CN108810016A - Terminal access authentication method based on quantum cryptography watermark - Google Patents
Terminal access authentication method based on quantum cryptography watermark Download PDFInfo
- Publication number
- CN108810016A CN108810016A CN201810754331.2A CN201810754331A CN108810016A CN 108810016 A CN108810016 A CN 108810016A CN 201810754331 A CN201810754331 A CN 201810754331A CN 108810016 A CN108810016 A CN 108810016A
- Authority
- CN
- China
- Prior art keywords
- quantum
- certification
- terminal
- fingerprint image
- quantum cryptography
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Image Processing (AREA)
- Storage Device Security (AREA)
Abstract
Terminal access authentication method based on quantum cryptography watermark, is related to field of quantum secure communication, and specific method is that certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;Quantum cryptography sub-control management module application quantum cryptography from the certification AM access module of certification access terminal to Alice transmitting terminal quantum cryptography processing gateways as quantum digital watermarking, be embedded into fingerprint image, generate certification fingerprint image;Certification fingerprint image is sent to authentication center's module of certification terminal by certification AM access module, and certification fingerprint image is decomposed into quantum digital watermarking and fingerprint image by authentication center's module;Quantum digital watermarking compares success with fingerprint image, and authentication center's module then receives certification access terminal access request.Failure is compared, then refuses the access request of certification access terminal.The present invention is combined quantum cryptography with digital watermark technology, to realize authentication still safe and reliable under quantum computer environment.
Description
Technical field
The present invention relates to field of quantum secure communication, more particularly to the terminal access authentication side based on quantum cryptography watermark
Method.
Background technology
The rapid development of computer networking technology, so that information has permeated the living environment around us.Protection information is pacified
Entirely also with regard to becoming one critical issue that must be solved of current era naturally, and identity identifying technology is then to realize information security
One of core technology.In present communications network, identity authorization system generally use asymmetric cryptosystem or symmetric cryptography body
Make two kinds of encryption systems.Wherein, the Crypted password in asymmetric cryptosystem and clear crytpographic key are different, and from Crypted password without
Method extrapolates clear crytpographic key, this makes clear crytpographic key have higher safety, but also recognizing using asymmetric cryptosystem
Card system can realize reliable authenticating user identification, and Crypted password can disclose, therefore the required password number in verification process
It measures less.DSE arithmetic uses symmetrical close then since password is shorter, encryption and decryption processing is simple, encryption/decryption speed is fast
The Verification System of code system has the advantages that certification is fireballing, can meet the primary demand of large scale network application.
But either asymmetric cryptosystem or DSE arithmetic, algorithms for encryption and decryption depend on answering for calculating
Miscellaneous degree.The high complexity of calculating ensures listener-in in the case of no key, can not complete to crack within the limited time
Required a large amount of calculating, to ensure information security.Quantum calculation can almost decode all at present by efficient computing capability
Traditional encryption method makes traditional Encryption Algorithm without Mi Kebao.The information security of Technique on Quantum Communication is based on quantum cryptology,
The constraint of conventional encryption methods is breached using quantum state as key, have can not eavesdrop, non-reproduction and theoretic
" Unconditional security ".Any intercepting and capturing or the operation of test quantum key, can all change quantum state, quantum communications can ensure
The absolute safety of encryption key distribution and communication between two places.
Invention content
Either asymmetric cryptosystem or DSE arithmetic, the classic algorithm in computer cryptology often utilize
Computation complexity or the mathematical problem that can not crack are placed obstacles to crack.It is clear that such algorithm all relies on complexity
Mathematical algorithm can not be in the password virtuous period that is, due to cracking rate-constrained in the computing capability of modern computer
Interior completion cracks.And the quantum computer with identical clock pulse speed gradually enters into reality, powerful calculating energy instantly
Power is combined with suitable quantum computer algorithm, can be made using the classic algorithm in computer cryptology as authentication
The system of safety curtain is disintegrated rapidly.
In view of such hidden danger, the truly random property of absolute safety and quantum cryptography based on quantum secret communication, the present invention
A kind of terminal access authentication method based on quantum cryptography watermark is proposed, quantum cryptography is combined with digital watermark technology, with
Realize authentication still safe and reliable under quantum computer environment.
The present invention adopts the following technical scheme that:Terminal access authentication method based on quantum cryptography watermark, which is characterized in that
This method use system include:Quantum cryptography generates network, Alice transmitting terminal quantum cryptographys processing gateway, Bob and receives looking somebody up and down
Sub- Cipher Processing gateway, certification access terminal and certification terminal,
The Alice transmitting terminals quantum cryptography processing gateway includes quantum cryptography sub-control management module and the first quantum cryptography
Processing module, wherein quantum cryptography sub-control management module are used to generate network application quantum cryptography to quantum cryptography, and to obtaining
Quantum cryptography preserved and managed, while quantum cryptography sub-control management module be additionally operable to response certification access terminal application
Quantum cryptography is asked;First quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure
Watermark, while being sent to certification access terminal;
The Bob receiving terminals quantum cryptography processing gateway includes quantum cryptography master control management module, at the second quantum cryptography
Module and quantum number watermark authentication module are managed, wherein quantum cryptography master control management module is for responding each Alice transmitting terminals
The application quantum password request of quantum cryptography processing gateway, quantum cryptography master control management module are additionally operable to preserve, manage and distribute
The quantum cryptography of corresponding A lice transmitting terminals in network is generated to quantum cryptography, responds the application quantum password request of certification terminal;
Second quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure watermark;Quantum number
Watermark authentication module is used for certification terminal quantum digital watermarking location information, and quantum number watermark authentication module is additionally operable to
It receives the quantum digital watermarking generated by the second quantum cryptography processing module and receives the quantum digital watermarking that certification terminal is sent,
And quantum number word watermark comparison is carried out, to certification terminal quantum digital watermarking comparison result;
The certification access terminal includes fingerprint image generation module and certification AM access module, and fingerprint image generation module is used
User fingerprints and fingerprint image is converted thereof into calling the roll of the contestants in athletic events;Certification AM access module is used to handle to Alice transmitting terminal quantum cryptographys
Quantum digital watermarking is embedded into fingerprint image generation certification fingerprint image, is sent to certification terminal by gateway application quantum cryptography
Certification fingerprint image, access request and certification terminal establish data connection;
Authentication center's module of the certification terminal is used to receive the access request of certification access terminal, receives Bob and receives
It looks sub- the quantum digital watermarking location information that Cipher Processing gateway is sent up and down, certification fingerprint image is decomposed into quantum digital watermarking
With fingerprint image, transfers the fingerprint image locally preserved and be compared with the fingerprint image of reception, it is close to Bob receiving terminal quantum
Code processing gateway quantum digital watermarking and the quantum digital watermarking for receiving the transmission of Bob receiving terminal quantum cryptography processing gateways
Comparison result carries out decision and reply to the access request of certification access terminal,
Specifically comprise the following steps:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;
2) certification access terminal sends application quantum password request to Alice transmitting terminal quantum cryptography processing gateways;
3) the application quantum cryptography that Alice transmitting terminals quantum cryptography processing gateway response certification access terminal is sent to is asked
It asks, while binaryzation conversion forming amount sub-figure watermark is carried out to quantum cryptography and is sent to certification access terminal;
4) certification access terminal receives the quantum digital watermarking that Alice transmitting terminal quantum cryptography processing gateways are sent to,
And the quantum digital watermarking is embedded into generation certification fingerprint image in fingerprint image described in step 1);
5) the certification fingerprint image described in step 4) is sent to certification terminal by certification access terminal, is accessed as certification
The access request of terminal access authentication terminal;
6) certification terminal receives the certification fingerprint image that certification access terminal is sent to, and certification fingerprint image is decomposed
For quantum digital watermarking and fingerprint image, the finger that the fingerprint image locally pre-saved is obtained with decomposition certification fingerprint image is transferred
Print image is compared, and after comparing successfully, certification terminal sends to Bob receiving terminal quantum cryptography processing gateways and decomposes certification fingerprint
The quantum digital watermarking that image obtains;
7) Bob receiving terminals quantum cryptography processing gateway receives the quantum digital watermarking that is sent to of certification terminal, and in it
The quantum digital watermarking in portion is compared;
8) quantum digital watermarking comparison result is fed back to certification terminal by Bob receiving terminals quantum cryptography processing gateway, is compared
Success, certification terminal receive certification access terminal access request, compare failure, and certification terminal refusal receives certification access terminal and connects
Enter request.
It includes a Bob receiving terminal and at least one Alice transmitting terminals, quantum cryptography life that the quantum cryptography, which generates network,
It is generated according to BB84 agreements between each Alice transmitting terminals in the Bob receiving terminals in network and quantum cryptography generation network
Quantum cryptography.
By above-mentioned design scheme, the present invention can bring following advantageous effect:The present invention proposes a kind of based on quantum
The terminal access authentication method of password watermark, the quantum secret communication system based on quantum-key distribution mechanism, which can generate, to be had
The security key of truly random property is applied in digital watermark technology the safety that can effectively improve watermarking algorithm and steady
Property.In addition fingerprint identification technology is also one of the core technology of information security.It user fingerprints and is pre-saved with immediately calling the roll of the contestants in athletic events
Fingerprint is compared, to verify true identity, principle be everyone fingerprint lines on image, breakpoint and crosspoint it is each not
It is identical, there is uniqueness and stability.Fingerprint identification technology and the digital watermark technology based on quantum cryptography are blended into progress
Authentication can greatly promote the safety of authentication.
Description of the drawings
The invention will be further described with specific implementation mode for explanation below in conjunction with the accompanying drawings:
Fig. 1 is that the present invention is based on the implementation schematic diagrames of the terminal access authentication method of quantum cryptography watermark;
Fig. 2 is that the present invention is based on the work flow diagrams of the terminal access authentication method of quantum cryptography watermark;
Fig. 3 is that certification access terminal establishes connection sequence diagram with certification terminal in the present invention;
Fig. 4 is the quantum cryptography structure chart of the present invention.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer with reference to specific embodiments and reference
Attached drawing, the present invention is described in further detail, in the present invention " first " and " second " that uses be not offered as any sequence,
Quantity or importance, and be used only to distinguish different component parts.
Shown in referring to Fig.1, the system of the terminal access authentication method use proposed by the present invention based on quantum cryptography watermark
Including:Quantum cryptography generate network, Alice transmitting terminal quantum cryptographys processing gateway, Bob receiving terminal quantum cryptographys processing gateway,
Certification access terminal and certification terminal, the dotted line that correspondence is wherein represented in figure are connected as quantum channel, solid line be connected as through
Allusion quotation channel.
Quantum cryptography generates network:It is dotted line coupling part in Fig. 1 that quantum cryptography, which generates network components, one of them
Quantum cryptography generates network, and only there are one Bob receiving terminals, but can have multiple Alice transmitting terminals.Bob receiving terminals are given birth to quantum cryptography
Unconditional reliable quantum cryptography can be generated according to BB84 agreements at each Alice transmitting terminals in network.
Alice transmitting terminal quantum cryptography processing gateways:Mainly there are quantum cryptography sub-control management module and the first quantum cryptography
Processing module, the main function of wherein quantum cryptography sub-control management module be to quantum cryptography generate network application quantum cryptography,
The quantum cryptography that preservation management generates quantum cryptography and response certification access terminal that network generates via quantum cryptography is asked.The
One quantum cryptography processing module has is converted to binary map and scramble production quantity sub-figure watermark by quantum cryptography, is sent to simultaneously
The function of certification access terminal.
Bob receiving terminal quantum cryptography processing gateways:Mainly there are quantum cryptography master control management module, the processing of the second quantum cryptography
Module and quantum number watermark authentication module, quantum cryptography master control management module have each Alice transmitting terminals quantum cryptography of response
The application quantum password request of processing gateway preserves, manages and is distributed to corresponding A lice hairs in quantum cryptography generation network respectively
Three functions of application quantum password request of the quantum cryptography and response certification terminal of sending end.Second quantum cryptography processing module has
Have and quantum cryptography be converted into binary map and scramble production quantity sub-figure watermark, the function of quantum number watermark authentication module be to
Certification terminal quantum digital watermarking location information receives the quantum number water generated by the second quantum cryptography processing module
Print receives the quantum digital watermarking that certification terminal is sent, and compares quantum digital watermarking and to certification terminal quantum number water
Print comparison result.
Certification access terminal:Mainly there are fingerprint image generation module and certification AM access module.Wherein, fingerprint image generates mould
Block, which can call the roll of the contestants in athletic events, user fingerprints and converts thereof into fingerprint image.And certification AM access module has to Alice transmitting terminal quantum cryptographys
Quantum digital watermarking is embedded into fingerprint image and generates certification fingerprint image, to certification terminal by processing gateway application quantum cryptography
It sends certification fingerprint image, access request and certification terminal and establishes the functions such as connection.
Certification terminal:Authentication center's module of certification terminal has the access request for receiving certification access terminal, receives Bob
Certification fingerprint image is decomposed into quantum number by the quantum number watermark location information that receiving terminal quantum cryptography processing gateway is sent
Watermark and fingerprint image are transferred the fingerprint image locally pre-saved and are compared with the fingerprint image of reception, are received to Bob
It looks sub- Cipher Processing gateway quantum digital watermarking up and down and receives Bob and look sub- the quantum number that Cipher Processing gateway is sent up and down
Watermark comparison result carries out the functions such as decision and reply to the access request of certification access terminal.
Terminal access authentication method proposed by the present invention based on quantum cryptography watermark, specifically comprises the following steps:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;
2) certification access terminal sends application quantum password request to Alice transmitting terminal quantum cryptography processing gateways;
3) the application quantum cryptography that Alice transmitting terminals quantum cryptography processing gateway response certification access terminal is sent to is asked
It asks, while binaryzation conversion forming amount sub-figure watermark is carried out to quantum cryptography and is sent to certification access terminal;
4) certification access terminal receives the quantum digital watermarking that Alice transmitting terminal quantum cryptography processing gateways are sent to,
And the quantum digital watermarking is embedded into generation certification fingerprint image in fingerprint image described in step 1);
5) the certification fingerprint image described in step 4) is sent to certification terminal by certification access terminal, is accessed as certification
The access request of terminal access authentication terminal;
6) certification terminal receives the certification fingerprint image that certification access terminal is sent to, and certification fingerprint image is decomposed
For quantum digital watermarking and fingerprint image, the finger that the fingerprint image locally pre-saved is obtained with decomposition certification fingerprint image is transferred
Print image is compared, and after comparing successfully, certification terminal sends to Bob receiving terminal quantum cryptography processing gateways and decomposes certification fingerprint
The quantum digital watermarking that image obtains;
7) Bob receiving terminals quantum cryptography processing gateway receives the quantum digital watermarking that is sent to of certification terminal, and in it
The quantum digital watermarking in portion is compared;
8) quantum digital watermarking comparison result is fed back to certification terminal by Bob receiving terminals quantum cryptography processing gateway, is compared
Success, certification terminal receive certification access terminal access request, compare failure, and certification terminal refusal receives certification access terminal and connects
Enter request.
The present invention is based on the work flow diagrams of the terminal access authentication method of quantum cryptography watermark, as shown in Fig. 2, specific stream
Steps are as follows for journey:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, is passed through fingerprint image generation module and is generated the fingerprint with finger print information
Image, and wake up certification AM access module;
2) the certification AM access module of certification access terminal divides to the quantum cryptography of Alice transmitting terminal quantum cryptography processing gateways
Management module application quantum cryptography is controlled as quantum digital watermarking, is embedded into fingerprint image, certification fingerprint image is generated;
3) certification fingerprint image is sent to authentication center's module of certification terminal by certification AM access module by classical channel,
Certification fingerprint image is decomposed into quantum digital watermarking and fingerprint image by authentication center's module;
4) quantum digital watermarking compares success with fingerprint image, and authentication center's module then receives the access of certification access terminal
Request.Failure is compared, then refuses the access request of certification access terminal.
Fig. 3 shows that certification access terminal establishes connection sequence diagram with certification terminal, and steps are as follows for detailed process:
1) fingerprint image wakes up the certification AM access module of certification access terminal;
2) the certification AM access module of certification access terminal divides to the quantum cryptography of Alice transmitting terminal quantum cryptography processing gateways
Control management module quantum password application;
3) the quantum cryptography sub-control management module of Alice transmitting terminals quantum cryptography processing gateway is using quantum cryptography as quantum
After digital watermarking scramble certification access terminal is sent jointly to quantum digital watermarking embedded position information;
4) after quantum digital watermarking is embedded into fingerprint image by certification access terminal, certification fingerprint image is generated;
5) certification access terminal sends certification fingerprint image, and connection application is established to the submission of certification terminal;
6) after certification terminal receives certification fingerprint image, the amount of Bob receiving terminal quantum cryptography processing gateways transmission is utilized
Certification fingerprint image is decomposed into fingerprint image and quantum digital watermarking by sub- password embedded position information;
7) after certification terminal-pair fingerprint image is compared successfully, quantum digital watermarking is sent to Bob receiving terminal quantum
Cipher Processing gateway;
8) quantum digital watermarking is compared and is tied by the quantum cryptography master control management module of Bob receiving terminals quantum cryptography processing gateway
Fruit information feeds back to certification terminal;
9) if quantum digital watermarking comparison result information is successfully, to establish connection;If result is failure, refuse to establish
Connection request.
The quantum cryptography structure chart of terminal access authentication method based on quantum cryptography watermark, as shown in figure 4, illustrating
It is as follows:
1) a quantum cryptography that be used to verify should have the n × position (m+1) character, be divided into n part, per part (m+
1) position character;
2) the preceding m characters per part are as quantum digital watermarking embedded position information, and the position (m+1) character is as generation
The pixel value of quantum digital watermarking;
3) to sum up, the quantum cryptography of a position (n × m+n) character produces a quantum number with n pixel
Watermark, and each pixel has its corresponding m character quantum cryptography to be embedded in the location information of fingerprint image as it.
Claims (2)
1. the terminal access authentication method based on quantum cryptography watermark, which is characterized in that this method use system include:Quantum
Password generates network, Alice transmitting terminal quantum cryptographys processing gateway, Bob receiving terminal quantum cryptographys processing gateway, certification access eventually
End and certification terminal,
The Alice transmitting terminals quantum cryptography processing gateway includes that quantum cryptography sub-control management module and the first quantum cryptography are handled
Module, wherein quantum cryptography sub-control management module are used to generate network application quantum cryptography to quantum cryptography, and to the amount of acquisition
Sub- password is preserved and is managed, while quantum cryptography sub-control management module is additionally operable to the application quantum of response certification access terminal
Password request;First quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure water
Print, while being sent to certification access terminal;
The Bob receiving terminals quantum cryptography processing gateway includes quantum cryptography master control management module, the second quantum cryptography processing mould
Block and quantum number watermark authentication module, wherein quantum cryptography master control management module are for responding each Alice transmitting terminals quantum
The application quantum password request of Cipher Processing gateway, quantum cryptography master control management module is additionally operable to preserve, manages and the amount of being distributed to
Sub- password generates the quantum cryptography of corresponding A lice transmitting terminals in network, responds the application quantum password request of certification terminal;Second
Quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure watermark;Quantum digital watermarking
Authentication module is used for certification terminal quantum digital watermarking location information, and quantum number watermark authentication module is additionally operable to receive
The quantum digital watermarking that the quantum digital watermarking and reception certification terminal generated by the second quantum cryptography processing module is sent, goes forward side by side
Row quantum digital watermarking compares, to certification terminal quantum digital watermarking comparison result;
The certification access terminal includes fingerprint image generation module and certification AM access module, and fingerprint image generation module is for examining
Record user fingerprints simultaneously convert thereof into fingerprint image;Certification AM access module is used for Alice transmitting terminal quantum cryptography processing gateways
Quantum digital watermarking is embedded into fingerprint image generation certification fingerprint image, sends certification to certification terminal by application quantum cryptography
Fingerprint image, access request and certification terminal establish data connection;
Authentication center's module of the certification terminal is used to receive the access request of certification access terminal, receives Bob and receives looking somebody up and down
Certification fingerprint image is decomposed into quantum digital watermarking and referred to by the quantum digital watermarking location information that sub- Cipher Processing gateway is sent
Print image is transferred the fingerprint image locally preserved and is compared with the fingerprint image of reception, at Bob receiving terminal quantum cryptographys
It manages the digital watermarking of gateway quantum and receives the quantum digital watermarking that Bob receiving terminal quantum cryptography processing gateways are sent and compare
As a result, the access request to certification access terminal carries out decision and reply,
Specifically comprise the following steps:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;
2) certification access terminal sends application quantum password request to Alice transmitting terminal quantum cryptography processing gateways;
3) the application quantum password request that Alice transmitting terminals quantum cryptography processing gateway response certification access terminal is sent to,
Binaryzation conversion forming amount sub-figure watermark is carried out to quantum cryptography simultaneously and is sent to certification access terminal;
4) certification access terminal receives the quantum digital watermarking that Alice transmitting terminal quantum cryptography processing gateways are sent to, and will
The quantum digital watermarking is embedded into generation certification fingerprint image in fingerprint image described in step 1);
5) the certification fingerprint image described in step 4) is sent to certification terminal by certification access terminal, as certification access terminal
The access request of access authentication terminal;
6) certification terminal receives the certification fingerprint image that is sent to of certification access terminal, and by the certification fingerprint image amount of being decomposed into
Sub-figure watermark and fingerprint image transfer the fingerprint image that the fingerprint image locally pre-saved is obtained with decomposition certification fingerprint image
As being compared, after comparing successfully, certification terminal sends to Bob receiving terminal quantum cryptography processing gateways and decomposes certification fingerprint image
Obtained quantum digital watermarking;
7) Bob receiving terminals quantum cryptography processing gateway receives the quantum digital watermarking that certification terminal is sent to, with its inside
Quantum digital watermarking is compared;
8) quantum digital watermarking comparison result is fed back to certification terminal by Bob receiving terminals quantum cryptography processing gateway, is compared successfully,
Certification terminal receives certification access terminal access request, compares failure, and certification terminal refusal, which receives the access of certification access terminal, asks
It asks.
2. the terminal access authentication method according to claim 1 based on quantum cryptography watermark, it is characterised in that:The amount
It includes a Bob receiving terminal and at least one Alice transmitting terminals that sub- password, which generates network, and quantum cryptography generates the Bob in network
Between each Alice transmitting terminals in receiving terminal and quantum cryptography generation network quantum cryptography is generated according to BB84 agreements.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810754331.2A CN108810016B (en) | 2018-07-11 | 2018-07-11 | Terminal access authentication method based on quantum cipher watermark |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810754331.2A CN108810016B (en) | 2018-07-11 | 2018-07-11 | Terminal access authentication method based on quantum cipher watermark |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108810016A true CN108810016A (en) | 2018-11-13 |
CN108810016B CN108810016B (en) | 2020-08-28 |
Family
ID=64074827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810754331.2A Active CN108810016B (en) | 2018-07-11 | 2018-07-11 | Terminal access authentication method based on quantum cipher watermark |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108810016B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995785A (en) * | 2019-04-04 | 2019-07-09 | 长春大学 | File security unlocking method in local area network based on quantum cryptography |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009047833A1 (en) * | 2007-10-09 | 2009-04-16 | C4 Technology, Inc. | Electronic watermark embedding method, electronic watermark embedding apparatus, program, and computer-readable recording medium |
CN102750529A (en) * | 2012-07-24 | 2012-10-24 | 南京邮电大学 | Biometric fingerprint authentication method based on quantum fuzzy commitment |
CN103366334A (en) * | 2013-07-10 | 2013-10-23 | 北京工业大学 | Quantum watermark authentication method based on quantum discrete cosine transform (QDCT) |
CN105323064A (en) * | 2014-07-01 | 2016-02-10 | 柯呈翰 | System and method for on-line adding of instant file dynamic label and on-line encryption |
CN107257283A (en) * | 2017-04-26 | 2017-10-17 | 中南大学 | Fingerprint verification method based on quantum figure state |
-
2018
- 2018-07-11 CN CN201810754331.2A patent/CN108810016B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009047833A1 (en) * | 2007-10-09 | 2009-04-16 | C4 Technology, Inc. | Electronic watermark embedding method, electronic watermark embedding apparatus, program, and computer-readable recording medium |
CN102750529A (en) * | 2012-07-24 | 2012-10-24 | 南京邮电大学 | Biometric fingerprint authentication method based on quantum fuzzy commitment |
CN103366334A (en) * | 2013-07-10 | 2013-10-23 | 北京工业大学 | Quantum watermark authentication method based on quantum discrete cosine transform (QDCT) |
CN105323064A (en) * | 2014-07-01 | 2016-02-10 | 柯呈翰 | System and method for on-line adding of instant file dynamic label and on-line encryption |
CN107257283A (en) * | 2017-04-26 | 2017-10-17 | 中南大学 | Fingerprint verification method based on quantum figure state |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109995785A (en) * | 2019-04-04 | 2019-07-09 | 长春大学 | File security unlocking method in local area network based on quantum cryptography |
CN109995785B (en) * | 2019-04-04 | 2021-02-09 | 长春大学 | Quantum password-based method for safely unlocking files in local area network |
Also Published As
Publication number | Publication date |
---|---|
CN108810016B (en) | 2020-08-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6535980B1 (en) | Keyless encryption of messages using challenge response | |
US7017182B2 (en) | Method of securely transmitting information | |
CN106789047A (en) | A kind of block chain identification system | |
WO2014029169A1 (en) | Communication method utilizing fingerprint information for authentication | |
CN103124269A (en) | Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment | |
Ogiela et al. | Biometric methods for advanced strategic data sharing protocols | |
IL292177A (en) | Digital signature generation using a cold wallet | |
Panchal et al. | Comparable features and same cryptography key generation using biometric fingerprint image | |
CN111177763A (en) | Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption | |
KR20180135779A (en) | Method for digital signature based on quantum key distribution and system performing the same | |
CN104618113B (en) | The method that the authentication of a kind of mobile terminal and safe lane are set up | |
CN104715537A (en) | Encryption and decryption method based on digital tags | |
CN112243233A (en) | CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol | |
CN111541652B (en) | System for improving security of secret information keeping and transmission | |
CN108810016A (en) | Terminal access authentication method based on quantum cryptography watermark | |
CN102413148B (en) | Biological characteristic remote authentication method based on visual codes | |
US20020017781A1 (en) | Seat belt guide | |
Ardhianto et al. | Design Securing Online Payment Transactions Using Stegblock Through Network Layers | |
CN110490051A (en) | Iris authentication system and method | |
CN112637442B (en) | Method and device for encrypting circulating images by cloud server and local end | |
CN107819751A (en) | A kind of safe automated log on management system | |
CN112788046A (en) | Method and system for encrypting transmission information | |
Abduljabbar et al. | Robust scheme to protect authentication code of message/image documents in cloud computing | |
Panchal | Bio-Crypto System | |
Ingle et al. | Using Advanced Encryption Standard (AES) Algorithm Upgrade the Security Level of ATM Banking Systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |