CN106911474B - Quantum key encryption method and device based on business attributes - Google Patents

Quantum key encryption method and device based on business attributes Download PDF

Info

Publication number
CN106911474B
CN106911474B CN201710325356.6A CN201710325356A CN106911474B CN 106911474 B CN106911474 B CN 106911474B CN 201710325356 A CN201710325356 A CN 201710325356A CN 106911474 B CN106911474 B CN 106911474B
Authority
CN
China
Prior art keywords
service
quantum key
quantum
key
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710325356.6A
Other languages
Chinese (zh)
Other versions
CN106911474A (en
Inventor
陈智雨
王栋
高德荃
李国春
赵子岩
吴冰
童文
肖磊
葛冰玉
史睿
白东霞
李伯中
刘识
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201710325356.6A priority Critical patent/CN106911474B/en
Publication of CN106911474A publication Critical patent/CN106911474A/en
Application granted granted Critical
Publication of CN106911474B publication Critical patent/CN106911474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a quantum key encryption method and a device based on business attributes, wherein the quantum key encryption method based on the business attributes comprises the following steps: acquiring data to be encrypted of each service; determining total sub-key quantity resources and service attributes of each service; distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service; determining the optimal quantum key updating frequency of each service according to the quantum key quantity resources and the service attributes of each service; and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key. In the application, the security and the confidentiality of the data can be improved through the method.

Description

Quantum key encryption method and device based on business attributes
Technical Field
The present application relates to the field of communication security, and in particular, to a quantum key encryption method and apparatus based on service attributes.
Background
The continuous progress of human civilization and the development of scientific technology are changing day by day, so that the communication mode is continuously developing towards more civilization, more advancement and more intellectualization. Today, with the rapid development of computing technology and communication technology, human society has stepped into an information-oriented era. In the information age, information is a crucial place in each field of human life such as politics, economy, military, science and technology. Meanwhile, with the continuous development of information science and technology, especially the appearance of the internet and wireless networks, the problem of information leakage is increasingly concerned by people. For individuals, information leakage directly causes invasion and loss of privacy, economic benefits, scientific research achievements and the like of the individuals; for the country, this will cause significant losses in the fields of politics, economy, science and technology, military and the like, and especially in the field of military, information leakage will seriously threaten the security of the country.
From the above, a crucial problem in the field of information science and communication is how to further improve the security and confidentiality of information.
Disclosure of Invention
In order to solve the above technical problems, embodiments of the present application provide a quantum key encryption method and device based on business attributes, so as to achieve the purpose of improving the security and confidentiality of data, and the technical solution is as follows:
a quantum key encryption method based on service attributes comprises the following steps:
acquiring data to be encrypted of each service;
determining total sub-key quantity resources and service attributes of the services;
distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service;
determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service;
and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key.
Preferably, determining the total amount of subkey resources includes:
reading a quantum key from quantum key generation equipment to obtain a code rate in real time;
and multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
Preferably, the service attribute of each service includes: a business data asset class and a data transmission rate;
determining the service attribute of each service, including:
inquiring the business data asset grade of each business in a preset business data asset grade library;
and reading the data transmission rate of each service from the virtual private network used by each service.
Preferably, the allocating the total quantum key amount resource to each service to obtain the quantum key amount resource of each service includes:
ranking the business data asset classes of all the businesses in a high-low mode to obtain a ranking result;
determining the key distribution weight of each service by using the sequencing result;
using the relation 1
Figure BDA0001290988710000021
Allocating the total amount of subkey amount resources to eachObtaining quantum key amount resource of each service by each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
Preferably, determining the optimal quantum key update frequency of each service according to the quantum key amount resource and the service attribute of each service includes:
using the relation of two
Figure BDA0001290988710000022
Calculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiIs the data transmission threshold of the ith service.
A quantum key encryption device based on business attributes, comprising:
the acquisition module is used for acquiring data to be encrypted of each service;
the first determining module is used for determining the total sub-secret key amount resources and the service attributes of the services;
the distribution module is used for distributing the total quantum key amount resources to each service to obtain the quantum key amount resources of each service;
the second determining module is used for determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service;
and the encryption module is used for updating the quantum key of each service by using the optimal quantum key updating frequency of each service and encrypting the data to be encrypted of each service by using the updated quantum key.
Preferably, the first determining module includes:
the first reading unit is used for reading the quantum key real-time code rate from the quantum key generation equipment;
and the first calculation unit is used for multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
Preferably, the service attribute of each service includes: a business data asset class and a data transmission rate;
the first determining module includes:
the query unit is used for querying the business data asset grade of each business in a preset business data asset grade library;
and a second reading unit, configured to read the data transmission rate of each service from the virtual private network used by each service.
Preferably, the distribution module includes:
the sequencing unit is used for sequencing the business data assets of all the businesses in a high-low mode to obtain a sequencing result;
a determining unit, configured to determine a key assignment weight of each service according to the sorting result;
an allocation unit for utilizing the relation one
Figure BDA0001290988710000041
Distributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
Preferably, the second determining module includes:
a second calculation unit for using the relation of two
Figure BDA0001290988710000042
Computing an optimal quantum for each of the servicesFrequency of key update, fiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiIs the data transmission threshold of the ith service.
Compared with the prior art, the beneficial effect of this application is:
in the application, data to be encrypted of each service is acquired; determining total sub-key quantity resources and service attributes of the services; distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service; determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key to realize data encryption. Because the quantum key is a safe key based on quantum state observation of quantum mechanics measurement principle, and has high safety, the unconditional safety of communication can be ensured by encrypting data by adopting the quantum key, and the safety and the confidentiality of the data can be improved.
Furthermore, the optimal quantum key updating frequency of each service is determined according to the quantum key quantity resources and the service attributes of each service, so that the purpose of adaptively adjusting the quantum key updating frequency of each service is achieved, the use efficiency of the quantum key is improved, and the efficient and safe operation of the power quantum secret communication network is ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive labor.
FIG. 1 is a flow chart of a quantum key encryption method based on business attributes provided in the present application;
FIG. 2 is a sub-flowchart of a quantum key encryption method based on business attributes provided herein;
FIG. 3 is another sub-flow diagram of a method for quantum key encryption based on business attributes provided herein;
FIG. 4 is a further sub-flowchart of the quantum key encryption method based on business attributes provided herein;
fig. 5 is a schematic logic structure diagram of a quantum key encryption device based on service attributes provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Example one
Referring to fig. 1, a flow chart of a quantum key encryption method based on service attributes provided in the present application is shown, which may include the following steps:
step S11: and acquiring data to be encrypted of each service.
Step S12: and determining the total sub-key quantity resources and the service attributes of the services.
Since the execution purpose of each service is different, each service has different service attributes. However, since the service attribute is an attribute of the service itself, the service attribute of the service can be determined when the service is determined.
Step S13: and distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service.
Step S14: and determining the optimal quantum key updating frequency of each service according to the quantum key quantity resources and the service attributes of each service.
Since the key update frequency determines the security degree of data encryption, the quantum key update frequency of each service needs to be adjusted in real time according to the quantum key quantity resources and the service attributes of each service, that is, the optimal quantum key update frequency of each service is determined. Based on this, since the service attribute of each service directly restricts the transmission of the data of the service, it is necessary to determine the optimal quantum key update frequency adapted to the service attribute of each service.
Step S15: and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key.
In this embodiment, since the quantum key used for encryption is obtained by updating according to the optimal quantum key updating frequency, the security degree of data encryption is relatively high, and the security and the encryption performance of the encrypted data are correspondingly improved.
It should be noted that each service has a default key update frequency, after the optimal quantum key update frequency of each service is determined, the default key update frequency of each service may be compared with the optimal quantum key update frequency, when the two are different, the default key update frequency is adjusted to the optimal quantum key update frequency, and when the two are the same, the default key update frequency is directly used.
Of course, after the optimal quantum key update frequency is determined, the operation of comparing the default key update frequency and the optimal quantum key update frequency of each service is not performed, and the default key update frequency is directly replaced by the optimal quantum key update frequency, so that the optimal quantum key update frequency is used.
In the application, data to be encrypted of each service is acquired; determining total sub-key quantity resources and service attributes of the services; distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service; determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key to realize data encryption. Because the quantum key is a safe key based on quantum state observation of quantum mechanics measurement principle, and has high safety, the unconditional safety of communication can be ensured by encrypting data by adopting the quantum key, and the safety and the confidentiality of the data can be improved.
Furthermore, the optimal quantum key updating frequency of each service is determined according to the quantum key quantity resources and the service attributes of each service, so that the purpose of adaptively adjusting the quantum key updating frequency of each service is achieved, the use efficiency of the quantum key is improved, and the efficient and safe operation of the power quantum secret communication network is ensured.
In this embodiment, the specific process for determining the total amount of subkey amount resource may refer to fig. 2, and may include the following steps:
step S21: and reading the quantum key from the quantum key generation device to obtain the code rate in real time.
Step S22: and multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
In this embodiment, the service attributes of the services may specifically include, but are not limited to, the following: a traffic data asset class and a data transmission rate.
The service attributes of each service specifically include: in the case of service data asset class and data transmission rate, a specific process for determining the service attribute of each service may be as shown in fig. 3, and may include the following steps:
step S31: and inquiring the business data asset grade of each business in a preset business data asset grade library.
Step S32: and reading the data transmission rate of each service from the virtual private network used by each service.
In this embodiment, the allocating the total amount of sub-key resources to each service may adopt an average allocation manner, specifically: and dividing the total quantum key quantity resource by the total number of the services to obtain the quantum key quantity resource of each service.
Of course, the total sub-key amount resource is allocated to each service to obtain the sub-key amount resource of each service, or the total sub-key amount resource may be allocated to each service according to the service attribute by self-use in a manner of being associated with the service attribute, which may specifically refer to fig. 4, and may include the following steps:
step S41: and sequencing the business data asset grades of all the businesses in a high-low mode to obtain a sequencing result.
Step S42: and determining the key distribution weight of each service by using the sequencing result.
Step S43: using the relation 1
Figure BDA0001290988710000081
And distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service.
Wherein S isiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
In this embodiment, since the business data asset class represents the importance of the business data, the quantum key amount resource is allocated by using the business data asset class, so that safer encryption of the important business data can be ensured. The higher the business data asset level is, the larger the key distribution weight of the business is, and correspondingly, the more quantum key amount resources are obtained by business distribution.
Based on the quantum key amount resource allocation method shown in fig. 4, the key update frequency is also higher for the service with high service data asset level. Whereby individual services can be employedInverse of the key quantum resource
Figure BDA0001290988710000082
As one of the weight parameters for calculating the key update frequency;
and, updating the key in a time-division manner (i.e., the service is operated by time-division operation), so that the data transmission rate ViDetermines the amount of traffic data transmitted over the line. Suppose that the transmission data amount of a certain service reaches the data transmission threshold QiThe time key is updated, and the key updating period T corresponding to the service is
Figure BDA0001290988710000083
Combining the above two factors, the quantum key update frequency (time/second) is
Figure BDA0001290988710000084
Based on the above, the specific process of determining the optimal quantum key update frequency of each service according to the quantum key amount resource and the service attribute of each service may be as follows: using the relation of two
Figure BDA0001290988710000085
Calculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiIs the data transmission threshold of the ith service.
Of course, the service attributes of each service may include, in addition to the service data asset class and the data transmission rate: service priority, data importance, transmission real-time, data block size, data transmission accuracy and the like. Therefore, the present embodiment does not limit determining the optimal quantum key update frequency of each service according to only the quantum key amount resource, the service data asset class, and the data transmission rate of each service, and may also determine the optimal quantum key update frequency of each service according to other service attributes of the quantum key amount resource, the service priority, the data importance, the transmission real-time property, the data block size, the data transmission accuracy, and the like of each service. The specific determination process needs to be determined according to the specific service attribute.
Example two
Corresponding to the foregoing method embodiment, this embodiment provides a quantum key encryption device based on service attributes, please refer to fig. 5, where the quantum key encryption device based on service attributes includes: the device comprises an acquisition module 11, a first determination module 12, a distribution module 13, a second determination module 14 and an encryption module 15.
The obtaining module 11 is configured to obtain data to be encrypted of each service.
A first determining module 12, configured to determine a total sub-secret key amount resource and a service attribute of each service.
And the allocation module 13 is configured to allocate the total quantum key amount resource to each service, so as to obtain a quantum key amount resource of each service.
And a second determining module 14, configured to determine, according to the quantum key amount resource and the service attribute of each service, an optimal quantum key update frequency of each service.
And the encryption module 15 is configured to update the quantum key of each service by using the optimal quantum key update frequency of each service, and encrypt the data to be encrypted of each service by using the updated quantum key.
In this embodiment, the first determining module 12 may specifically include: the device comprises a first reading unit and a first calculating unit.
And the first reading unit is used for reading the quantum key real-time coding rate from the quantum key generation device.
And the first calculation unit is used for multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
In this embodiment, the service attributes of each service may specifically include: a traffic data asset class and a data transmission rate.
The service attribute of each service may specifically include: under the condition of the service data asset class and the data transmission rate, the first determining module 12 specifically includes: an inquiring unit and a second reading unit.
And the query unit is used for querying the business data asset grade of each business in a preset business data asset grade library.
And a second reading unit, configured to read the data transmission rate of each service from the virtual private network used by each service.
In this embodiment, the allocating module 13 may specifically include: the device comprises a sorting unit, a determining unit and an allocating unit.
And the sequencing unit is used for sequencing the service data asset grades of all the services in a high-low mode to obtain a sequencing result.
And the determining unit is used for determining the key distribution weight of each service by using the sequencing result.
An allocation unit for utilizing the relation one
Figure BDA0001290988710000101
Distributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
The second determining module 14 may specifically include: a second calculation unit for using the relation of two
Figure BDA0001290988710000102
Calculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiFor the ith trafficResource of sub-key amount, QiIs the data transmission threshold of the ith service.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments or some parts of the embodiments of the present application.
The method and the device for quantum key encryption based on business attributes provided by the application are introduced in detail, specific examples are applied in the method to explain the principle and the implementation of the application, and the description of the above embodiments is only used for helping to understand the method and the core idea of the application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (8)

1. A quantum key encryption method based on service attributes is characterized by comprising the following steps:
acquiring data to be encrypted of each service;
determining total sub-key quantity resources and service attributes of the services;
distributing the total quantum key amount resource to each service to obtain the quantum key amount resource of each service;
determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; the determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service comprises the following steps: using the relation of two
Figure FDA0002380471760000011
Calculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiA data transmission threshold value of the ith service;
and updating the quantum key of each service by using the optimal quantum key updating frequency of each service, and encrypting the data to be encrypted of each service by using the updated quantum key.
2. The method of claim 1, wherein determining a total quantum key quantum resource comprises:
reading a quantum key from quantum key generation equipment to obtain a code rate in real time;
and multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
3. The method according to claim 1 or 2, wherein the service attributes of each service comprise: a business data asset class and a data transmission rate;
determining the service attribute of each service, including:
inquiring the business data asset grade of each business in a preset business data asset grade library;
and reading the data transmission rate of each service from the virtual private network used by each service.
4. The method of claim 3, wherein allocating the total quantum key quantum resource to each of the services to obtain the quantum key quantum resource of each of the services comprises:
ranking the business data asset classes of all the businesses in a high-low mode to obtain a ranking result;
determining the key distribution weight of each service by using the sequencing result;
using the relation 1
Figure FDA0002380471760000021
Distributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiWi assigns weight to the quantum key amount resource of the ith service, wherein i is not less than 1 and is not less than 1N is an integer not greater than n, n is an integer not less than 1, W1+ W2+ W3+. + Wn is the sum of the key assignment weights of the respective services, and S is the total subkey amount resource.
5. A quantum key encryption apparatus based on business attributes, comprising:
the acquisition module is used for acquiring data to be encrypted of each service;
the first determining module is used for determining the total sub-secret key amount resources and the service attributes of the services;
the distribution module is used for distributing the total quantum key amount resources to each service to obtain the quantum key amount resources of each service;
the second determining module is used for determining the optimal quantum key updating frequency of each service according to the quantum key quantity resource and the service attribute of each service; the second determining module includes:
a second calculation unit for using the relation of two
Figure FDA0002380471760000022
Calculating the optimal quantum key updating frequency f of each serviceiUpdate frequency, V, of optimal quantum key for ith serviceiData transmission rate, S, for the ith serviceiQuantum key quantum resource, Q, for ith trafficiA data transmission threshold value of the ith service;
and the encryption module is used for updating the quantum key of each service by using the optimal quantum key updating frequency of each service and encrypting the data to be encrypted of each service by using the updated quantum key.
6. The apparatus of claim 5, wherein the first determining module comprises:
the first reading unit is used for reading the quantum key real-time code rate from the quantum key generation equipment;
and the first calculation unit is used for multiplying the real-time bit rate of the quantum key by a preset time length to obtain the total quantum key amount resource.
7. The apparatus according to claim 5 or 6, wherein the service attribute of each service comprises: a business data asset class and a data transmission rate;
the first determining module includes:
the query unit is used for querying the business data asset grade of each business in a preset business data asset grade library;
and a second reading unit, configured to read the data transmission rate of each service from the virtual private network used by each service.
8. The apparatus of claim 7, wherein the assignment module comprises:
the sequencing unit is used for sequencing the business data assets of all the businesses in a high-low mode to obtain a sequencing result;
a determining unit, configured to determine a key assignment weight of each service according to the sorting result;
an allocation unit for utilizing the relation one
Figure FDA0002380471760000031
Distributing the total quantum key quantum resources to each service to obtain the quantum key quantum resources of each service, SiAnd allocating weights to the quantum key quantity resource of the ith service, wherein Wi is the key of the ith service, i is an integer which is not less than 1 and not more than n, n is an integer which is not less than 1, W1+ W2+ W3+. + Wn is the sum of the key allocation weights of the services, and S is the total quantum key quantity resource.
CN201710325356.6A 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes Active CN106911474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710325356.6A CN106911474B (en) 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710325356.6A CN106911474B (en) 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes

Publications (2)

Publication Number Publication Date
CN106911474A CN106911474A (en) 2017-06-30
CN106911474B true CN106911474B (en) 2020-07-03

Family

ID=59210528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710325356.6A Active CN106911474B (en) 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes

Country Status (1)

Country Link
CN (1) CN106911474B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067519A (en) * 2018-07-25 2018-12-21 厦门科华恒盛股份有限公司 A kind of method, system and the relevant apparatus of adjustment amount sub-key update frequency

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134669B (en) * 2018-01-11 2020-12-08 北京中电普华信息技术有限公司 Quantum key dynamic supply method and management system for power dispatching service
CN110620650A (en) * 2018-06-20 2019-12-27 中国电信股份有限公司 Communication method, system, device and computer readable storage medium
CN109951452B (en) * 2019-02-26 2021-03-23 北京深思数盾科技股份有限公司 Method and device for processing cryptography task
CN110061840B (en) * 2019-03-12 2022-10-28 平安科技(深圳)有限公司 Data encryption method and device, computer equipment and storage medium
CN111211896A (en) * 2019-12-19 2020-05-29 南京南瑞国盾量子技术有限公司 Integrated quantum key encryption method, system and storage medium suitable for power business
CN113757909B (en) * 2021-11-08 2022-02-08 国网浙江省电力有限公司绍兴供电公司 Air conditioner cluster control method based on quantum encryption technology
CN116232629B (en) * 2022-11-15 2023-09-26 北京连山科技股份有限公司 Multi-link data particle transmission method based on quantum cryptography protection

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179377A (en) * 2006-11-09 2008-05-14 中兴通讯股份有限公司 Cipher key distributing and updating system of multimedia broadcasting service
MY149272A (en) * 2009-06-24 2013-08-15 Mimos Berhad Method for use in quantum cryptography
CN103840936B (en) * 2014-02-28 2018-02-09 山东量子科学技术研究院有限公司 The reliable encryption transmission system of quantum cryptography networks and method
CN104660602B (en) * 2015-02-14 2017-05-31 山东量子科学技术研究院有限公司 A kind of quantum key transfer control method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109067519A (en) * 2018-07-25 2018-12-21 厦门科华恒盛股份有限公司 A kind of method, system and the relevant apparatus of adjustment amount sub-key update frequency

Also Published As

Publication number Publication date
CN106911474A (en) 2017-06-30

Similar Documents

Publication Publication Date Title
CN106911474B (en) Quantum key encryption method and device based on business attributes
Lo'Ai et al. Cloudlet-based mobile cloud computing for healthcare applications
Liu et al. Public auditing for big data storage in cloud computing--a survey
CN113449048B (en) Data label distribution determining method and device, computer equipment and storage medium
WO2022116491A1 (en) Dbscan clustering method based on horizontal federation, and related device therefor
CN109583227B (en) Privacy information protection method, device and system
CN111428887A (en) Model training control method, device and system based on multiple computing nodes
Kareem et al. An approach for enhancing data confidentiality in hadoop
WO2020087879A1 (en) Method, device, and system for protecting private information
Ceselli et al. Optimized assignment patterns in Mobile Edge Cloud networks
CN111949998B (en) Object detection and request method, data processing system, device and storage medium
Jayapandian Cloud Dynamic Scheduling for Multimedia Data Encryption Using Tabu Search Algorithm
Saeed et al. A user-based trust model for cloud computing environment
CN107005576B (en) Generating bridging matching identifiers for linking identifiers from server logs
Bakro et al. Performance analysis of cloud computing encryption algorithms
Pan et al. An efficiency approach for RBAC reconfiguration with minimal roles and perturbation
CN113434906A (en) Data query method and device, computer equipment and storage medium
He et al. Analysis of trust-based access control using game theory
Jaithunbi et al. Preservation of Data Integrity in Public Cloud Using Enhanced Vigenere Cipher Based Obfuscation
Fiaz et al. Prediction of best cloud service provider using the QoS ranking framework
Chandramohan et al. HPPC-hierarchical Petri-net based privacy nominal model approach for cloud
US20190004999A1 (en) Information processing device, information processing system, and information processing method, and program
Swami et al. A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation
Han et al. Fully homomorphic privacy-preserving naive Bayes machine learning and classification
Wang et al. A trust-based evaluation model for data privacy protection in cloud computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant