CN107294708A - A kind of quantum key optimum allocation method and device based on message flow - Google Patents

A kind of quantum key optimum allocation method and device based on message flow Download PDF

Info

Publication number
CN107294708A
CN107294708A CN201710494502.8A CN201710494502A CN107294708A CN 107294708 A CN107294708 A CN 107294708A CN 201710494502 A CN201710494502 A CN 201710494502A CN 107294708 A CN107294708 A CN 107294708A
Authority
CN
China
Prior art keywords
communication service
service group
quantum key
key
message flow
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710494502.8A
Other languages
Chinese (zh)
Inventor
陈智雨
王栋
高德荃
李国春
王继业
魏晓菁
曾楠
赵子岩
王晋雄
吴冰
赵广怀
童文
葛冰玉
徐慧明
张素香
王怀宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
State Grid Beijing Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
State Grid Beijing Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd, State Grid Beijing Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201710494502.8A priority Critical patent/CN107294708A/en
Publication of CN107294708A publication Critical patent/CN107294708A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application provides a kind of quantum key optimum allocation method and device based on message flow, method includes:Obtain real-time quantum key supply, message flow and the actual quantum key consumption of communication service group;Using the real-time quantum key supply of communication service group, message flow and actual quantum key consumption, the optimal key magnitude of recruitment of communication service group is calculated;The quantum key amount of communication service group is supplemented using the optimal key magnitude of recruitment of communication service group.In this application, by improving the service efficiency of quantum key with upper type, and then the operational efficiency of quantum secret communication system is improved.

Description

A kind of quantum key optimum allocation method and device based on message flow
Technical field
The application is related to field of communication security, more particularly to a kind of quantum key optimum allocation method based on message flow And device.
Background technology
In the information age, it is ensured that the security and confidentiality of information are particularly important.Improving constantly the security of information Under the demand of confidentiality, Quantum Secure Communication is applied and given birth to.Quantum secret communication be using quantum key distribution technology as The private communication technology on basis.The uncertainty principle guarantee of the security of quantum secret communication quantum state in quantum mechanics, energy The encryption of communication unconditional security is ensured from principle.
In the actual application environment of quantum secret communication, quantum virtual private network gateway is using periodically acquisition fixed length The mode of key, is supplemented the size of key needed for each business, but may it is excessive in transmission services data traffic or When too small, there is the situation that size of key supplemented not enough or supplemented transition, influence the service efficiency of quantum key, and then influence quantum The operational efficiency of secret signalling.
The content of the invention
In order to solve the above technical problems, the embodiment of the present application provides a kind of quantum key optimum allocation based on message flow Method and device, to reach the service efficiency for improving quantum key, and then improves the operational efficiency of quantum secret communication system Purpose, technical scheme is as follows:
A kind of quantum key optimum allocation method based on message flow, including:
Obtain real-time quantum key supply, message flow and the actual quantum key consumption of communication service group;
Using the real-time quantum key supply of the communication service group, message flow and actual quantum key consumption, Calculate the optimal key magnitude of recruitment of the communication service group;
The quantum key amount of the communication service group is mended using the optimal key magnitude of recruitment of the communication service group Fill.
It is preferred that, the real-time quantum key supply of communication service group is obtained, including:
The real-time quantum that the communication service group is obtained from the virtual private network gateway of quantum secret communication system is close Key supply.
It is preferred that, the message flow of communication service group is obtained, including:
Utilize the D of relational expression onet=W1*n1j+W2*n2j+Wi*nij+…+Wn*nnjThe communication service group is calculated in the period Message flow in t, DtRepresent message flow of the communication service group in time period t, WiRepresent in the communication service group Block length of i-th of communication service when carrying out message encryption, nijExist for i-th of communication service in the communication service group Carry out packet group number during message encryption, n is integer not less than 1, i is not less than 1 and no more than n integer.
It is preferred that, the actual quantum key consumption of communication service group is obtained, including:
Utilize the X of relational expression twot=L1*n1j+L2*n2j+Li*nij+…+Ln*nnjThe communication service group is calculated in the period Actual quantum key consumption, X in ttRepresent the communication service group actual quantum key consumption, L in time period tiRepresent The key length for the AES consumption that i-th of communication service is used when carrying out message encryption, ni in the communication service groupj For packet group number of i-th of the communication service in the communication service group when carrying out message encryption, n is whole not less than 1 Number, i is not less than 1 and no more than n integer.
It is preferred that, utilize real-time quantum key supply, message flow and the actual quantum key of the communication service group Consumption, calculates the optimal key magnitude of recruitment of the communication service group, including:
It is more than default message flow threshold value, and the communication in message flow of the communication service group in time period t When the real-time quantum key supply of service groups is enough to support the data encryption in two time period ts, the Q=2* of relational expression three is utilized Xt- S calculates the optimal key magnitude of recruitment of the communication service group, and Q represents the optimal key magnitude of recruitment of the communication service group, Xt The communication service group actual quantum key consumption in time period t is represented, S represents the real-time quantum of the communication service group Key supply.
A kind of quantum key optimum allocation device based on message flow, including:
Acquisition module, real-time quantum key supply, message flow and the actual quantum for obtaining communication service group is close Key consumption;
Computing module, for real-time quantum key supply, message flow and the actual amount using the communication service group Sub-key consumption, calculates the optimal key magnitude of recruitment of the communication service group;
Complementary module, for quantum of the optimal key magnitude of recruitment using the communication service group to the communication service group Size of key is supplemented.
It is preferred that, the acquisition module includes:
First acquisition unit, for obtaining the communication industry from the virtual private network gateway of quantum secret communication system The real-time quantum key supply of business group.
It is preferred that, the acquisition module includes:
First computing unit, for utilizing the D of relational expression onet=W1*n1j+W2*n2j+Wi*nij+…+Wn*nnjCalculate described Message flow of the communication service group in time period t, DtRepresent message flow of the communication service group in time period t, WiTable Show block length of i-th of communication service when carrying out message encryption, ni in the communication service groupjFor the communication service group In packet group number of i-th of communication service when carrying out message encryption, n is integer not less than 1, and i is not less than 1 and not Integer more than n.
It is preferred that, the acquisition module includes:
Second computing unit, for utilizing the X of relational expression twot=L1*n1j+L2*n2j+Li*nij+…+Ln*nnjCalculate described Communication service group actual quantum key consumption, X in time period ttRepresent communication service group actual amount in time period t Sub-key consumption, LiRepresent that the encryption that i-th of communication service is used when carrying out message encryption in the communication service group is calculated The key length of method consumption, nijFor packet of i-th of the communication service in the communication service group when carrying out message encryption Group number, n is integer not less than 1, and i is not less than 1 and no more than n integer.
It is preferred that, the computing module includes:
3rd computing unit, is more than default message flow for the message flow in the communication service group in time period t Measure threshold value, and the real-time quantum key supply of the communication service group is when being enough to support the data encryption in two time period ts, Utilize the Q=2*X of relational expression threet- S calculates the optimal key magnitude of recruitment of the communication service group, and Q represents the communication service group Optimal key magnitude of recruitment, XtThe communication service group actual quantum key consumption in time period t is represented, S represents described logical The real-time quantum key supply of communication service group.
Compared with prior art, the application has the beneficial effect that:
In this application, by obtaining real-time quantum key supply, message flow and the actual quantum of communication service group Key consumption, and disappeared using real-time quantum key supply, message flow and the actual quantum key of the communication service group Consumption, calculates the optimal key magnitude of recruitment of the communication service group, realizes the adaptive adjustment to the magnitude of recruitment of quantum key, comes Adaptation service data transfer needs the size of key consumed, and the service efficiency of quantum key is improved with this, and then improves quantum guarantor The operational efficiency of close communication system.
Brief description of the drawings
In order to illustrate more clearly of the technical scheme in the embodiment of the present application, make required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present application, for For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings His accompanying drawing.
Fig. 1 is a kind of flow chart for the quantum key optimum allocation method based on message flow that the application is provided;
Fig. 2 is a kind of logical construction signal for the quantum key optimum allocation device based on message flow that the application is provided Figure.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out clear, complete Site preparation is described, it is clear that described embodiment is only some embodiments of the present application, rather than whole embodiments.It is based on Embodiment in the application, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of the application protection.
Fig. 1 is referred to, the one of the quantum key optimum allocation method based on message flow provided it illustrates the application Flow chart is planted, be may comprise steps of:
Step S11:Obtain real-time quantum key supply, message flow and the consumption of actual quantum key of communication service group Amount.
In the present embodiment, communication service group includes at least one communication service.
In the present embodiment, message flow refers to business data transmission flow.
It is understood that the real-time quantum key supply of communication service group is the amount supplied in real time to communication service group Sub-key amount, it is likely larger than actual quantum key consumption, it is also possible to less than actual quantum key consumption, it is also possible to be equal to Actual quantum key consumption., then can be according to the real-time quantum key supply and reality of communication service group in the present embodiment The size of quantum key consumption adjusts the magnitude of recruitment to the quantum key amount of communication service group, it is to avoid size of key supplement occur Inadequate or supplement transition situation.
Step S12:Utilize real-time quantum key supply, message flow and the actual quantum key of the communication service group Consumption, calculates the optimal key magnitude of recruitment of the communication service group.
Step S13:Using the optimal key magnitude of recruitment of the communication service group to the quantum key of the communication service group Amount is supplemented.
It should be noted that communication service group has a default key magnitude of recruitment, the optimal of communication service group is being determined After key magnitude of recruitment, the default key magnitude of recruitment and optimal key magnitude of recruitment of communication service group can be compared first, at both not Meanwhile, default key magnitude of recruitment is adjusted to optimal key magnitude of recruitment, when both are identical, default key magnitude of recruitment is directly used .
It is of course also possible to after optimal key magnitude of recruitment is determined, without the default key for comparing communication service group The operation of magnitude of recruitment and optimal key magnitude of recruitment, directly replaces with optimal key magnitude of recruitment, using most by default key magnitude of recruitment Excellent key magnitude of recruitment.
In this application, by obtaining real-time quantum key supply, message flow and the actual quantum of communication service group Key consumption, and disappeared using real-time quantum key supply, message flow and the actual quantum key of the communication service group Consumption, calculates the optimal key magnitude of recruitment of the communication service group, realizes the adaptive adjustment to the magnitude of recruitment of quantum key, comes Adaptation service data transfer needs the size of key consumed, and the service efficiency of quantum key is improved with this, and then improves quantum guarantor The operational efficiency of close communication system.
In the present embodiment, obtaining the detailed process of the real-time quantum key supply of communication service group can be:From quantum The real-time quantum key supply of the communication service group is obtained in the virtual private network gateway of secret signalling.
In the present embodiment, obtaining the detailed process of the message flow of communication service group can be:
Utilize the D of relational expression onet=W1*n1j+W2*n2j+Wi*nij+…+Wn*nnjThe communication service group is calculated in the period Message flow in t, DtRepresent message flow of the communication service group in time period t, WiRepresent in the communication service group Block length of i-th of communication service when carrying out message encryption, nijExist for i-th of communication service in the communication service group Carry out packet group number during message encryption, n is integer not less than 1, i is not less than 1 and no more than n integer.
Based on above-mentioned embodiment, obtaining the detailed process of the actual quantum key consumption of communication service group can be:
Utilize the X of relational expression twot=L1*n1j+L2*n2j+Li*nij+…+Ln*nnjThe communication service group is calculated in the period Actual quantum key consumption, X in ttRepresent the communication service group actual quantum key consumption, L in time period tiRepresent The key length for the AES consumption that i-th of communication service is used when carrying out message encryption, ni in the communication service groupj For packet group number of i-th of the communication service in the communication service group when carrying out message encryption, n is whole not less than 1 Number, i is not less than 1 and no more than n integer.
Based on above-mentioned embodiment, real-time quantum key supply, message flow and the reality of the communication service group are utilized Border quantum key consumption, calculating the detailed process of the optimal key magnitude of recruitment of the communication service group can be:
It is more than default message flow threshold value, and the communication in message flow of the communication service group in time period t When the real-time quantum key supply of service groups is enough to support the data encryption in two time period ts, the Q=2* of relational expression three is utilized Xt- S calculates the optimal key magnitude of recruitment of the communication service group, and Q represents the optimal key magnitude of recruitment of the communication service group, Xt The communication service group actual quantum key consumption in time period t is represented, S represents the real-time quantum of the communication service group Key supply.
, can be by comparing 2*X in the present embodimenttJudge that the real-time quantum key of communication service group is supplied with S size It should measure and whether be enough to support the data encryption in two time period ts, in 2*XtDuring less than S, illustrate the real-time amount of communication service group Sub-key supply is enough to support the data encryption in two time period ts, in 2*XtDuring not less than S, illustrate communication service group Real-time quantum key supply is not enough to support the data encryption in two time period ts.
It should be noted that the quantum key optimal distributing scheme based on message flow that the application is provided, equivalent to right The fixation alternate frequency of traditional quantum key is improved, and no longer carries out quantum key supplement using fixed alternate frequency, But by the real-time quantum key supply of communication service group, message flow and actual quantum key consumption, calculate described The optimal key magnitude of recruitment of communication service group, is supplemented when quantum key is required supplementation with, and need not supplement quantum key When do not supplement then, improve quantum key supplement flexibility.
It is corresponding with above method embodiment, present embodiments provide a kind of most optimal sorting of the quantum key based on message flow With device, Fig. 2 is referred to, the quantum key optimum allocation device based on message flow includes:Acquisition module 11, computing module 12 With complementary module 13.
Acquisition module 11, real-time quantum key supply, message flow and actual quantum for obtaining communication service group Key consumption.
In the present embodiment, communication service group includes at least one communication service.
In the present embodiment, message flow refers to business data transmission flow.
It is understood that the real-time quantum key supply of communication service group is the amount supplied in real time to communication service group Sub-key amount, it is likely larger than actual quantum key consumption, it is also possible to less than actual quantum key consumption, it is also possible to be equal to Actual quantum key consumption., then can be according to the real-time quantum key supply and reality of communication service group in the present embodiment The size of quantum key consumption adjusts the magnitude of recruitment to the quantum key amount of communication service group, it is to avoid size of key supplement occur Inadequate or supplement transition situation.
Computing module 12, for real-time quantum key supply, message flow and the reality using the communication service group Quantum key consumption, calculates the optimal key magnitude of recruitment of the communication service group.
Complementary module 13, for amount of the optimal key magnitude of recruitment using the communication service group to the communication service group Sub-key amount is supplemented.
It should be noted that communication service group has a default key magnitude of recruitment, the optimal of communication service group is being determined After key magnitude of recruitment, the default key magnitude of recruitment and optimal key magnitude of recruitment of communication service group can be compared first, at both not Meanwhile, default key magnitude of recruitment is adjusted to optimal key magnitude of recruitment, when both are identical, default key magnitude of recruitment is directly used .
It is of course also possible to after optimal key magnitude of recruitment is determined, without the default key for comparing communication service group The operation of magnitude of recruitment and optimal key magnitude of recruitment, directly replaces with optimal key magnitude of recruitment, using most by default key magnitude of recruitment Excellent key magnitude of recruitment.
In this application, by obtaining real-time quantum key supply, message flow and the actual quantum of communication service group Key consumption, and disappeared using real-time quantum key supply, message flow and the actual quantum key of the communication service group Consumption, calculates the optimal key magnitude of recruitment of the communication service group, realizes the adaptive adjustment to the magnitude of recruitment of quantum key, comes Adaptation service data transfer needs the size of key consumed, and the service efficiency of quantum key is improved with this, and then improves quantum guarantor The operational efficiency of close communication system.
In the present embodiment, acquisition module 11 can specifically include:First acquisition unit, for from quantum secret communication system The real-time quantum key supply of the communication service group is obtained in the virtual private network gateway of system.
In the present embodiment, acquisition module 11 can specifically include:First computing unit, for utilizing the D of relational expression onet= W1*n1j+W2*n2j+Wi*nij+…+Wn*nnjCalculate message flow of the communication service group in time period t, DtRepresent described Message flow of the communication service group in time period t, WiRepresent that i-th of communication service is carrying out message in the communication service group Block length during encryption, nijFor packet of i-th of the communication service in the communication service group when carrying out message encryption Group number, n is integer not less than 1, and i is not less than 1 and no more than n integer.
In the present embodiment, the acquisition module 11 can specifically include:Second computing unit, for utilizing relational expression two Xt=L1*n1j+L2*n2j+Li*nij+…+Ln*nnjCalculate the communication service group actual quantum key consumption in time period t Amount, XtRepresent the communication service group actual quantum key consumption, L in time period tiRepresent i-th in the communication service group The key length for the AES consumption that individual communication service is used when carrying out message encryption, nijFor in the communication service group Packet group number of i-th of communication service when carrying out message encryption, n is the integer not less than 1, and i is not less than 1 and little In n integer.
In the present embodiment, the computing module 12 can specifically include:3rd computing unit, in the communication industry Message flow of the business group in time period t is more than default message flow threshold value, and the real-time quantum key of the communication service group When supply is enough to support the data encryption in two time period ts, the Q=2*X of relational expression three is utilizedt- S calculates the communication service The optimal key magnitude of recruitment of group, Q represents the optimal key magnitude of recruitment of the communication service group, XtRepresent that the communication service group exists Actual quantum key consumption in time period t, S represents the real-time quantum key supply of the communication service group.
, can be by comparing 2*X in the present embodimenttJudge that the real-time quantum key of communication service group is supplied with S size It should measure and whether be enough to support the data encryption in two time period ts, in 2*XtDuring less than S, illustrate the real-time amount of communication service group Sub-key supply is enough to support the data encryption in two time period ts, in 2*XtDuring not less than S, illustrate communication service group Real-time quantum key supply is not enough to support the data encryption in two time period ts.
It should be noted that the quantum key optimal distributing scheme based on message flow that the application is provided, equivalent to right The fixation alternate frequency of traditional quantum key is improved, and no longer carries out quantum key supplement using fixed alternate frequency, But by the real-time quantum key supply of communication service group, message flow and actual quantum key consumption, calculate described The optimal key magnitude of recruitment of communication service group, is supplemented when quantum key is required supplementation with, and need not supplement quantum key When do not supplement then, improve quantum key supplement flexibility.
It should be noted that each embodiment in this specification is described by the way of progressive, each embodiment weight Point explanation be all between difference with other embodiment, each embodiment identical similar part mutually referring to. For device class embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is joined See the part explanation of embodiment of the method.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except also there is other identical element in the process including the key element, method, article or equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can Realized by the mode of software plus required general hardware platform.Understood based on such, the technical scheme essence of the application On the part that is contributed in other words to prior art can be embodied in the form of software product, the computer software product It can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are to cause a computer equipment (can be personal computer, server, or network equipment etc.) performs some of each embodiment of the application or embodiment Method described in part.
A kind of quantum key optimum allocation method and device based on message flow provided herein are carried out above It is discussed in detail, specific case used herein is set forth to the principle and embodiment of the application, above example Explanation be only intended to help and understand the present processes and its core concept;Simultaneously for those of ordinary skill in the art, According to the thought of the application, it will change in specific embodiments and applications, in summary, in this specification Hold the limitation that should not be construed as to the application.

Claims (10)

1. a kind of quantum key optimum allocation method based on message flow, it is characterised in that including:
Obtain real-time quantum key supply, message flow and the actual quantum key consumption of communication service group;
Using the real-time quantum key supply of the communication service group, message flow and actual quantum key consumption, calculate The optimal key magnitude of recruitment of the communication service group;
The quantum key amount of the communication service group is supplemented using the optimal key magnitude of recruitment of the communication service group.
2. according to the method described in claim 1, it is characterised in that obtain the real-time quantum key supply of communication service group, Including:
The real-time quantum key that the communication service group is obtained from the virtual private network gateway of quantum secret communication system is supplied Ying Liang.
3. method according to claim 2, it is characterised in that obtain the message flow of communication service group, including:
Utilize the D of relational expression onet=W1*n1j+W2*n2j+Wi*nij+…+Wn*nnjThe communication service group is calculated in time period t Message flow, DtRepresent message flow of the communication service group in time period t, WiRepresent i-th in the communication service group Block length of the individual communication service when carrying out message encryption, nijCarried out for i-th of communication service in the communication service group Packet group number during message encryption, n is integer not less than 1, and i is not less than 1 and no more than n integer.
4. method according to claim 3, it is characterised in that obtain the actual quantum key consumption of communication service group, Including:
Utilize the X of relational expression twot=L1*n1j+L2*n2j+Li*nij+…+Ln*nnjThe communication service group is calculated in time period t Actual quantum key consumption, XtRepresent the communication service group actual quantum key consumption, L in time period tiRepresent institute State the key length for the AES consumption that i-th of communication service in communication service group is used when carrying out message encryption, nijFor Packet group number of i-th of communication service when carrying out message encryption in the communication service group, n is the integer not less than 1, I is not less than 1 and no more than n integer.
5. method according to claim 4, it is characterised in that supplied using the real-time quantum key of the communication service group Amount, message flow and actual quantum key consumption, calculate the optimal key magnitude of recruitment of the communication service group, including:
It is more than default message flow threshold value, and the communication service in message flow of the communication service group in time period t When the real-time quantum key supply of group is enough to support the data encryption in two time period ts, the Q=2*X of relational expression three is utilizedt-S The optimal key magnitude of recruitment of the communication service group is calculated, Q represents the optimal key magnitude of recruitment of the communication service group, XtRepresent The communication service group actual quantum key consumption in time period t, S represents the real-time quantum key of the communication service group Supply.
6. a kind of quantum key optimum allocation device based on message flow, it is characterised in that including:
Acquisition module, real-time quantum key supply, message flow and actual quantum key for obtaining communication service group disappear Consumption;
Computing module, for close using the real-time quantum key supply of the communication service group, message flow and actual quantum Key consumption, calculates the optimal key magnitude of recruitment of the communication service group;
Complementary module, for quantum key of the optimal key magnitude of recruitment using the communication service group to the communication service group Amount is supplemented.
7. device according to claim 6, it is characterised in that the acquisition module includes:
First acquisition unit, for obtaining the communication service group from the virtual private network gateway of quantum secret communication system Real-time quantum key supply.
8. device according to claim 7, it is characterised in that the acquisition module includes:
First computing unit, for utilizing the D of relational expression onet=W1*n1j+W2*n2j+Wi*nij+…+Wn*nnjCalculate the communication Message flow of the service groups in time period t, DtRepresent message flow of the communication service group in time period t, WiRepresent institute State block length of i-th of communication service when carrying out message encryption, ni in communication service groupjFor in the communication service group Packet group number of the i communication service when carrying out message encryption, n is the integer not less than 1, and i is not less than 1 and is not more than N integer.
9. device according to claim 8, it is characterised in that the acquisition module includes:
Second computing unit, for utilizing the X of relational expression twot=L1*n1j+L2*n2j+Li*nij+…+Ln*nnjCalculate the communication Service groups actual quantum key consumption, X in time period ttRepresent that the communication service group actual quantum in time period t is close Key consumption, LiRepresent that the AES that i-th of communication service is used when carrying out message encryption in the communication service group disappears The key length of consumption, nijFor packet group of i-th of the communication service in the communication service group when carrying out message encryption Number, n is integer not less than 1, and i is not less than 1 and no more than n integer.
10. device according to claim 9, it is characterised in that the computing module includes:
3rd computing unit, is more than default message flow threshold for the message flow in the communication service group in time period t Value, and the real-time quantum key supply of the communication service group is when being enough to support the data encryption in two time period ts, utilizes The Q=2*X of relational expression threet- S calculates the optimal key magnitude of recruitment of the communication service group, and Q represents the optimal of the communication service group Key magnitude of recruitment, XtThe communication service group actual quantum key consumption in time period t is represented, S represents the communication industry The real-time quantum key supply of business group.
CN201710494502.8A 2017-06-26 2017-06-26 A kind of quantum key optimum allocation method and device based on message flow Pending CN107294708A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710494502.8A CN107294708A (en) 2017-06-26 2017-06-26 A kind of quantum key optimum allocation method and device based on message flow

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710494502.8A CN107294708A (en) 2017-06-26 2017-06-26 A kind of quantum key optimum allocation method and device based on message flow

Publications (1)

Publication Number Publication Date
CN107294708A true CN107294708A (en) 2017-10-24

Family

ID=60099031

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710494502.8A Pending CN107294708A (en) 2017-06-26 2017-06-26 A kind of quantum key optimum allocation method and device based on message flow

Country Status (1)

Country Link
CN (1) CN107294708A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109962775A (en) * 2017-12-22 2019-07-02 山东量子科学技术研究院有限公司 Quantum cryptography networks key generates control method
CN110149204A (en) * 2019-05-09 2019-08-20 北京邮电大学 The key resource allocation methods and system of QKD network
CN111147232A (en) * 2019-11-25 2020-05-12 北京邮电大学 QKD communication node and quantum key resource migration method and device thereof
CN112929168A (en) * 2021-02-05 2021-06-08 安徽华典大数据科技有限公司 Quantum-based key distribution method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840936A (en) * 2014-02-28 2014-06-04 山东量子科学技术研究院有限公司 Reliable encryption transmission system and method of quantum cryptography network
CN104486316A (en) * 2014-12-08 2015-04-01 国家电网公司 Quantum key classification providing method for improving electric power data transmission security

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103840936A (en) * 2014-02-28 2014-06-04 山东量子科学技术研究院有限公司 Reliable encryption transmission system and method of quantum cryptography network
CN104486316A (en) * 2014-12-08 2015-04-01 国家电网公司 Quantum key classification providing method for improving electric power data transmission security

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
丁兆富等: ""量子密钥消耗的攻击和防御"", 《量第十七届计算机工程与工艺年会暨第三届微处理器技术论坛论文集(上册)》 *
刘俊文等: ""量子通信技术在电力信息系统保密传输中的应用"", 《2016电力行业信息化年会论文集》 *
杨会科: ""量子保密通信网络的动态路由及纠缠贝尔态测量的研究"", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
陈智雨等: ""面向能源互联网的电力量子保密通信系统性能评估"", 《计算机研究与发展》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109962775A (en) * 2017-12-22 2019-07-02 山东量子科学技术研究院有限公司 Quantum cryptography networks key generates control method
CN110149204A (en) * 2019-05-09 2019-08-20 北京邮电大学 The key resource allocation methods and system of QKD network
CN111147232A (en) * 2019-11-25 2020-05-12 北京邮电大学 QKD communication node and quantum key resource migration method and device thereof
CN112929168A (en) * 2021-02-05 2021-06-08 安徽华典大数据科技有限公司 Quantum-based key distribution method

Similar Documents

Publication Publication Date Title
CN107294708A (en) A kind of quantum key optimum allocation method and device based on message flow
CN109377360B (en) Block chain asset transaction transfer method based on weighted threshold signature algorithm
CN105094956B (en) A kind of method for distributing business and device based on channel separation
CN101217528B (en) A link aggregation method and device
CN106131059A (en) A kind of network condition method for secret protection and system based on the car without certificate aggregate signature
CN105262591B (en) A kind of network service implementation method based on data
Asfia et al. Energy trading of electric vehicles using blockchain and smart contracts
CN103825834B (en) The method and network-switching equipment of flow load sharing are adjusted in a kind of EVI
CN104967693A (en) Document similarity calculation method facing cloud storage based on fully homomorphic password technology
CN105338208B (en) Unified bill charging method and system
Wang et al. Heuristic algorithms for packing of multiple-group multicasting
Dang et al. Resource-efficient secure data sharing for information centric e-health system using fog computing
CN101272338B (en) Method for port band width configuration on non-line speed interface plate and non-line speed interface plate
CN105915333B (en) A kind of efficient key distribution method based on encryption attribute
CN103401778B (en) Based on the multi-path transmission grouping scheduling method that receiving terminal cache overflow probability is ensured
CN107579925A (en) Message forwarding method and device
CN105376151B (en) The shunt method and system of ABtest platform
Zhao et al. Fuzzy identity-based dynamic auditing of big data on cloud storage
EP4052160A1 (en) Privacy preserving centroid models using secure multi-party computation
CN101848158A (en) Load balance method and device for data channels and network exchange equipment
CN103795621B (en) Virtual machine data exchange method and device, and physical host
CN108777626A (en) A kind of attribute base net network endorsement method for supporting dynamic attribute space
CN104378426A (en) Load balancing method for real-time information distribution system
CN106453132A (en) Dispatching method in hybrid cloud environment and flow control equipment
US20220261507A1 (en) Secure computation server, trail management method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171024

RJ01 Rejection of invention patent application after publication