Quanta identity authentication system based on phase modulation Expired - Fee Related CN100365973C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100675821A CN100365973C (en) 2004-10-28 2004-10-28 Quanta identity authentication system based on phase modulation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100675821A CN100365973C (en) 2004-10-28 2004-10-28 Quanta identity authentication system based on phase modulation

Publications (2)

Publication Number Publication Date
CN1604524A CN1604524A (en) 2005-04-06
CN100365973C true CN100365973C (en) 2008-01-30

Family

ID=34666663

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100675821A Expired - Fee Related CN100365973C (en) 2004-10-28 2004-10-28 Quanta identity authentication system based on phase modulation

Country Status (1)

Country Link
CN (1) CN100365973C (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259601A (en) * 2013-04-23 2013-08-21 安徽问天量子科技股份有限公司 Optical signal phase modulation device for quantum secret key communication
CN106789031B (en) * 2017-01-16 2023-03-10 中国工程物理研究院电子工程研究所 Quantum authentication system integrated on single circuit board
CN108494494B (en) * 2018-03-28 2020-06-26 忻州师范学院 Method for locking single photon phase in real time

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5307410A (en) * 1993-05-25 1994-04-26 International Business Machines Corporation Interferometric quantum cryptographic key distribution system
CN1477808A (en) * 2003-06-30 2004-02-25 华南师范大学 Quantum coder and decoder of phase modulated polarizing state and its application method
US20040109564A1 (en) * 2002-07-05 2004-06-10 Nicolas Cerf High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5307410A (en) * 1993-05-25 1994-04-26 International Business Machines Corporation Interferometric quantum cryptographic key distribution system
US20040109564A1 (en) * 2002-07-05 2004-06-10 Nicolas Cerf High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses
CN1477808A (en) * 2003-06-30 2004-02-25 华南师范大学 Quantum coder and decoder of phase modulated polarizing state and its application method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
不依赖于第三方的量子身份认证方案. 曾贵华.电子学报,第Vol.32卷第No.7期. 2004 *

Also Published As

Publication number Publication date
CN1604524A (en) 2005-04-06

Similar Documents

Publication Publication Date Title
Vagniluca et al. Efficient time-bin encoding for practical high-dimensional quantum key distribution
US11070370B2 (en) Phase and polarization multi-degree-of-freedom modulated QKD network system and method
EP3243294B1 (en) Communication with everlasting security from short-term-secure encrypted quantum communication
Grünenfelder et al. Simple and high-speed polarization-based QKD
US7181011B2 (en) Key bank systems and methods for QKD
Grice et al. Quantum secret sharing using weak coherent states
Yin et al. Reference-free-independent quantum key distribution immune to detector side channel attacks
US8842839B2 (en) Device with multiple one-time pads and method of managing such a device
US8433070B2 (en) Systems and methods for stabilization of interferometers for quantum key distribution
Hughes et al. Network-centric quantum communications with application to critical infrastructure protection
CN106506154B (en) QKD system and method based on COW protocol
US20070071244A1 (en) QKD station with efficient decoy state capability
Xu et al. Quantum cryptography with realistic devices
CN106856429A (en) A kind of quantum key dispatching system and method based on receiving terminal polarization beam splitting
Zhang et al. Experimental fault-tolerant quantum cryptography in a decoherence-free subspace
GB2430848A (en) Device with multiple One-Time Pads having different security tings
Zhou et al. “Plug and play” quantum key distribution system with differential phase shift
CN100365973C (en) Quanta identity authentication system based on phase modulation
CN209218114U (en) A kind of hybrid anti-quantum calculation communication system of long range
CN1312878C (en) Quantum status authentication system based on polarization modulation
CN206517428U (en) A kind of quantum key dispatching system
Xu et al. Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system
Yang et al. Multiparty blind quantum computation protocol with deterministic mutual identity authentication
Dong et al. Controlled quantum key distribution with three-photon polarization-entangled states via the collective noise channel
Mantey et al. Demonstration of a Polarization-encoding Quantum Key Distribution System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20080130

Termination date: 20101028