CN105049197B - Challenge model library method for building up in quantum cryptographic protocols - Google Patents

Challenge model library method for building up in quantum cryptographic protocols Download PDF

Info

Publication number
CN105049197B
CN105049197B CN201510470021.4A CN201510470021A CN105049197B CN 105049197 B CN105049197 B CN 105049197B CN 201510470021 A CN201510470021 A CN 201510470021A CN 105049197 B CN105049197 B CN 105049197B
Authority
CN
China
Prior art keywords
listener
photon
state
model
sender
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510470021.4A
Other languages
Chinese (zh)
Other versions
CN105049197A (en
Inventor
杨帆
郝玉洁
常佳玉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201510470021.4A priority Critical patent/CN105049197B/en
Publication of CN105049197A publication Critical patent/CN105049197A/en
Application granted granted Critical
Publication of CN105049197B publication Critical patent/CN105049197B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses the challenge model library method for building up in a kind of quantum cryptographic protocols, it includes intercepting and capturing replay attack model, random replacement challenge model, the General Aggression Model, Trojan horse attack model and invisible photon challenge model, the intercepting and capturing replay attack model:Sender is by sequence AiIt is transferred in channel, its whole is intercepted and captured and randomly chooses measurement base by listener-in, each photon is measured and records result Ei;When all photons are all measured, listener-in obtains a new sequence Ei ', and sends recipient to, and recipient obtains result Bi.The model library that this method is established, which includes, intercepts and captures replay attack model, random replacement challenge model, the General Aggression Model, Trojan horse attack model and invisible photon challenge model, the process of five kinds of attack patterns of accurate description, suitable for a kind of communication protocol with similar quality, eavesdropping can be effectively detected, ensures communication security.

Description

Challenge model library method for building up in quantum cryptographic protocols
Technical field
The present invention relates to the challenge model library method for building up in a kind of quantum cryptographic protocols.
Background technology
The development of network is increasingly sophisticated, ensures the safety of information network and has become the core content of national information strategy, Under specific network environment, the threat stolen secret information by any special measures is increasingly severe, and private information is in dissemination channel process In, if channel is dangerous, listener-in can steal information from channel, threaten to information security.That eavesdrops is most main Syllabus is to obtain the secret information transmitted between legal user, and it is exactly its safety that quantum cryptographic protocols are most important Property, the mode of attack quantum communication process has very much.A kind of method of model inspection is now proposed to come in quantum cryptographic protocols Eavesdropping modeled.When the security property of an agreement needs verification, directly carried out using the model having had built up Detection.
Invention content
It is an object of the invention to overcome the deficiencies of the prior art and provide the challenge model libraries in a kind of quantum cryptographic protocols Method for building up, the model library that this method is established, which includes, to be intercepted and captured replay attack model, random replacement challenge model, generally attacks mould Type, Trojan horse attack model and invisible photon challenge model, the process of five kinds of attack patterns of accurate description, suitable for one Class has the communication protocol of similar quality, can effectively detect eavesdropping, ensures communication security.
The purpose of the present invention is achieved through the following technical solutions:Challenge model library in quantum cryptographic protocols is established Method, it includes intercepting and capturing replay attack model, random replacement challenge model, the General Aggression Model, Trojan horse attack model With invisible photon challenge model;
The intercepting and capturing replay attack model is:Sender is by sequence AiIt is transferred in channel, listener-in all cuts it It obtains and randomly chooses measurement base, each photon is measured and record result Ei;When all photons are all measured, surreptitiously Hearer obtains a new sequence Ei ', and sends recipient to, and recipient obtains result Bi
The random replacement challenge model is:Sender is by sequence AiIt is transferred in channel, listener-in all cuts it It obtains and randomly chooses measurement base, each photon is measured and record result Ei, then generation one is new at random by listener-in Sequence Ei ' ', and recipient is transferred to, recipient obtains result Bi
The General Aggression Model is:For each photon that sender sends out, listener-in is cut with probability P ROB selections Obtain replay attack or with probability 1-PROB selection random replacement attacks;
The Trojan horse attack model is:Listener-in intercepts and captures the signal transmitted between the sender and the recipient, Then the photon of a forgery is inserted into the signal that listener-in is transmitted between the sender and the recipient, then listener-in cuts again The signal in channel is obtained, obtains the forgery photon after being operated by recipient, obtains whole letters that recipient measures and operates Breath;
The invisible photon challenge model is:Listener-in is firstly generated to the detector of sender and recipients not Sensitive photon, is then sent to sender by photon, after sender operates and sends, listener-in from channel acquisition this Invisible photon, the operation then eavesdropped obtain all information of sender's operation.
The eavesdropping state branch mode of the intercepting and capturing replay attack model includes:Listener-in selects measurement base, shape first State becomes ' 11 ' from ' 10 ', and then listener-in measures the photon intercepted and captured, state transition to ' 12 ' at this time, when listener-in is measured When as a result, state becomes ' 13 ', and when listener-in is by data transmission letter in reply road, state returns to ' 10 '.
The eavesdropping state branch mode of the random replacement challenge model includes:Listener-in selects measurement base, shape first State becomes ' 21 ' from ' 20 ', and then listener-in measures the photon intercepted and captured, state transition to ' 22 ', when listener-in obtains measurement result When, state becomes ' 23 ', and listener-in generates a new sequence, state transition to ' 24 ', when listener-in returns data transmission at random In channel, state returns to ' 20 '.
The eavesdropping state branch mode of the General Aggression Model includes:Original state is ' 30 ', and listener-in selects to survey After measuring base, state transition to ' 31 ', the photon that then listener-in's measurement is intercepted and captured, state transition to ' 32 ', when listener-in is surveyed When measuring result, state becomes ' 33 ', and then listener-in selects attack pattern, and state becomes ' 34 ', when listener-in is by data transmission Into channel, state returns to ' 30 '.
The eavesdropping state branch mode of the Trojan horse attack model includes:Original state is ' 40 ', is being eavesdropped After person generates forgery photon, state transition to ' 41 ', when these photons are sent to recipient by listener-in, state becomes ' 42 ', after listener-in obtains the forgery photon after recipient operates, state becomes ' 43 ' from ' 42 ', finally eavesdrops Person obtains information, and module status returns to ' 40 '.
The invisible photon challenge model eavesdropping state branch mode includes:Original state is ' 50 ', listener-in's life Into forge photon after, state transition to ' 51 ', then listener-in by forgery photon be sent to sender, state becomes ' 52 ', when Listener-in is obtained after the forgery photon that sender operates, and state becomes ' 53 ', finally, after listener-in obtains information, shape State returns to ' 50 '.
The challenge model library is modeled using probabilistic model checking tool PRISM.
The beneficial effects of the invention are as follows:The present invention provides the challenge model library foundation sides in a kind of quantum cryptographic protocols Method, the model library that this method is established, which contains, intercepts and captures replay attack model, random replacement challenge model, the General Aggression Model, spy Her Trojan attack model of Lip river and invisible photon challenge model, the accurate description process of five kinds of attack patterns, suitable for one kind Communication protocol with similar quality can effectively detect eavesdropping, ensure communication security.
Description of the drawings
Fig. 1 is intercepts and captures replay attack state transition graph;
Fig. 2 attacks state transition graph for random replacement;
Fig. 3 is general attack state transition graph;
Fig. 4 is Trojan horse attack state transition graph;
Fig. 5 attacks state transition graph for invisible photon;
Fig. 6 is sender's state transition graph in BB84 agreements;
Fig. 7 is recipient's state transition graph in BB84 agreements;
Fig. 8 is communication channel state transition diagram in BB84 agreements;
Fig. 9 is listener-in's state transition graph in BB84 agreements;
Figure 10 is sender's state transition graph in " Ping-Pong " agreement;
Figure 11 is recipient's state transition graph in " Ping-Pong " agreement;
Figure 12 is communication channel state transition diagram in " Ping-Pong " agreement;
Figure 13 is listener-in's state transition graph in " Ping-Pong " agreement;
Figure 14 is that replay attack, random replacement attack and general attack verification the verifying results figure are intercepted and captured under BB84 agreements;
Figure 15 is that Trojan horse attack and invisible photon attack verification the verifying results figure under " Ping-Pong " agreement.
Specific embodiment
Technical scheme of the present invention is described in further detail below in conjunction with the accompanying drawings, but protection scope of the present invention is not limited to It is as described below.
As shown in Figure 1, the challenge model library method for building up in quantum cryptographic protocols, it include intercepting and capturing replay attack model, Random replacement challenge model, the General Aggression Model, Trojan horse attack model and invisible photon challenge model;
The intercepting and capturing replay attack model is:Sender is by sequence AiIt is transferred in channel, listener-in all cuts it It obtains and randomly chooses measurement base, each photon is measured and record result Ei;When all photons are all measured, surreptitiously Hearer obtains a new sequence Ei ', and sends recipient to, and recipient obtains result Bi.As shown in Figure 1, listener-in selects first Measurement base is selected, state becomes ' 11 ' from ' 10 ', and then listener-in measures the photon intercepted and captured, state transition to ' 12 ' at this time, when surreptitiously When hearer obtains measurement result, state becomes ' 13 ', and when listener-in is by data transmission letter in reply road, state returns to ' 10 '.
The random replacement challenge model is:Sender is by sequence AiIt is transferred in channel, listener-in all cuts it It obtains and randomly chooses measurement base, each photon is measured and record result Ei, then generation one is new at random by listener-in Sequence Ei ' ', and recipient is transferred to, recipient obtains result Bi.As shown in Fig. 2, listener-in selects measurement base first, State becomes ' 21 ' from ' 20 ', and then listener-in measures the photon intercepted and captured, state transition to ' 22 ', when listener-in obtains measuring knot During fruit, state becomes ' 23 ', and listener-in generates a new sequence, state transition to ' 24 ', when listener-in is data transmission at random In letter in reply road, state returns to ' 20 '.
The General Aggression Model is:For each photon that sender sends out, listener-in is cut with probability P ROB selections Obtain replay attack or with probability 1-PROB selection random replacement attacks.As shown in figure 3, original state is ' 30 ', listener-in's choosing After selecting measurement base, state transition to ' 31 ', the photon that then listener-in's measurement is intercepted and captured, state transition to ' 32 ', when listener-in obtains During to measurement result, state becomes ' 33 ', and then listener-in selects attack pattern, and state becomes ' 34 ', when listener-in is by data It is transferred in channel, state returns to ' 30 '.
The Trojan horse attack model is:Listener-in intercepts and captures the signal transmitted between the sender and the recipient, Then the photon of a forgery is inserted into the signal that listener-in is transmitted between the sender and the recipient, then listener-in cuts again The signal in channel is obtained, obtains the forgery photon after being operated by recipient, obtains whole letters that recipient measures and operates Breath.As shown in figure 4, original state is ' 40 ', after listener-in generates and forges photon, listener-in is worked as in state transition to ' 41 ' These photons are sent to recipient, state becomes ' 42 ', the forgery photon after listener-in obtains operating by recipient Afterwards, state becomes ' 43 ' from ' 42 ', and last listener-in obtains information, and module status returns to ' 40 '.
The invisible photon challenge model is:Listener-in is firstly generated to the detector of sender and recipients not Sensitive photon, is then sent to sender by photon, after sender operates and sends, listener-in from channel acquisition this Invisible photon, the operation then eavesdropped obtain all information of sender's operation.As shown in figure 5, original state is ' 50 ', listener-in generate forge photon after, state transition to ' 51 ', then listener-in by forgery photon be sent to sender, shape State becomes ' 52 ', and when listener-in is obtained after the forgery photon that sender operates, state becomes ' 53 ', finally, works as listener-in After obtaining information, state returns to ' 50 '.
The challenge model library is modeled using probabilistic model checking tool PRISM.
Challenge model library established above can be verified by communication protocol, here using BB84 agreements and " ping- The data transmission procedures of pong " agreements is verified.
BB84 agreements include communication channel module, sender's module, recipient's module and listener-in's module.Each module is again It is divided into several states.
The state transfer of sender's module of BB84 agreements as shown in fig. 6, after sender has selected measurement base and data, State becomes ' 101 ' from original state ' 100 ', and then sender generates photon, and state becomes ' 102 ', and then sender is by light Son is transferred in channel, and state becomes ' 103 ', and after sender announces measurement base and data, state becomes ' 104 ', judges to pass Whether defeated process terminates, if do not terminated, returns to ' 100 ';Otherwise become ' 105 ' end.
As shown in fig. 7, original state is ' 110 ', recipient selects to survey for the state transfer of recipient's module of BB84 agreements Amount base simultaneously measures photon, and module status becomes ' 111 ' and ' 112 ', after recipient obtains measurement result, and state becomes ' 113 ', connects Recipient announced to sender as a result, if sender and recipients' measurement base is different or measurement base and data it is all identical, State becomes ' 114 ', if measurement base is identical but data differ, detects listener-in, and state becomes ' 116 ', judges to pass It is defeated whether to terminate, if do not terminated, return to ' 110 ';If terminated, become ' 115 ', that is, without eavesdropping.
The state transfer of the communication channel module of BB84 agreements is as shown in figure 8, the original state of channel for ' 120 ', is sent Photon is sent in channel by person, and state becomes ' 121 ', and when listener-in measures photon, state becomes ' 122 ', works as listener-in It passes it to ' 123 ' in channel, after recipient obtains photon, state returns to ' 120 '.
Listener-in's module of BB84 agreements state transfer as shown in figure 9, listener-in select measurement base after, module status Become ' 131 ' from ' 130 ', then listener-in measures photon, and state becomes ' 132 ', and listener-in obtains measurement result, and state becomes ' 133 ', finally, listener-in transfers back to data in channel, and state returns to ' 130 '.
" Ping-Pong " agreement also includes communication channel module, sender's module, recipient's module and listener-in's module.
The state transfer of sender's module of " Ping-Pong " agreement is as shown in Figure 10, and original state is ' 200 ', works as hair The person of sending obtains the photon that recipient sends, and state becomes ' 201 ', and then sender decides whether to operate photon, state ' 202 ' are moved to, then judges whether to eavesdrop, if without eavesdropping, after photon is passed to channel by sender, is returned to ‘200’;If there is eavesdropping, then state becomes ' 203 ', that is, detects listener-in.
The state transfer of the recipient of " Ping-Pong " agreement is as shown in figure 11, and recipient generates photon, state by ' 210 ' become ' 211 ', and become ' 212 ' after recipient is sent it in channel, and then recipient obtains sender's transmission The photon come, state become ' 213 ', judge whether transmission terminates, and do not terminate such as, then return to ' 210 ';Such as terminate, then move to ‘214’。
The state transfer of the communication channel of " Ping-Pong " agreement is as shown in figure 12, and channel original state is ' 220 ', is connect Receipts person is after in photon transmission to channel, and state becomes ' 221 ', and then listener-in is forged in photon transmission to channel, State becomes ' 222 ', and after sender obtains photon, state becomes ' 223 ', and sender transfers back to photon in channel, state ' 224 ' are moved to, after listener-in obtains his forgery photon, state becomes ' 225 ', finally, when recipient obtains his light After son, state returns to ' 220 '.
The state transfer of listener-in's module of " Ping-Pong " agreement is as shown in figure 13, and photon is forged when listener-in generates Afterwards, state becomes ' 231 ' from ' 230 ', will be forged after photon passed in channel in listener-in, state becomes ' 232 ', works as listener-in After obtaining its forgery photon, state transition to ' 233 ', last listener-in obtains information, and state returns to ' 230 '.
Replay attack, random replacement attack and general attack, verification the verifying results such as Figure 14 institutes are intercepted and captured in verification under BB84 agreements Show, when transmitting 50 photons, detect that the probability of eavesdropping is just substantially equal to 1.In these three attack patterns, to listener-in For, intercepting and capturing-replay attack is best attack pattern.
Carry verification Trojan horse attack and the attack of invisible photon, verification the verifying results such as Figure 15 under " Ping-Pong " agreement Shown, Trojan horse attack and the attack of invisible photon are much like, when transmitting 50 photons, detect the probability of eavesdropping just It is substantially equal to 1.When transmission number of photons continues to increase, probability will continue to rise.
It can be obtained from result above, the challenge model library accurate description of the invention process of this five kinds of attack patterns.Such as There is eavesdropping in fruit, with the increase of transmission number of photons, detect eavesdropping probability can curve level off to 1.

Claims (2)

1. the challenge model library method for building up in quantum cryptographic protocols, it is characterised in that:It include intercepting and capturing replay attack model, with Machine substitution attack model, the General Aggression Model, Trojan horse attack model and invisible photon challenge model;
The intercepting and capturing replay attack model is:Sender is by sequence AiBe transferred in channel, listener-in by its all intercept and capture and with Machine selects measurement base, each photon is measured and records result Ei;When all photons are all measured, listener-in obtains To a new sequence Ei ', and send recipient to, recipient obtains result Bi
The random replacement challenge model is:Sender is by sequence AiBe transferred in channel, listener-in by its all intercept and capture and with Machine selects measurement base, each photon is measured and records result Ei, then listener-in is random generates a new sequence Ei ' ', and recipient is transferred to, recipient obtains result Bi
The General Aggression Model is:For each photon that sender sends out, listener-in selects to intercept and capture weight with probability P ROB Pass attack or with probability 1-PROB selection random replacement attacks;
The Trojan horse attack model is:Listener-in intercepts and captures the signal transmitted between the sender and the recipient, then The photon of a forgery is inserted into the signal that listener-in is transmitted between the sender and the recipient, then listener-in intercepts and captures letter again Signal in road obtains the forgery photon after being operated by recipient, obtains all information that recipient measures and operates;
The invisible photon challenge model is:Listener-in firstly generates insensitive to the detector of sender and recipients Photon, photon is then sent to sender, after sender operates and sends, this can not from channel acquisition by listener-in See photon, the operation then eavesdropped obtains all information of sender's operation;
The eavesdropping state branch mode of the intercepting and capturing replay attack model includes:First listener-in select measurement base, state by ' 10 ' become ' 11 ', and then listener-in measures the photon intercepted and captured, state transition to ' 12 ' at this time, when listener-in obtains measurement result When, state becomes ' 13 ', and when listener-in is by data transmission letter in reply road, state returns to ' 10 ';
The eavesdropping state branch mode of the random replacement challenge model includes:First listener-in select measurement base, state by ' 20 ' become ' 21 ', the photon that then listener-in's measurement is intercepted and captured, state transition to ' 22 ', when listener-in obtains measurement result, State becomes ' 23 ', and listener-in generates a new sequence, state transition to ' 24 ', when listener-in writes in reply data transmission at random In, state returns to ' 20 ';
The eavesdropping state branch mode of the General Aggression Model includes:Original state is ' 30 ', and listener-in selects measurement base Afterwards, state transition measures the photon intercepted and captured, state transition to ' 32 ', when listener-in obtains measuring knot to ' 31 ', then listener-in During fruit, state becomes ' 33 ', and then listener-in selects attack pattern, and state becomes ' 34 ', when listener-in transfers data to letter In road, state returns to ' 30 ';
The eavesdropping state branch mode of the Trojan horse attack model includes:Original state is ' 40 ', is given birth in listener-in Into after forging photon, state transition to ' 41 ', when these photons are sent to recipient by listener-in, state becomes ' 42 ', After listener-in obtains the forgery photon after recipient operates, state becomes ' 43 ' from ' 42 ', and last listener-in obtains letter Breath, module status return to ' 40 ';
The invisible photon challenge model eavesdropping state branch mode includes:Original state is ' 50 ', and listener-in generates pseudo- After making photon, state transition to ' 51 ', then listener-in by forge photon be sent to sender, state becomes ' 52 ', works as eavesdropping Person is obtained after the forgery photon that sender operates, and state becomes ' 53 ', and finally, after listener-in obtains information, state is returned To ' 50 '.
2. the challenge model library method for building up in quantum cryptographic protocols according to claim 1, it is characterised in that:The attack Model library is modeled using probabilistic model checking tool PRISM.
CN201510470021.4A 2015-08-04 2015-08-04 Challenge model library method for building up in quantum cryptographic protocols Expired - Fee Related CN105049197B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510470021.4A CN105049197B (en) 2015-08-04 2015-08-04 Challenge model library method for building up in quantum cryptographic protocols

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510470021.4A CN105049197B (en) 2015-08-04 2015-08-04 Challenge model library method for building up in quantum cryptographic protocols

Publications (2)

Publication Number Publication Date
CN105049197A CN105049197A (en) 2015-11-11
CN105049197B true CN105049197B (en) 2018-06-29

Family

ID=54455420

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510470021.4A Expired - Fee Related CN105049197B (en) 2015-08-04 2015-08-04 Challenge model library method for building up in quantum cryptographic protocols

Country Status (1)

Country Link
CN (1) CN105049197B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109525327B (en) * 2018-12-11 2021-07-06 国网江苏省电力有限公司南京供电分公司 Free space quantum secure direct communication method with preset threshold selected in real time

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904726A (en) * 2012-11-08 2013-01-30 中国科学院信息工程研究所 Classical channel message authentication method and device for quantum key distribution system
CN104303449A (en) * 2010-10-08 2015-01-21 Id量子技术股份有限公司 Apparatus and method for the detection of attacks taking control of the single photon detectors of a quantum cryptography apparatus by randomly changing their efficiency

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104303449A (en) * 2010-10-08 2015-01-21 Id量子技术股份有限公司 Apparatus and method for the detection of attacks taking control of the single photon detectors of a quantum cryptography apparatus by randomly changing their efficiency
CN102904726A (en) * 2012-11-08 2013-01-30 中国科学院信息工程研究所 Classical channel message authentication method and device for quantum key distribution system

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
"BB84量子密钥分配及其后处理的仿真分析";陈莹;《中国优秀硕士学位论文全文数据库信息科技辑》;20111215(第S2期);第I136-412页 *
"量子安全通信理论及方案研究";黄大足;《中国博士学位论文全文数据库基础科学辑》;20120215;第A005-1页 *
"量子安全通信理论研究";张盛;《中国博士学位论文全文数据库信息科技辑》;20141015;第I136-38页 *
"量子密码协议安全性分析";温巧燕等;《密码学报》;20140415;第1卷(第2期);第200-210页正文第2节 *
"量子通信协议与安全策略研究";刘丹;《中国博士学位论文全文数据库信息科技辑》;20111201;第I136-72页正文第3.2节 *

Also Published As

Publication number Publication date
CN105049197A (en) 2015-11-11

Similar Documents

Publication Publication Date Title
CN103888476B (en) Quantum secure direct communication method based on three-particle GHZ entangled state
CN105553648B (en) Quantum key distribution, privacy amplification and data transmission method, apparatus and system
CN108092771B (en) Tamper-proof controlled quantum secure direct communication method and system
TW201631509A (en) Method, apparatus, and system for identity authentication
US10944765B2 (en) Security system for machine to machine cyber attack detection and prevention
KR102063031B1 (en) Apparatus and method for quantum direct communication using single qubits
CN107359985B (en) Controlled quantum secure direct communication method based on Huffman compression coding
CN110929294B (en) One-way transmission quantum database privacy query method
CN104852914B (en) A kind of watermark hopping communication means based on packet interval
CN101729256A (en) Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN107493168B (en) Quanta identity authentication method and its application method during quantum key distribution
CN104967610A (en) Watermark hopping communication method based on time slot
CN107404718A (en) A kind of wireless sensor network malicious node detection method
CN113259135A (en) Lightweight blockchain communication authentication device and method for detecting data tamper
CN105049197B (en) Challenge model library method for building up in quantum cryptographic protocols
CN108667529A (en) A kind of safety evaluation method and device of quantum secret communication system
CN103973433B (en) A kind of netkey distribution method based on calculating relevance imaging and system
CN104753935A (en) Verification method of multiparticle quantum private comparison protocol
CN111404691B (en) Quantum secret sharing method with credible authentication based on quantum walking
CN102004874B (en) Digital resource monitoring and early warning method based on synthetic characteristics
CN104010311A (en) Wireless sensor network intrusion detection method based on PAM clustering algorithm
EP3254223B1 (en) Security system for machine to machine cyber attack detection and prevention
Saxena et al. Automated device pairing for asymmetric pairing scenarios
CN110365477A (en) Can collusion resistant quantum key agreement method, terminal and storage device
CN102611561B (en) A kind of peer-to-peer network charging or the method and system of statistical information checking

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180629

Termination date: 20190804