CN105119941B - The operating method of system is affixed one's seal and verified to quantum seal - Google Patents
The operating method of system is affixed one's seal and verified to quantum seal Download PDFInfo
- Publication number
- CN105119941B CN105119941B CN201510586962.4A CN201510586962A CN105119941B CN 105119941 B CN105119941 B CN 105119941B CN 201510586962 A CN201510586962 A CN 201510586962A CN 105119941 B CN105119941 B CN 105119941B
- Authority
- CN
- China
- Prior art keywords
- seal
- client
- quantum
- server
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
It includes seal client, seal client quantum gateway, server quantum gateway, CA servers and seal server that system is affixed one's seal and verified to quantum seal of the present invention;The seal client is connected by classical channel with the quantum gateway of seal client, and the seal server, CA servers are connected by classical channel with the quantum gateway of seal server-side respectively;The quantum gateway of the seal client is connected with the quantum gateway of the seal server by classical channel and quantum channel.It is difficult to crack, seal validity is greatly improved and the operating method of system is affixed one's seal and verified to authoritative quantum seal the present invention provides a kind of.
Description
Technical field
The invention belongs to quantum communications fields, and in particular to the operating method of system is affixed one's seal and verified to a kind of quantum seal.
Background technology
Seal is with a long history in China, is printed on file and indicates identification or signature, is very important one of traditional culture
Point, there are many material and usage scenarios.Most classical usage scenario is that the special lithographic printing of government department dips in ink paste rear cover in paper
Zhang Shanghou is sent out, and is become with authoritative official document.
For traditional seal, with government and each public institution handle official business with no paper propulsion and itself existing for
Insecurity will be stepped down from the stage of history gradually with the way that traditional seal is authority's symbol.The thing followed is electronic print
Chapter using and issuing.First, E-seal is presented as the picture of one or several similar traditional seals on electronic document, comes
Retain use habit of the users to traditional seal.Secondly, E-seal is not only a pictures, and is to be based on picture
Cryptographic applications:Each seal picture is bundled with a digital certificate, to prove the validity of seal, authority and can not
The property denied, to prove validity, authority and the non repudiation of seal place document.《Law of electronic signature》Issuing and implementation
After, the regular E-seal used and traditional seal legal effect having the same.
However, the safety of traditional cryptography application is all to ensure safety with existing computing capability this insufficient premise
, since the time cracked is often very long, criminal is allowed to abandon cracking.With the development of quantum computer, conventional cipher
Application is learned, including E-seal, the increasing risk being cracked is all suffered from, is just walking at the edge of collapse.Because
Quantum calculation can crack classical password in a short time, and then realize the copy of authoritative information and arbitrary use, lead to authority's
Authenticity is greatly reduced.It is obvious that this greatest problem that be E-seal face and fatal problem.
Invention content
For the problem of existing E-seal technical validity and authoritative increasingly deficiency, the present invention provides a kind of theories
On can not crack, seal validity be greatly improved and the operating method of system is affixed one's seal and verified to authoritative quantum seal.
The operating method of system is affixed one's seal and verified to a kind of quantum seal, and it includes seal that system is affixed one's seal and verified to quantum seal
Client, seal client quantum gateway, server quantum gateway, CA servers and seal server;The seal client
End is connected by classical channel with the quantum gateway of seal client-side, and the seal server, CA servers pass through respectively
The quantum gateway that classical channel services end side with seal is connected;The quantum gateway of the seal client-side and the seal
The quantum gateway of server side is connected by classical channel with quantum channel;The operating method of system is affixed one's seal and verified to quantum seal
Include the following steps:
(11)CA functions are opened in CA servers, and make CA digital certificates, seal server digital certificate, seal number
Certificate and customer digital certificate properly preserve respective private key;The private key of the user is stored in the usb encryptions of relative users respectively
Dog, and can not export;(12)Installation database and service routine in seal server, the service routine include that quantum adds
Deciphering module;Subsequent creative management person's account number after logging in the Administrator account, makes seal picture, is taken from the CA
The seal picture and the seal digital certificate are combined to create by the seal digital certificate being engaged in described in device download
Seal, and the seal is stored in the database;User name password database is established, the seal power of each user is created
Limit, and the digital certificate for downloading user is spare;(13)Installation kit is installed in seal client, the installation kit includes virtually beating
Print machine, stamped signature module and quantum encryption/decryption module;The username and password of the configuration seal client, and download the use
The digital certificate at family and the seal that can be used;(21)The user of seal client opens document to be sealed, chooses and virtually beats
Print machine;(22)Document structure tree electronic document is printed using the virtual printer of seal client;(23)Seal client quantum adds
Close user identity, and submit whether encrypted user identity, inquiry seal server need to update user to seal server
Seal list;Seal server carries out quantum decryption to encrypted user identity;(24)If necessary to update the print of user
Zhang Liebiao, seal server are listed seal list, and quantum cryptography, seal client downloads seal list, and quantum and are decrypted, print
The local seal list of chapter client update;If you do not need to update, then without operation;(25)Seal client user selects seal,
Position of affixing one's seal is selected, and clicks and affixes one's seal;(26)Seal client quantum cryptography seal information, and submit and encrypt to seal server
Whether seal information afterwards, inquiry seal server can affix one's seal;Seal server carries out quantum to encrypted seal information
Decryption;(27)If server returns successfully, show that selected seal is effective, seal client can perform stamping;If
Server returns to failure, then shows not can perform, and seal Client-Prompt user affixes one's seal unsuccessfully, returns(23);(28)Seal visitor
Family end cap chapter, the digital certificate of user are digitally signed document, finally save as new document;(29)Seal client
End cap chapter terminates;(31)The user of seal client opens document of having affixed one's seal, and clicks verification;(32)Seal client is from having affixed one's seal
The digital signature of seal content and user to document is parsed in document;(33)Seal client judges that document is with digital signature
It is no to be changed;(34)If digital signature judges that document is changed, seal Client-Prompt user tests chapter and terminates;If number
Word signature judges that document is not changed, then without operation;(35)Seal client encrypts the seal quantum of information, and is sent to print
Chapter server;(36)Seal server decrypts the seal quantum of information, and judges whether seal is effective;(37)Seal server is sentenced
Disconnected seal is effective, then sends out message and give seal client, seal Client-Prompt user's seal effective;Seal server judges seal
In vain, then sending out message gives seal client, seal Client-Prompt user's seal invalid;(38)Seal client is tested chapter and is terminated.
After above method, compared with prior art, the present invention haing the following advantages:
The present invention uses quantum cryptography and decryption technology, and throughput subnet closes and its quantum-key distribution algorithm, with described
Seal client do transmitting terminal or receiving terminal with the seal server, enable transmitting terminal and receiving terminal while getting close
Key;Transmitting terminal is encrypted with the key pair initial data with symmetric encipherment algorithm, obtains encryption data;The receiving terminal key
Encryption data is decrypted with identical symmetric encipherment algorithm, obtains initial data.In face of quantum computer to conventional cipher
Threat, unique method that can be solved, is exactly Data Encryption Techniques at this stage.In quantum cryptography system, if had on channel
Criminal eavesdrops, then eavesdropping action will interfere quantum cryptography system, and the quantum state to being sent to other side is made
At irremediable variation;Then communicating pair will be learnt has been ravesdropping at this time, to terminate epicycle communication;Generate a new round
Key, preparation communicate next time.By this method, theoretically the channel of eavesdropping is blocked.Therefore, Data Encryption Techniques
It is added in electronic seal system, is expected to realize that a new generation has high reliability, high authoritative seal system, i.e. quantum
Seal system.
The signaling key content (user information, seal information etc.) that the client of the present invention is interacted with server-side is added by quantum
It is close, show being perfectly safe for signaling key content;Data transmission (seal picture, digital certificate between client and server-side
Deng) by quantum cryptography, show being perfectly safe for data transmission.
The present invention is used according to quantum-mechanical uncertainty principle and quantum non-clone principle, and any eavesdropping can
It is found, ensure that the transmission that is perfectly safe.It can be eavesdropped due to unmanned, then ensure that being perfectly safe for the key of symmetric encipherment algorithm
Transmission;It ensure that the safe transmission of key, also ensure that the transmission that is perfectly safe of encryption information.This point is that any tradition adds
What close mode can not ensure.
Further, the life cycle of the seal includes the one kind enlivened in state, frozen state and failure state.
Further, described enliven can mutually convert between state, frozen state and failure state this three state;Described
It enlivens state and enters frozen state through freezing, the frozen state, which thaws to enter, enlivens state;The frozen state or enliven state fail into
Enter the state that fails, the failure state brings back to life into frozen state or enlivens state.
Description of the drawings
System group network functional block diagram is affixed one's seal and verified to Fig. 1 quantum seals.
Fig. 2 quantum seal life cycle figures.
Fig. 3 quantum seal clients are affixed one's seal flow chart.
Fig. 4 quantum seal clients test chapter flow chart.
Specific implementation mode
The invention will be further described in the following with reference to the drawings and specific embodiments.
The present invention is as shown in Figs 1-4, and the operating method of system is affixed one's seal and verified to a kind of quantum seal, and quantum seal is affixed one's seal
And verification system includes seal client, seal client quantum gateway, server quantum gateway, CA servers and seal service
Device;The seal client is connected by classical channel with the quantum gateway of seal client-side, the seal server,
The quantum gateway that CA servers service end side by classical channel with seal respectively is connected;The quantum of the seal client-side
Gateway is connected with the quantum gateway of the seal server side by classical channel and quantum channel;Quantum seal is affixed one's seal and is tested
The operating method of card system includes the following steps:
(11)CA functions are opened in CA servers, and make CA digital certificates, seal server digital certificate, seal number
Certificate and customer digital certificate properly preserve respective private key;The private key of the user is stored in the usb encryptions of relative users respectively
Dog, and can not export;(12)Installation database and service routine in seal server, the service routine include that quantum adds
Deciphering module;Subsequent creative management person's account number after logging in the Administrator account, makes seal picture, is taken from the CA
The seal picture and the seal digital certificate are combined to create by the seal digital certificate being engaged in described in device download
Seal, and the seal is stored in the database;User name password database is established, the seal power of each user is created
Limit, and the digital certificate for downloading user is spare;(13)Installation kit is installed in seal client, the installation kit includes virtually beating
Print machine, stamped signature module and quantum encryption/decryption module;The username and password of the configuration seal client, and download the use
The digital certificate at family and the seal that can be used;(21)The user of seal client opens document to be sealed, chooses and virtually beats
Print machine;(22)Document structure tree electronic document is printed using the virtual printer of seal client;(23)Seal client quantum adds
Close user identity, and submit whether encrypted user identity, inquiry seal server need to update user to seal server
Seal list;Seal server carries out quantum decryption to encrypted user identity;(24)If necessary to update the print of user
Zhang Liebiao, seal server are listed seal list, and quantum cryptography, seal client downloads seal list, and quantum and are decrypted, print
The local seal list of chapter client update;If you do not need to update, then without operation;(25)Seal client user selects seal,
Position of affixing one's seal is selected, and clicks and affixes one's seal;(26)Seal client quantum cryptography seal information, and submit and encrypt to seal server
Whether seal information afterwards, inquiry seal server can affix one's seal;Seal server carries out quantum to encrypted seal information
Decryption;(27)If server returns successfully, show that selected seal is effective, seal client can perform stamping;If
Server returns to failure, then shows not can perform, and seal Client-Prompt user affixes one's seal unsuccessfully, returns(23);(28)Seal visitor
Family end cap chapter, the digital certificate of user are digitally signed document, finally save as new document;(29)Seal client
End cap chapter terminates;(31)The user of seal client opens document of having affixed one's seal, and clicks verification;(32)Seal client is from having affixed one's seal
The digital signature of seal content and user to document is parsed in document;(33)Seal client judges that document is with digital signature
It is no to be changed;(34)If digital signature judges that document is changed, seal Client-Prompt user tests chapter and terminates;If number
Word signature judges that document is not changed, then without operation;(35)Seal client encrypts the seal quantum of information, and is sent to print
Chapter server;(36)Seal server decrypts the seal quantum of information, and judges whether seal is effective;(37)Seal server is sentenced
Disconnected seal is effective, then sends out message and give seal client, seal Client-Prompt user's seal effective;Seal server judges seal
In vain, then sending out message gives seal client, seal Client-Prompt user's seal invalid;(38)Seal client is tested chapter and is terminated.
Wherein, CA is the entity that communicating pair is all trusted in PKI system.CA confirms other people public key information by certificate.
About the use principle and verification principle of CA, details are not described herein again.
The electronic document of the virtual printer printing is the document of PDF format.
It includes the information such as seal picture, seal certificate, seal ID that client parses seal content from document of having affixed one's seal.
Quantum communications are the novel crossed subjects that recent two decades grow up, and are quantum theory and that information theory is combined is new
Research field.The unconditional security of communicating pair may be implemented in quantum key delivering method in quantum communications.Therefore in face of amount
The powerful threat that son calculates, quantum communication network are expected to thoroughly solve the problems, such as that electronic seal system is cracked, to more reinforce
Effectively ensure the authority for the official document that authoritative department is sent out.
Quantum cryptography and decryption refer to throughput subnet pass and its quantum-key distribution algorithm, make transmitting terminal and receiving terminal same
When get key;Transmitting terminal is encrypted with the key pair initial data with symmetric encipherment algorithm, obtains encryption data;It receives
End is decrypted with the key pair encryption data with identical symmetric encipherment algorithm, obtains initial data.
Further, as shown in Figure 2 in the life cycle of the seal, including state, frozen state and failure state 3 are enlivened
Kind seal state.
The case where seal can normally affix one's seal is to enliven state.It is effective to enliven seal under state, and can affix one's seal.Making stamp is completed
Enter and enlivens state.
If the seal freezes (i.e. pause uses), enter frozen state.Seal is still effective under frozen state, but can not cover
Chapter.Seal restores using referred to as defrosting.
If the seal fails, enter failure state.Seal is invalid under the state that fails, and can not affix one's seal.Failure cause has:Print
The chapter term of validity expires (by Administrator);Seal digital certificate expires;Administrator forces to be allowed to fail.Seal is extensive from failure
It is multiple to be known as bringing back to life.Similarly, the method for resurrection has:Administrator changes the seal term of validity;Replace effective digital certificate;Administrator is strong
System is allowed to bring back to life.The state before failure is returned to after resurrection, that is, enlivens state or frozen state.
The E-seal sealing system built based on quantum communication network, herein referred to as quantum seal system.To beg for
By conveniently, the process object being discussed herein is the official document of various formats, but real system is not limited to processing official document.
Only highly preferred embodiment of the present invention is described above, but is not to be construed as limiting the scope of the invention.This
Invention is not limited only to above example, and various changes made within the protection scope of the independent claims of the invention are at this
In the protection domain of invention.
Claims (3)
1. the operating method of system is affixed one's seal and verified to a kind of quantum seal, it is characterised in that:System is affixed one's seal and verified to quantum seal
Including seal client, seal client quantum gateway, server quantum gateway, CA servers and seal server;Described
Seal client is connected by classical channel with the quantum gateway of seal client-side, the seal server, CA servers
The quantum gateway for servicing end side with seal by classical channel respectively is connected;The quantum gateway of the seal client-side and institute
The quantum gateway for the seal server side stated is connected by classical channel with quantum channel;System is affixed one's seal and verified to quantum seal
Operating method includes the following steps:
(11)CA functions are opened in CA servers, and make CA digital certificates, seal server digital certificate, seal digital certificate
And customer digital certificate, properly preserve respective private key;The private key of the user is stored in the usb softdogs of relative users respectively,
And it can not export;
(12)Installation database and service routine in seal server, the service routine include quantum encryption/decryption module;
Subsequent creative management person's account number, after logging in the Administrator account, makes seal picture, and institute is downloaded from the CA servers
The seal picture and the seal digital certificate are combined to create seal by the seal digital certificate stated, and will
The seal deposit database;User name password database is established, the seal permission of each user is created, and is downloaded
The digital certificate of user is spare;
(13)Installation kit is installed in seal client, the installation kit includes that virtual printer, stamped signature module and quantum add
Deciphering module;The username and password of the configuration seal client, and download the digital certificate of the user and can use
Seal;
(21)The user of seal client opens document to be sealed, chooses virtual printer;
(22)Document structure tree electronic document is printed using the virtual printer of seal client;
(23)Seal client quantum cryptography user identity, and submit encrypted user identity, inquiry print to seal server
Whether chapter server needs to update the seal list of user;Seal server carries out quantum decryption to encrypted user identity;
(24)If necessary to update the seal list of user, seal server lists seal list, and quantum cryptography, seal client
Seal list is downloaded at end, and quantum is decrypted, the local seal list of seal client update;If you do not need to update, then without operation;
(25)Seal client user selects seal, selects position of affixing one's seal, and click and affix one's seal;
(26)Seal client quantum cryptography seal information, and submit encrypted seal information, inquiry print to seal server
Whether chapter server can affix one's seal;Seal server carries out quantum decryption to encrypted seal information;
(27)If server returns successfully, show that selected seal is effective, seal client can perform stamping;If clothes
Business device returns to failure, then shows not can perform, and seal Client-Prompt user affixes one's seal unsuccessfully, returns(23);
(28)Seal client is affixed one's seal, and the digital certificate of user is digitally signed document, finally saves as new text
Shelves;
(29)Seal client is affixed one's seal end;
(31)The user of seal client opens document of having affixed one's seal, and clicks verification;
(32)Seal client parses the digital signature of seal content and user to document from document of having affixed one's seal;
(33)Seal client digital signature judges whether document is changed;
(34)If digital signature judges that document is changed, seal Client-Prompt user tests chapter and terminates;If digital signature
Judge that document is not changed, then without operation;
(35)Seal client encrypts the seal quantum of information, and is sent to seal server;
(36)Seal server decrypts the seal quantum of information, and judges whether seal is effective;
(37)Seal server judges that seal is effective, then sends out message and seal client, seal Client-Prompt user's seal is given to have
Effect;Seal server judges that seal is invalid, then sends out message and give seal client, seal Client-Prompt user's seal invalid;
(38)Seal client is tested chapter and is terminated.
2. affixing one's seal and verifying the operating method of system according to the quantum seal described in claim 1, it is characterised in that:Described
It includes the one kind enlivened in state, frozen state and failure state that seal, which has life cycle, the life cycle,.
3. affixing one's seal and verifying the operating method of system according to the quantum seal described in claim 2, it is characterised in that:Described
Enlivening can mutually convert between state, frozen state and failure state three state;The state of enlivening enters frozen state through freezing, described
Frozen state thaw enter enliven state;The frozen state enlivens state failure and enters failure state, the failure state bring back to life into
Enter frozen state or enlivens state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510586962.4A CN105119941B (en) | 2015-09-16 | 2015-09-16 | The operating method of system is affixed one's seal and verified to quantum seal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510586962.4A CN105119941B (en) | 2015-09-16 | 2015-09-16 | The operating method of system is affixed one's seal and verified to quantum seal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105119941A CN105119941A (en) | 2015-12-02 |
CN105119941B true CN105119941B (en) | 2018-08-17 |
Family
ID=54667829
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510586962.4A Active CN105119941B (en) | 2015-09-16 | 2015-09-16 | The operating method of system is affixed one's seal and verified to quantum seal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105119941B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105515780B (en) * | 2016-01-12 | 2018-11-13 | 浙江神州量子通信技术有限公司 | Identity authorization system based on quantum key and method |
CN105812367B (en) * | 2016-03-15 | 2018-08-17 | 浙江神州量子网络科技有限公司 | The Verification System and authentication method of network access equipment in a kind of quantum network |
CN106357346A (en) * | 2016-10-28 | 2017-01-25 | 章美前 | Quantum communication system |
CN106850204A (en) * | 2017-02-27 | 2017-06-13 | 北京邮电大学 | Quantum key distribution method and system |
CN108833100B (en) * | 2018-07-27 | 2021-07-20 | 江苏亨通问天量子信息研究院有限公司 | Information verification method, sending end system, receiving end system and verification end system |
CN109614802B (en) * | 2018-10-31 | 2020-11-27 | 如般量子科技有限公司 | Anti-quantum-computation signature method and signature system |
CN109586918B (en) * | 2018-10-31 | 2021-08-31 | 如般量子科技有限公司 | Anti-quantum-computation signature method and signature system based on symmetric key pool |
CN111191216B (en) * | 2019-12-26 | 2024-02-06 | 航天信息股份有限公司 | OFD signature client with JAVA interface and method and system for signature verification |
CN111177801B (en) * | 2019-12-31 | 2023-01-10 | 航天信息股份有限公司 | Signature method and device of electronic document, storage medium and electronic equipment |
CN112235106B (en) * | 2020-10-26 | 2021-06-08 | 成都信息工程大学 | Electronic seal management method and system based on quantum key |
CN114697038A (en) * | 2020-12-31 | 2022-07-01 | 科大国盾量子技术股份有限公司 | Quantum attack resistant electronic signature method and system |
CN115459916B (en) * | 2022-11-09 | 2023-03-24 | 江苏翔晟信息技术股份有限公司 | Electronic signature management system based on quantum encryption technology |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050132196A1 (en) * | 2003-12-16 | 2005-06-16 | Josef Dietl | Electronic signatures |
CN101017544A (en) * | 2007-02-15 | 2007-08-15 | 江苏国盾科技实业有限责任公司 | Conflated seal affix authentication method having electronic seal digital certification |
CN101800646A (en) * | 2010-03-03 | 2010-08-11 | 南京优泰科技发展有限公司 | Implementation method and system of electronic signature |
CN103914745A (en) * | 2012-12-30 | 2014-07-09 | 航天信息股份有限公司 | Management method and system for seal revocation list of electronic signature system |
CN203912078U (en) * | 2014-02-28 | 2014-10-29 | 山东量子科学技术研究院有限公司 | Quantum safety video conference system |
CN104618387A (en) * | 2015-02-14 | 2015-05-13 | 安徽量子通信技术有限公司 | Method applying SIP signaling to quantum secure communication system, integrated access quantum gateway and system |
-
2015
- 2015-09-16 CN CN201510586962.4A patent/CN105119941B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050132196A1 (en) * | 2003-12-16 | 2005-06-16 | Josef Dietl | Electronic signatures |
CN101017544A (en) * | 2007-02-15 | 2007-08-15 | 江苏国盾科技实业有限责任公司 | Conflated seal affix authentication method having electronic seal digital certification |
CN101800646A (en) * | 2010-03-03 | 2010-08-11 | 南京优泰科技发展有限公司 | Implementation method and system of electronic signature |
CN103914745A (en) * | 2012-12-30 | 2014-07-09 | 航天信息股份有限公司 | Management method and system for seal revocation list of electronic signature system |
CN203912078U (en) * | 2014-02-28 | 2014-10-29 | 山东量子科学技术研究院有限公司 | Quantum safety video conference system |
CN104618387A (en) * | 2015-02-14 | 2015-05-13 | 安徽量子通信技术有限公司 | Method applying SIP signaling to quantum secure communication system, integrated access quantum gateway and system |
Also Published As
Publication number | Publication date |
---|---|
CN105119941A (en) | 2015-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105119941B (en) | The operating method of system is affixed one's seal and verified to quantum seal | |
CN110069918B (en) | Efficient double-factor cross-domain authentication method based on block chain technology | |
CN109614802B (en) | Anti-quantum-computation signature method and signature system | |
CN109600228B (en) | Anti-quantum-computation signature method and system based on public key pool | |
CN105471584A (en) | Identity authentication method based on quantum key encryption | |
CN105323070B (en) | A kind of safety E-mail implementation method based on digital envelope | |
CN107708112A (en) | A kind of encryption method suitable for MQTT SN agreements | |
CN108259407B (en) | Symmetric encryption method and system based on timestamp | |
CN109560935B (en) | Anti-quantum-computation signature method and signature system based on public asymmetric key pool | |
CN108206739A (en) | Key generation method and device | |
CN108549824A (en) | A kind of data desensitization method and device | |
CN110071863A (en) | A kind of instant communication users group's encryption method based on id password | |
CN106713349A (en) | Inter-group proxy re-encryption method capable of resisting selected ciphertext attack | |
Olumide et al. | A hybrid encryption model for secure cloud computing | |
CN109586918B (en) | Anti-quantum-computation signature method and signature system based on symmetric key pool | |
Boke et al. | Efficient key generation techniques for securing IoT communication protocols | |
Hesse et al. | Password-authenticated tls via opaque and post-handshake authentication | |
Bruckner et al. | : End-to-End Hybrid Authenticated Key Exchanges | |
Buldas et al. | Keyless signature infrastructure and PKI: hash-tree signatures in pre-and post-quantum world | |
CN114338648A (en) | SFTP multi-terminal file secure transmission method and system based on state cryptographic algorithm | |
Sandoval et al. | Pakemail: authentication and key management in decentralized secure email and messaging via pake | |
CN110213056B (en) | Anti-quantum computing energy-saving communication method and system and computer equipment | |
CN110519214B (en) | Application system short-distance energy-saving communication method, system and equipment based on online and offline signature and auxiliary verification signature | |
Kobeissi | An analysis of the protonmail cryptographic architecture | |
CN110061895B (en) | Close-range energy-saving communication method and system for quantum computing resisting application system based on key fob |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |