CN108810016A - Terminal access authentication method based on quantum cryptography watermark - Google Patents

Terminal access authentication method based on quantum cryptography watermark Download PDF

Info

Publication number
CN108810016A
CN108810016A CN201810754331.2A CN201810754331A CN108810016A CN 108810016 A CN108810016 A CN 108810016A CN 201810754331 A CN201810754331 A CN 201810754331A CN 108810016 A CN108810016 A CN 108810016A
Authority
CN
China
Prior art keywords
quantum
certification
terminal
fingerprint image
quantum cryptography
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810754331.2A
Other languages
Chinese (zh)
Other versions
CN108810016B (en
Inventor
吴佳楠
张迪
田甜
宋立军
朱德新
黄超
刘兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University
Original Assignee
Changchun University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University filed Critical Changchun University
Priority to CN201810754331.2A priority Critical patent/CN108810016B/en
Publication of CN108810016A publication Critical patent/CN108810016A/en
Application granted granted Critical
Publication of CN108810016B publication Critical patent/CN108810016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Image Processing (AREA)
  • Storage Device Security (AREA)

Abstract

Terminal access authentication method based on quantum cryptography watermark, is related to field of quantum secure communication, and specific method is that certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;Quantum cryptography sub-control management module application quantum cryptography from the certification AM access module of certification access terminal to Alice transmitting terminal quantum cryptography processing gateways as quantum digital watermarking, be embedded into fingerprint image, generate certification fingerprint image;Certification fingerprint image is sent to authentication center's module of certification terminal by certification AM access module, and certification fingerprint image is decomposed into quantum digital watermarking and fingerprint image by authentication center's module;Quantum digital watermarking compares success with fingerprint image, and authentication center's module then receives certification access terminal access request.Failure is compared, then refuses the access request of certification access terminal.The present invention is combined quantum cryptography with digital watermark technology, to realize authentication still safe and reliable under quantum computer environment.

Description

Terminal access authentication method based on quantum cryptography watermark
Technical field
The present invention relates to field of quantum secure communication, more particularly to the terminal access authentication side based on quantum cryptography watermark Method.
Background technology
The rapid development of computer networking technology, so that information has permeated the living environment around us.Protection information is pacified Entirely also with regard to becoming one critical issue that must be solved of current era naturally, and identity identifying technology is then to realize information security One of core technology.In present communications network, identity authorization system generally use asymmetric cryptosystem or symmetric cryptography body Make two kinds of encryption systems.Wherein, the Crypted password in asymmetric cryptosystem and clear crytpographic key are different, and from Crypted password without Method extrapolates clear crytpographic key, this makes clear crytpographic key have higher safety, but also recognizing using asymmetric cryptosystem Card system can realize reliable authenticating user identification, and Crypted password can disclose, therefore the required password number in verification process It measures less.DSE arithmetic uses symmetrical close then since password is shorter, encryption and decryption processing is simple, encryption/decryption speed is fast The Verification System of code system has the advantages that certification is fireballing, can meet the primary demand of large scale network application.
But either asymmetric cryptosystem or DSE arithmetic, algorithms for encryption and decryption depend on answering for calculating Miscellaneous degree.The high complexity of calculating ensures listener-in in the case of no key, can not complete to crack within the limited time Required a large amount of calculating, to ensure information security.Quantum calculation can almost decode all at present by efficient computing capability Traditional encryption method makes traditional Encryption Algorithm without Mi Kebao.The information security of Technique on Quantum Communication is based on quantum cryptology, The constraint of conventional encryption methods is breached using quantum state as key, have can not eavesdrop, non-reproduction and theoretic " Unconditional security ".Any intercepting and capturing or the operation of test quantum key, can all change quantum state, quantum communications can ensure The absolute safety of encryption key distribution and communication between two places.
Invention content
Either asymmetric cryptosystem or DSE arithmetic, the classic algorithm in computer cryptology often utilize Computation complexity or the mathematical problem that can not crack are placed obstacles to crack.It is clear that such algorithm all relies on complexity Mathematical algorithm can not be in the password virtuous period that is, due to cracking rate-constrained in the computing capability of modern computer Interior completion cracks.And the quantum computer with identical clock pulse speed gradually enters into reality, powerful calculating energy instantly Power is combined with suitable quantum computer algorithm, can be made using the classic algorithm in computer cryptology as authentication The system of safety curtain is disintegrated rapidly.
In view of such hidden danger, the truly random property of absolute safety and quantum cryptography based on quantum secret communication, the present invention A kind of terminal access authentication method based on quantum cryptography watermark is proposed, quantum cryptography is combined with digital watermark technology, with Realize authentication still safe and reliable under quantum computer environment.
The present invention adopts the following technical scheme that:Terminal access authentication method based on quantum cryptography watermark, which is characterized in that This method use system include:Quantum cryptography generates network, Alice transmitting terminal quantum cryptographys processing gateway, Bob and receives looking somebody up and down Sub- Cipher Processing gateway, certification access terminal and certification terminal,
The Alice transmitting terminals quantum cryptography processing gateway includes quantum cryptography sub-control management module and the first quantum cryptography Processing module, wherein quantum cryptography sub-control management module are used to generate network application quantum cryptography to quantum cryptography, and to obtaining Quantum cryptography preserved and managed, while quantum cryptography sub-control management module be additionally operable to response certification access terminal application Quantum cryptography is asked;First quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure Watermark, while being sent to certification access terminal;
The Bob receiving terminals quantum cryptography processing gateway includes quantum cryptography master control management module, at the second quantum cryptography Module and quantum number watermark authentication module are managed, wherein quantum cryptography master control management module is for responding each Alice transmitting terminals The application quantum password request of quantum cryptography processing gateway, quantum cryptography master control management module are additionally operable to preserve, manage and distribute The quantum cryptography of corresponding A lice transmitting terminals in network is generated to quantum cryptography, responds the application quantum password request of certification terminal; Second quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure watermark;Quantum number Watermark authentication module is used for certification terminal quantum digital watermarking location information, and quantum number watermark authentication module is additionally operable to It receives the quantum digital watermarking generated by the second quantum cryptography processing module and receives the quantum digital watermarking that certification terminal is sent, And quantum number word watermark comparison is carried out, to certification terminal quantum digital watermarking comparison result;
The certification access terminal includes fingerprint image generation module and certification AM access module, and fingerprint image generation module is used User fingerprints and fingerprint image is converted thereof into calling the roll of the contestants in athletic events;Certification AM access module is used to handle to Alice transmitting terminal quantum cryptographys Quantum digital watermarking is embedded into fingerprint image generation certification fingerprint image, is sent to certification terminal by gateway application quantum cryptography Certification fingerprint image, access request and certification terminal establish data connection;
Authentication center's module of the certification terminal is used to receive the access request of certification access terminal, receives Bob and receives It looks sub- the quantum digital watermarking location information that Cipher Processing gateway is sent up and down, certification fingerprint image is decomposed into quantum digital watermarking With fingerprint image, transfers the fingerprint image locally preserved and be compared with the fingerprint image of reception, it is close to Bob receiving terminal quantum Code processing gateway quantum digital watermarking and the quantum digital watermarking for receiving the transmission of Bob receiving terminal quantum cryptography processing gateways Comparison result carries out decision and reply to the access request of certification access terminal,
Specifically comprise the following steps:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;
2) certification access terminal sends application quantum password request to Alice transmitting terminal quantum cryptography processing gateways;
3) the application quantum cryptography that Alice transmitting terminals quantum cryptography processing gateway response certification access terminal is sent to is asked It asks, while binaryzation conversion forming amount sub-figure watermark is carried out to quantum cryptography and is sent to certification access terminal;
4) certification access terminal receives the quantum digital watermarking that Alice transmitting terminal quantum cryptography processing gateways are sent to, And the quantum digital watermarking is embedded into generation certification fingerprint image in fingerprint image described in step 1);
5) the certification fingerprint image described in step 4) is sent to certification terminal by certification access terminal, is accessed as certification The access request of terminal access authentication terminal;
6) certification terminal receives the certification fingerprint image that certification access terminal is sent to, and certification fingerprint image is decomposed For quantum digital watermarking and fingerprint image, the finger that the fingerprint image locally pre-saved is obtained with decomposition certification fingerprint image is transferred Print image is compared, and after comparing successfully, certification terminal sends to Bob receiving terminal quantum cryptography processing gateways and decomposes certification fingerprint The quantum digital watermarking that image obtains;
7) Bob receiving terminals quantum cryptography processing gateway receives the quantum digital watermarking that is sent to of certification terminal, and in it The quantum digital watermarking in portion is compared;
8) quantum digital watermarking comparison result is fed back to certification terminal by Bob receiving terminals quantum cryptography processing gateway, is compared Success, certification terminal receive certification access terminal access request, compare failure, and certification terminal refusal receives certification access terminal and connects Enter request.
It includes a Bob receiving terminal and at least one Alice transmitting terminals, quantum cryptography life that the quantum cryptography, which generates network, It is generated according to BB84 agreements between each Alice transmitting terminals in the Bob receiving terminals in network and quantum cryptography generation network Quantum cryptography.
By above-mentioned design scheme, the present invention can bring following advantageous effect:The present invention proposes a kind of based on quantum The terminal access authentication method of password watermark, the quantum secret communication system based on quantum-key distribution mechanism, which can generate, to be had The security key of truly random property is applied in digital watermark technology the safety that can effectively improve watermarking algorithm and steady Property.In addition fingerprint identification technology is also one of the core technology of information security.It user fingerprints and is pre-saved with immediately calling the roll of the contestants in athletic events Fingerprint is compared, to verify true identity, principle be everyone fingerprint lines on image, breakpoint and crosspoint it is each not It is identical, there is uniqueness and stability.Fingerprint identification technology and the digital watermark technology based on quantum cryptography are blended into progress Authentication can greatly promote the safety of authentication.
Description of the drawings
The invention will be further described with specific implementation mode for explanation below in conjunction with the accompanying drawings:
Fig. 1 is that the present invention is based on the implementation schematic diagrames of the terminal access authentication method of quantum cryptography watermark;
Fig. 2 is that the present invention is based on the work flow diagrams of the terminal access authentication method of quantum cryptography watermark;
Fig. 3 is that certification access terminal establishes connection sequence diagram with certification terminal in the present invention;
Fig. 4 is the quantum cryptography structure chart of the present invention.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer with reference to specific embodiments and reference Attached drawing, the present invention is described in further detail, in the present invention " first " and " second " that uses be not offered as any sequence, Quantity or importance, and be used only to distinguish different component parts.
Shown in referring to Fig.1, the system of the terminal access authentication method use proposed by the present invention based on quantum cryptography watermark Including:Quantum cryptography generate network, Alice transmitting terminal quantum cryptographys processing gateway, Bob receiving terminal quantum cryptographys processing gateway, Certification access terminal and certification terminal, the dotted line that correspondence is wherein represented in figure are connected as quantum channel, solid line be connected as through Allusion quotation channel.
Quantum cryptography generates network:It is dotted line coupling part in Fig. 1 that quantum cryptography, which generates network components, one of them Quantum cryptography generates network, and only there are one Bob receiving terminals, but can have multiple Alice transmitting terminals.Bob receiving terminals are given birth to quantum cryptography Unconditional reliable quantum cryptography can be generated according to BB84 agreements at each Alice transmitting terminals in network.
Alice transmitting terminal quantum cryptography processing gateways:Mainly there are quantum cryptography sub-control management module and the first quantum cryptography Processing module, the main function of wherein quantum cryptography sub-control management module be to quantum cryptography generate network application quantum cryptography, The quantum cryptography that preservation management generates quantum cryptography and response certification access terminal that network generates via quantum cryptography is asked.The One quantum cryptography processing module has is converted to binary map and scramble production quantity sub-figure watermark by quantum cryptography, is sent to simultaneously The function of certification access terminal.
Bob receiving terminal quantum cryptography processing gateways:Mainly there are quantum cryptography master control management module, the processing of the second quantum cryptography Module and quantum number watermark authentication module, quantum cryptography master control management module have each Alice transmitting terminals quantum cryptography of response The application quantum password request of processing gateway preserves, manages and is distributed to corresponding A lice hairs in quantum cryptography generation network respectively Three functions of application quantum password request of the quantum cryptography and response certification terminal of sending end.Second quantum cryptography processing module has Have and quantum cryptography be converted into binary map and scramble production quantity sub-figure watermark, the function of quantum number watermark authentication module be to Certification terminal quantum digital watermarking location information receives the quantum number water generated by the second quantum cryptography processing module Print receives the quantum digital watermarking that certification terminal is sent, and compares quantum digital watermarking and to certification terminal quantum number water Print comparison result.
Certification access terminal:Mainly there are fingerprint image generation module and certification AM access module.Wherein, fingerprint image generates mould Block, which can call the roll of the contestants in athletic events, user fingerprints and converts thereof into fingerprint image.And certification AM access module has to Alice transmitting terminal quantum cryptographys Quantum digital watermarking is embedded into fingerprint image and generates certification fingerprint image, to certification terminal by processing gateway application quantum cryptography It sends certification fingerprint image, access request and certification terminal and establishes the functions such as connection.
Certification terminal:Authentication center's module of certification terminal has the access request for receiving certification access terminal, receives Bob Certification fingerprint image is decomposed into quantum number by the quantum number watermark location information that receiving terminal quantum cryptography processing gateway is sent Watermark and fingerprint image are transferred the fingerprint image locally pre-saved and are compared with the fingerprint image of reception, are received to Bob It looks sub- Cipher Processing gateway quantum digital watermarking up and down and receives Bob and look sub- the quantum number that Cipher Processing gateway is sent up and down Watermark comparison result carries out the functions such as decision and reply to the access request of certification access terminal.
Terminal access authentication method proposed by the present invention based on quantum cryptography watermark, specifically comprises the following steps:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;
2) certification access terminal sends application quantum password request to Alice transmitting terminal quantum cryptography processing gateways;
3) the application quantum cryptography that Alice transmitting terminals quantum cryptography processing gateway response certification access terminal is sent to is asked It asks, while binaryzation conversion forming amount sub-figure watermark is carried out to quantum cryptography and is sent to certification access terminal;
4) certification access terminal receives the quantum digital watermarking that Alice transmitting terminal quantum cryptography processing gateways are sent to, And the quantum digital watermarking is embedded into generation certification fingerprint image in fingerprint image described in step 1);
5) the certification fingerprint image described in step 4) is sent to certification terminal by certification access terminal, is accessed as certification The access request of terminal access authentication terminal;
6) certification terminal receives the certification fingerprint image that certification access terminal is sent to, and certification fingerprint image is decomposed For quantum digital watermarking and fingerprint image, the finger that the fingerprint image locally pre-saved is obtained with decomposition certification fingerprint image is transferred Print image is compared, and after comparing successfully, certification terminal sends to Bob receiving terminal quantum cryptography processing gateways and decomposes certification fingerprint The quantum digital watermarking that image obtains;
7) Bob receiving terminals quantum cryptography processing gateway receives the quantum digital watermarking that is sent to of certification terminal, and in it The quantum digital watermarking in portion is compared;
8) quantum digital watermarking comparison result is fed back to certification terminal by Bob receiving terminals quantum cryptography processing gateway, is compared Success, certification terminal receive certification access terminal access request, compare failure, and certification terminal refusal receives certification access terminal and connects Enter request.
The present invention is based on the work flow diagrams of the terminal access authentication method of quantum cryptography watermark, as shown in Fig. 2, specific stream Steps are as follows for journey:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, is passed through fingerprint image generation module and is generated the fingerprint with finger print information Image, and wake up certification AM access module;
2) the certification AM access module of certification access terminal divides to the quantum cryptography of Alice transmitting terminal quantum cryptography processing gateways Management module application quantum cryptography is controlled as quantum digital watermarking, is embedded into fingerprint image, certification fingerprint image is generated;
3) certification fingerprint image is sent to authentication center's module of certification terminal by certification AM access module by classical channel, Certification fingerprint image is decomposed into quantum digital watermarking and fingerprint image by authentication center's module;
4) quantum digital watermarking compares success with fingerprint image, and authentication center's module then receives the access of certification access terminal Request.Failure is compared, then refuses the access request of certification access terminal.
Fig. 3 shows that certification access terminal establishes connection sequence diagram with certification terminal, and steps are as follows for detailed process:
1) fingerprint image wakes up the certification AM access module of certification access terminal;
2) the certification AM access module of certification access terminal divides to the quantum cryptography of Alice transmitting terminal quantum cryptography processing gateways Control management module quantum password application;
3) the quantum cryptography sub-control management module of Alice transmitting terminals quantum cryptography processing gateway is using quantum cryptography as quantum After digital watermarking scramble certification access terminal is sent jointly to quantum digital watermarking embedded position information;
4) after quantum digital watermarking is embedded into fingerprint image by certification access terminal, certification fingerprint image is generated;
5) certification access terminal sends certification fingerprint image, and connection application is established to the submission of certification terminal;
6) after certification terminal receives certification fingerprint image, the amount of Bob receiving terminal quantum cryptography processing gateways transmission is utilized Certification fingerprint image is decomposed into fingerprint image and quantum digital watermarking by sub- password embedded position information;
7) after certification terminal-pair fingerprint image is compared successfully, quantum digital watermarking is sent to Bob receiving terminal quantum Cipher Processing gateway;
8) quantum digital watermarking is compared and is tied by the quantum cryptography master control management module of Bob receiving terminals quantum cryptography processing gateway Fruit information feeds back to certification terminal;
9) if quantum digital watermarking comparison result information is successfully, to establish connection;If result is failure, refuse to establish Connection request.
The quantum cryptography structure chart of terminal access authentication method based on quantum cryptography watermark, as shown in figure 4, illustrating It is as follows:
1) a quantum cryptography that be used to verify should have the n × position (m+1) character, be divided into n part, per part (m+ 1) position character;
2) the preceding m characters per part are as quantum digital watermarking embedded position information, and the position (m+1) character is as generation The pixel value of quantum digital watermarking;
3) to sum up, the quantum cryptography of a position (n × m+n) character produces a quantum number with n pixel Watermark, and each pixel has its corresponding m character quantum cryptography to be embedded in the location information of fingerprint image as it.

Claims (2)

1. the terminal access authentication method based on quantum cryptography watermark, which is characterized in that this method use system include:Quantum Password generates network, Alice transmitting terminal quantum cryptographys processing gateway, Bob receiving terminal quantum cryptographys processing gateway, certification access eventually End and certification terminal,
The Alice transmitting terminals quantum cryptography processing gateway includes that quantum cryptography sub-control management module and the first quantum cryptography are handled Module, wherein quantum cryptography sub-control management module are used to generate network application quantum cryptography to quantum cryptography, and to the amount of acquisition Sub- password is preserved and is managed, while quantum cryptography sub-control management module is additionally operable to the application quantum of response certification access terminal Password request;First quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure water Print, while being sent to certification access terminal;
The Bob receiving terminals quantum cryptography processing gateway includes quantum cryptography master control management module, the second quantum cryptography processing mould Block and quantum number watermark authentication module, wherein quantum cryptography master control management module are for responding each Alice transmitting terminals quantum The application quantum password request of Cipher Processing gateway, quantum cryptography master control management module is additionally operable to preserve, manages and the amount of being distributed to Sub- password generates the quantum cryptography of corresponding A lice transmitting terminals in network, responds the application quantum password request of certification terminal;Second Quantum cryptography processing module is used to quantum cryptography being converted to binary map and scramble production quantity sub-figure watermark;Quantum digital watermarking Authentication module is used for certification terminal quantum digital watermarking location information, and quantum number watermark authentication module is additionally operable to receive The quantum digital watermarking that the quantum digital watermarking and reception certification terminal generated by the second quantum cryptography processing module is sent, goes forward side by side Row quantum digital watermarking compares, to certification terminal quantum digital watermarking comparison result;
The certification access terminal includes fingerprint image generation module and certification AM access module, and fingerprint image generation module is for examining Record user fingerprints simultaneously convert thereof into fingerprint image;Certification AM access module is used for Alice transmitting terminal quantum cryptography processing gateways Quantum digital watermarking is embedded into fingerprint image generation certification fingerprint image, sends certification to certification terminal by application quantum cryptography Fingerprint image, access request and certification terminal establish data connection;
Authentication center's module of the certification terminal is used to receive the access request of certification access terminal, receives Bob and receives looking somebody up and down Certification fingerprint image is decomposed into quantum digital watermarking and referred to by the quantum digital watermarking location information that sub- Cipher Processing gateway is sent Print image is transferred the fingerprint image locally preserved and is compared with the fingerprint image of reception, at Bob receiving terminal quantum cryptographys It manages the digital watermarking of gateway quantum and receives the quantum digital watermarking that Bob receiving terminal quantum cryptography processing gateways are sent and compare As a result, the access request to certification access terminal carries out decision and reply,
Specifically comprise the following steps:
1) certification access terminal is called the roll of the contestants in athletic events user fingerprints, and generates the fingerprint image with finger print information;
2) certification access terminal sends application quantum password request to Alice transmitting terminal quantum cryptography processing gateways;
3) the application quantum password request that Alice transmitting terminals quantum cryptography processing gateway response certification access terminal is sent to, Binaryzation conversion forming amount sub-figure watermark is carried out to quantum cryptography simultaneously and is sent to certification access terminal;
4) certification access terminal receives the quantum digital watermarking that Alice transmitting terminal quantum cryptography processing gateways are sent to, and will The quantum digital watermarking is embedded into generation certification fingerprint image in fingerprint image described in step 1);
5) the certification fingerprint image described in step 4) is sent to certification terminal by certification access terminal, as certification access terminal The access request of access authentication terminal;
6) certification terminal receives the certification fingerprint image that is sent to of certification access terminal, and by the certification fingerprint image amount of being decomposed into Sub-figure watermark and fingerprint image transfer the fingerprint image that the fingerprint image locally pre-saved is obtained with decomposition certification fingerprint image As being compared, after comparing successfully, certification terminal sends to Bob receiving terminal quantum cryptography processing gateways and decomposes certification fingerprint image Obtained quantum digital watermarking;
7) Bob receiving terminals quantum cryptography processing gateway receives the quantum digital watermarking that certification terminal is sent to, with its inside Quantum digital watermarking is compared;
8) quantum digital watermarking comparison result is fed back to certification terminal by Bob receiving terminals quantum cryptography processing gateway, is compared successfully, Certification terminal receives certification access terminal access request, compares failure, and certification terminal refusal, which receives the access of certification access terminal, asks It asks.
2. the terminal access authentication method according to claim 1 based on quantum cryptography watermark, it is characterised in that:The amount It includes a Bob receiving terminal and at least one Alice transmitting terminals that sub- password, which generates network, and quantum cryptography generates the Bob in network Between each Alice transmitting terminals in receiving terminal and quantum cryptography generation network quantum cryptography is generated according to BB84 agreements.
CN201810754331.2A 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark Active CN108810016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810754331.2A CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810754331.2A CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Publications (2)

Publication Number Publication Date
CN108810016A true CN108810016A (en) 2018-11-13
CN108810016B CN108810016B (en) 2020-08-28

Family

ID=64074827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810754331.2A Active CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Country Status (1)

Country Link
CN (1) CN108810016B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995785A (en) * 2019-04-04 2019-07-09 长春大学 File security unlocking method in local area network based on quantum cryptography

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009047833A1 (en) * 2007-10-09 2009-04-16 C4 Technology, Inc. Electronic watermark embedding method, electronic watermark embedding apparatus, program, and computer-readable recording medium
CN102750529A (en) * 2012-07-24 2012-10-24 南京邮电大学 Biometric fingerprint authentication method based on quantum fuzzy commitment
CN103366334A (en) * 2013-07-10 2013-10-23 北京工业大学 Quantum watermark authentication method based on quantum discrete cosine transform (QDCT)
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for on-line adding of instant file dynamic label and on-line encryption
CN107257283A (en) * 2017-04-26 2017-10-17 中南大学 Fingerprint verification method based on quantum figure state

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009047833A1 (en) * 2007-10-09 2009-04-16 C4 Technology, Inc. Electronic watermark embedding method, electronic watermark embedding apparatus, program, and computer-readable recording medium
CN102750529A (en) * 2012-07-24 2012-10-24 南京邮电大学 Biometric fingerprint authentication method based on quantum fuzzy commitment
CN103366334A (en) * 2013-07-10 2013-10-23 北京工业大学 Quantum watermark authentication method based on quantum discrete cosine transform (QDCT)
CN105323064A (en) * 2014-07-01 2016-02-10 柯呈翰 System and method for on-line adding of instant file dynamic label and on-line encryption
CN107257283A (en) * 2017-04-26 2017-10-17 中南大学 Fingerprint verification method based on quantum figure state

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995785A (en) * 2019-04-04 2019-07-09 长春大学 File security unlocking method in local area network based on quantum cryptography
CN109995785B (en) * 2019-04-04 2021-02-09 长春大学 Quantum password-based method for safely unlocking files in local area network

Also Published As

Publication number Publication date
CN108810016B (en) 2020-08-28

Similar Documents

Publication Publication Date Title
US6535980B1 (en) Keyless encryption of messages using challenge response
US7017182B2 (en) Method of securely transmitting information
CN106789047A (en) A kind of block chain identification system
WO2014029169A1 (en) Communication method utilizing fingerprint information for authentication
CN103124269A (en) Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
Ogiela et al. Biometric methods for advanced strategic data sharing protocols
IL292177A (en) Digital signature generation using a cold wallet
Panchal et al. Comparable features and same cryptography key generation using biometric fingerprint image
CN111177763A (en) Two-dimensional code electronic encryption and decryption management system and method for file multiple encryption
KR20180135779A (en) Method for digital signature based on quantum key distribution and system performing the same
CN104618113B (en) The method that the authentication of a kind of mobile terminal and safe lane are set up
CN104715537A (en) Encryption and decryption method based on digital tags
CN112243233A (en) CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol
CN111541652B (en) System for improving security of secret information keeping and transmission
CN108810016A (en) Terminal access authentication method based on quantum cryptography watermark
CN102413148B (en) Biological characteristic remote authentication method based on visual codes
US20020017781A1 (en) Seat belt guide
Ardhianto et al. Design Securing Online Payment Transactions Using Stegblock Through Network Layers
CN110490051A (en) Iris authentication system and method
CN112637442B (en) Method and device for encrypting circulating images by cloud server and local end
CN107819751A (en) A kind of safe automated log on management system
CN112788046A (en) Method and system for encrypting transmission information
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
Panchal Bio-Crypto System
Ingle et al. Using Advanced Encryption Standard (AES) Algorithm Upgrade the Security Level of ATM Banking Systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant