CN108810016B - Terminal access authentication method based on quantum cipher watermark - Google Patents

Terminal access authentication method based on quantum cipher watermark Download PDF

Info

Publication number
CN108810016B
CN108810016B CN201810754331.2A CN201810754331A CN108810016B CN 108810016 B CN108810016 B CN 108810016B CN 201810754331 A CN201810754331 A CN 201810754331A CN 108810016 B CN108810016 B CN 108810016B
Authority
CN
China
Prior art keywords
quantum
authentication
terminal
password
fingerprint image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810754331.2A
Other languages
Chinese (zh)
Other versions
CN108810016A (en
Inventor
吴佳楠
张迪
田甜
宋立军
朱德新
黄超
刘兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University
Original Assignee
Changchun University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University filed Critical Changchun University
Priority to CN201810754331.2A priority Critical patent/CN108810016B/en
Publication of CN108810016A publication Critical patent/CN108810016A/en
Application granted granted Critical
Publication of CN108810016B publication Critical patent/CN108810016B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Image Processing (AREA)

Abstract

A terminal access authentication method based on quantum cryptographic watermarking relates to the field of quantum secret communication, and specifically comprises the steps that an authentication access terminal records user fingerprints and generates fingerprint images with fingerprint information; an authentication access module of the authentication access terminal applies a quantum password as a quantum digital watermark to a quantum password sub-control management module of a quantum password processing gateway of an Alice sending terminal, and the quantum password is embedded into a fingerprint image to generate an authentication fingerprint image; the authentication access module sends the authentication fingerprint image to an authentication center module of the authentication terminal, and the authentication center module decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image; the quantum digital watermark and the fingerprint image are successfully compared, and the authentication center module receives the access request of the authentication access terminal. And if the comparison fails, rejecting the access request of the authentication access terminal. The invention combines the quantum password and the digital watermarking technology to realize the safe and reliable identity authentication under the quantum computer environment.

Description

Terminal access authentication method based on quantum cipher watermark
Technical Field
The invention relates to the field of quantum secret communication, in particular to a terminal access authentication method based on quantum cryptographic watermarks.
Background
The rapid development of computer networking technology has led to information infiltration of our surrounding living environment. Protecting information security is naturally a key problem that must be solved in the modern times, and the identity authentication technology is one of the core technologies for realizing information security. In the current communication network, the identity authentication system usually adopts two encryption systems, namely an asymmetric cryptosystem and a symmetric cryptosystem. The encryption password and the decryption password in the asymmetric password system are different, and the decryption password cannot be calculated from the encryption password, so that the decryption password has higher safety, the authentication system adopting the asymmetric password system can realize reliable user identity authentication, and the encryption password can be disclosed, so that the number of the passwords required in the authentication process is less. The symmetric cipher system has the advantages of short cipher, simple encryption and decryption process and high encryption and decryption speed, so that the authentication system adopting the symmetric cipher system has the advantage of high authentication speed and can meet the basic requirements of large-scale network application.
However, whether asymmetric cryptosystems or symmetric cryptosystems, the encryption and decryption algorithms mainly depend on the complexity of the calculation. The high complexity of the calculation ensures that an eavesdropper cannot finish a large amount of calculation required by cracking in a limited time without a secret key, so that the information security is ensured. Quantum computing can almost decipher all the traditional encryption methods at present by means of efficient computing power, so that the traditional encryption algorithm is secret-free and secure. The information security of the quantum communication technology is based on quantum cryptography, the constraint of the traditional encryption method is broken through by taking the quantum state as a key, and the quantum communication technology has the advantages of non-eavesdropping, non-replicability and theoretical unconditional security. Any operation of intercepting or testing the quantum key changes the quantum state, and quantum communication can ensure the absolute safety of key distribution and communication between two places.
Disclosure of Invention
In both asymmetric cryptosystems and symmetric cryptosystems, classical algorithms in computer cryptography often set obstacles for cracking by using computational complexity or non-cracking mathematical problems. Obviously, such algorithms all rely on complex mathematical algorithms, i.e. since the cracking rate is limited by the computing power of today's computers, cracking cannot be completed within a period of time when the password is valid. However, quantum computers with the same clock pulse speed are gradually brought into reality, and the strong computing power of the quantum computers is combined with a proper quantum computer algorithm, so that a system using a classical algorithm in computer cryptography as an identity authentication security barrier can be rapidly broken down.
In view of the hidden danger, the invention provides a terminal access authentication method based on quantum secret communication absolute security and quantum password true randomness, and the terminal access authentication method combines quantum password and digital watermark technology to realize safe and reliable identity authentication under the quantum computer environment.
The invention adopts the following technical scheme: a terminal access authentication method based on quantum cryptographic watermark is characterized in that the system adopted by the method comprises: a quantum cipher generating network, an Alice sending terminal quantum cipher processing gateway, a Bob receiving terminal quantum cipher processing gateway, an authentication access terminal and an authentication terminal,
the quantum password processing gateway at the Alice sending end comprises a quantum password sub-control management module and a first quantum password processing module, wherein the quantum password sub-control management module is used for generating a network application quantum password for the quantum password, storing and managing the obtained quantum password, and meanwhile, the quantum password sub-control management module is also used for responding to a request for applying the quantum password of the authentication access terminal; the first quantum password processing module is used for converting a quantum password into a binary image, scrambling the binary image to generate a quantum digital watermark and sending the quantum digital watermark to the authentication access terminal;
the Bob receiving terminal quantum password processing gateway comprises a quantum password master control management module, a second quantum password processing module and a quantum digital watermark authentication module, wherein the quantum password master control management module is used for responding to a quantum password application request of each Alice sending terminal quantum password processing gateway, and the quantum password master control management module is also used for storing, managing and distributing quantum passwords corresponding to the Alice sending terminals in a quantum password generation network and responding to the quantum password application request of an authentication terminal; the second quantum password processing module is used for converting the quantum password into a binary image and scrambling to generate a quantum digital watermark; the quantum digital watermark authentication module is used for sending quantum digital watermark position information to the authentication terminal, receiving the quantum digital watermark generated by the second quantum cryptographic processing module and the quantum digital watermark sent by the authentication terminal, comparing the quantum digital watermarks and sending a quantum digital watermark comparison result to the authentication terminal;
the authentication access terminal comprises a fingerprint image generation module and an authentication access module, wherein the fingerprint image generation module is used for detecting and recording a user fingerprint and converting the user fingerprint into a fingerprint image; the authentication access module is used for applying a quantum password to the quantum password processing gateway of the Alice sending terminal, embedding a quantum digital watermark into the fingerprint image to generate an authentication fingerprint image, sending the authentication fingerprint image to the authentication terminal, sending an access request and establishing data connection with the authentication terminal;
the authentication center module of the authentication terminal is used for receiving an access request of the authentication access terminal, receiving quantum digital watermark positioning information sent by the Bob receiving terminal quantum cryptography processing gateway, decomposing an authentication fingerprint image into a quantum digital watermark and a fingerprint image, calling the locally stored fingerprint image and comparing the locally stored fingerprint image with the received fingerprint image, sending the quantum digital watermark to the Bob receiving terminal quantum cryptography processing gateway and receiving a comparison result of the quantum digital watermark sent by the Bob receiving terminal quantum cryptography processing gateway, and making a decision and replying on the access request of the authentication access terminal,
the method specifically comprises the following steps:
1) the authentication access terminal checks the user fingerprint and generates a fingerprint image with fingerprint information;
2) the authentication access terminal sends a request for applying the quantum password to the quantum password processing gateway of the Alice sending terminal;
3) the method comprises the steps that an Alice sending terminal quantum password processing gateway responds to a request for applying a quantum password sent by an authentication access terminal, and meanwhile, the quantum password is subjected to binarization conversion to form a quantum digital watermark which is sent to the authentication access terminal;
4) the authentication access terminal receives the quantum digital watermark sent by the quantum cryptography processing gateway of the Alice sending terminal and embeds the quantum digital watermark into the fingerprint image in the step 1) to generate an authentication fingerprint image;
5) the authentication access terminal sends the authentication fingerprint image in the step 4) to the authentication terminal as an access request for accessing the authentication access terminal to the authentication terminal;
6) the authentication terminal receives an authentication fingerprint image sent by the authentication access terminal, decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image, calls a locally pre-stored fingerprint image and compares the fingerprint image obtained by decomposing the authentication fingerprint image, and sends the quantum digital watermark obtained by decomposing the authentication fingerprint image to the Bob receiving terminal quantum cryptography processing gateway after the comparison is successful;
7) the Bob receiving terminal quantum cryptography processing gateway receives the quantum digital watermark sent by the authentication terminal and compares the quantum digital watermark with the quantum digital watermark in the authentication terminal;
8) and the Bob receiving terminal quantum cryptography processing gateway feeds the comparison result of the quantum digital watermarks back to the authentication terminal, the comparison is successful, the authentication terminal accepts the access request of the authentication access terminal, and the comparison is failed, and the authentication terminal refuses to accept the access request of the authentication access terminal.
The quantum password generation network comprises a Bob receiving terminal and at least one Alice transmitting terminal, and quantum passwords are generated between the Bob receiving terminal in the quantum password generation network and each Alice transmitting terminal in the quantum password generation network according to a BB84 protocol.
Through the design scheme, the invention can bring the following beneficial effects: the invention provides a terminal access authentication method based on quantum cryptographic watermarking, a quantum secret communication system based on a quantum key distribution mechanism can generate a security key with true randomness, and the security key is applied to a digital watermarking technology and can effectively improve the security and the robustness of a watermarking algorithm. In addition, fingerprint identification technology is also one of the core technologies of information security. The fingerprint of the user is instantly checked and recorded and compared with the fingerprint stored in advance to verify the real identity, and the principle is that the fingerprint lines of each person are different on an image, a breakpoint and a cross point, so that the fingerprint verification method has uniqueness and stability. The fingerprint identification technology and the digital watermarking technology based on the quantum cryptography are fused for identity authentication, so that the security of identity authentication can be greatly improved.
Drawings
The invention will be further described with reference to the following description and embodiments in conjunction with the accompanying drawings:
fig. 1 is a schematic diagram of an implementation of a terminal access authentication method based on quantum cryptographic watermarking according to the present invention;
FIG. 2 is a flowchart of the operation of the terminal access authentication method based on quantum cryptographic watermarking of the present invention;
FIG. 3 is a timing diagram illustrating the establishment of a connection between an authentication access terminal and an authentication terminal in accordance with the present invention;
fig. 4 is a diagram of a quantum cryptography structure of the present invention.
Detailed Description
For purposes of promoting a better understanding of the objects, aspects and advantages of the invention, reference will now be made in detail to the present embodiments of the invention, examples of which are illustrated in the accompanying drawings, wherein the terms "first" and "second" are not intended to indicate any order, quantity or importance, but rather are used to distinguish one element from another.
Referring to fig. 1, a system adopted by the terminal access authentication method based on quantum cryptography watermark provided by the present invention includes: the system comprises a quantum password generation network, an Alice sending terminal quantum password processing gateway, a Bob receiving terminal quantum password processing gateway, an authentication access terminal and an authentication terminal, wherein dotted lines representing communication relations in the figure are connected to form a quantum channel, and solid lines are connected to form a classical channel.
Quantum cryptography generation networks: the quantum cryptography generation network comprises a dotted line connection part in fig. 1, wherein one quantum cryptography generation network only has one Bob receiving terminal, but can have a plurality of Alice sending terminals. Each Alice sending end in the Bob receiving end and the quantum cryptography generation network can generate unconditionally reliable quantum cryptography according to a BB84 protocol.
The quantum cryptography processing gateway of the Alice sending terminal: the system mainly comprises a quantum password sub-control management module and a first quantum password processing module, wherein the quantum password sub-control management module is mainly used for applying a quantum password to a quantum password generation network, storing and managing the quantum password generated by the quantum password generation network and responding to a quantum password request of an authentication access terminal. The first quantum cipher processing module has the functions of converting a quantum cipher into a binary image, scrambling the binary image to generate a quantum digital watermark, and sending the quantum digital watermark to the authentication access terminal.
Bob receiving end quantum cryptography processing gateway: the system mainly comprises a quantum password master control management module, a second quantum password processing module and a quantum digital watermark authentication module, wherein the quantum password master control management module has three functions of responding to the application quantum password requests of all Alice sending terminal quantum password processing gateways, respectively storing, managing and distributing the quantum passwords corresponding to the Alice sending terminals in a quantum password generation network and responding to the application quantum password requests of the authentication terminals. The second quantum cryptography processing module has the functions of converting the quantum cryptography into a binary image and scrambling the binary image to generate a quantum digital watermark, and the quantum digital watermark authentication module has the functions of sending the quantum digital watermark position information to the authentication terminal, receiving the quantum digital watermark generated by the second quantum cryptography processing module, receiving the quantum digital watermark sent by the authentication terminal, comparing the quantum digital watermark and sending a quantum digital watermark comparison result to the authentication terminal.
Authenticating the access terminal: the fingerprint authentication system mainly comprises a fingerprint image generation module and an authentication access module. The fingerprint image generation module can be used for detecting and recording a user fingerprint and converting the user fingerprint into a fingerprint image. The authentication access module has the functions of applying for a quantum password to the quantum password processing gateway of the Alice sending terminal, embedding a quantum digital watermark into a fingerprint image to generate an authentication fingerprint image, sending the authentication fingerprint image to the authentication terminal, sending an access request, establishing connection with the authentication terminal and the like.
Authenticating the terminal: the authentication center module of the authentication terminal has the functions of receiving an access request of the authentication access terminal, receiving quantum digital watermark position information sent by a Bob receiving terminal quantum cryptography processing gateway, decomposing an authentication fingerprint image into a quantum digital watermark and a fingerprint image, calling the locally pre-stored fingerprint image and comparing the fingerprint image with the received fingerprint image, sending the quantum digital watermark to the Bob receiving terminal quantum cryptography processing gateway and receiving a quantum digital watermark comparison result sent by the Bob receiving terminal quantum cryptography processing gateway, deciding and replying the access request of the authentication access terminal, and the like.
The invention provides a terminal access authentication method based on quantum cryptographic watermark, which specifically comprises the following steps:
1) the authentication access terminal checks the user fingerprint and generates a fingerprint image with fingerprint information;
2) the authentication access terminal sends a request for applying the quantum password to the quantum password processing gateway of the Alice sending terminal;
3) the method comprises the steps that an Alice sending terminal quantum password processing gateway responds to a request for applying a quantum password sent by an authentication access terminal, and meanwhile, the quantum password is subjected to binarization conversion to form a quantum digital watermark which is sent to the authentication access terminal;
4) the authentication access terminal receives the quantum digital watermark sent by the quantum cryptography processing gateway of the Alice sending terminal and embeds the quantum digital watermark into the fingerprint image in the step 1) to generate an authentication fingerprint image;
5) the authentication access terminal sends the authentication fingerprint image in the step 4) to the authentication terminal as an access request for accessing the authentication access terminal to the authentication terminal;
6) the authentication terminal receives an authentication fingerprint image sent by the authentication access terminal, decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image, calls a locally pre-stored fingerprint image and compares the fingerprint image obtained by decomposing the authentication fingerprint image, and sends the quantum digital watermark obtained by decomposing the authentication fingerprint image to the Bob receiving terminal quantum cryptography processing gateway after the comparison is successful;
7) the Bob receiving terminal quantum cryptography processing gateway receives the quantum digital watermark sent by the authentication terminal and compares the quantum digital watermark with the quantum digital watermark in the authentication terminal;
8) and the Bob receiving terminal quantum cryptography processing gateway feeds the comparison result of the quantum digital watermarks back to the authentication terminal, the comparison is successful, the authentication terminal accepts the access request of the authentication access terminal, and the comparison is failed, and the authentication terminal refuses to accept the access request of the authentication access terminal.
The work flow chart of the terminal access authentication method based on the quantum cryptographic watermark is shown in fig. 2, and the specific flow steps are as follows:
1) the authentication access terminal checks the user fingerprint, generates a fingerprint image with fingerprint information through a fingerprint image generation module, and wakes up the authentication access module;
2) an authentication access module of the authentication access terminal applies a quantum password as a quantum digital watermark to a quantum password sub-control management module of a quantum password processing gateway of an Alice sending terminal, and the quantum password is embedded into a fingerprint image to generate an authentication fingerprint image;
3) the authentication access module sends the authentication fingerprint image to an authentication center module of the authentication terminal through a classical channel, and the authentication center module decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image;
4) the quantum digital watermark and the fingerprint image are successfully compared, and the authentication center module receives the access request of the authentication access terminal. And if the comparison fails, rejecting the access request of the authentication access terminal.
Fig. 3 shows a sequence diagram of establishing a connection between an authentication access terminal and an authentication terminal, and the specific steps of the process are as follows:
1) the fingerprint image awakens an authentication access module of the authentication access terminal;
2) an authentication access module of the authentication access terminal sends a quantum password application to a quantum password sub-control management module of a quantum password processing gateway of an Alice sending terminal;
3) a quantum password sub-control management module of the quantum password processing gateway at the Alice sending end scrambles the quantum password as a quantum digital watermark and then sends the quantum password and the quantum digital watermark embedding position information to the authentication access terminal;
4) after the authentication access terminal embeds the quantum digital watermark into the fingerprint image, an authentication fingerprint image is generated;
5) the authentication access terminal sends an authentication fingerprint image and submits a connection establishment application to the authentication terminal;
6) after receiving the authentication fingerprint image, the authentication terminal decomposes the authentication fingerprint image into a fingerprint image and a quantum digital watermark by using quantum password embedding position information sent by a Bob receiving terminal quantum password processing gateway;
7) after the authentication terminal successfully compares the fingerprint images, sending the quantum digital watermark to a Bob receiving terminal quantum cryptography processing gateway;
8) a quantum password master control management module of a Bob receiving terminal quantum password processing gateway feeds back quantum digital watermark comparison result information to the authentication terminal;
9) if the quantum digital watermark comparison result information is successful, establishing connection; and if the result is failure, rejecting the connection establishment request.
A quantum cryptographic structure diagram of a terminal access authentication method based on quantum cryptographic watermarks is specifically described as follows, as shown in fig. 4:
1) one quantum password used for verification is provided with n x (m +1) -bit characters, and the quantum password is divided into n parts, wherein each part is the (m +1) -bit character;
2) the first m-bit character of each part is used as quantum digital watermark embedding position information, and the (m +1) -th bit character is used as a pixel value for generating the quantum digital watermark;
3) in summary, a quantum password of (n × m + n) -bit characters can generate a quantum digital watermark having n pixel points, and each pixel point has its corresponding m-bit character quantum password as its position information embedded in the fingerprint image.

Claims (1)

1. A terminal access authentication method based on quantum cryptographic watermark is characterized in that the system adopted by the method comprises: a quantum cipher generating network, an Alice sending terminal quantum cipher processing gateway, a Bob receiving terminal quantum cipher processing gateway, an authentication access terminal and an authentication terminal,
the quantum password processing gateway at the Alice sending end comprises a quantum password sub-control management module and a first quantum password processing module, wherein the quantum password sub-control management module is used for generating a network application quantum password for the quantum password, storing and managing the obtained quantum password, and meanwhile, the quantum password sub-control management module is also used for responding to a request for applying the quantum password of the authentication access terminal; the first quantum password processing module is used for converting a quantum password into a binary image, scrambling the binary image to generate a quantum digital watermark and sending the quantum digital watermark to the authentication access terminal;
the Bob receiving terminal quantum password processing gateway comprises a quantum password master control management module, a second quantum password processing module and a quantum digital watermark authentication module, wherein the quantum password master control management module is used for responding to a quantum password application request of each Alice sending terminal quantum password processing gateway, and the quantum password master control management module is also used for storing, managing and distributing quantum passwords corresponding to the Alice sending terminals in a quantum password generation network and responding to the quantum password application request of an authentication terminal; the second quantum password processing module is used for converting the quantum password into a binary image and scrambling to generate a quantum digital watermark; the quantum digital watermark authentication module is used for sending quantum digital watermark position information to the authentication terminal, receiving the quantum digital watermark generated by the second quantum cryptographic processing module and the quantum digital watermark sent by the authentication terminal, comparing the quantum digital watermarks and sending a quantum digital watermark comparison result to the authentication terminal;
the authentication access terminal comprises a fingerprint image generation module and an authentication access module, wherein the fingerprint image generation module is used for detecting and recording a user fingerprint and converting the user fingerprint into a fingerprint image; the authentication access module is used for applying a quantum password to the quantum password processing gateway of the Alice sending terminal, embedding a quantum digital watermark into the fingerprint image to generate an authentication fingerprint image, sending the authentication fingerprint image to the authentication terminal, sending an access request and establishing data connection with the authentication terminal;
the authentication center module of the authentication terminal is used for receiving an access request of the authentication access terminal, receiving quantum digital watermark positioning information sent by the Bob receiving terminal quantum cryptography processing gateway, decomposing an authentication fingerprint image into a quantum digital watermark and a fingerprint image, calling the locally stored fingerprint image and comparing the locally stored fingerprint image with the received fingerprint image, sending the quantum digital watermark to the Bob receiving terminal quantum cryptography processing gateway and receiving a comparison result of the quantum digital watermark sent by the Bob receiving terminal quantum cryptography processing gateway, and making a decision and replying on the access request of the authentication access terminal,
the method specifically comprises the following steps:
1) the authentication access terminal checks the user fingerprint and generates a fingerprint image with fingerprint information;
2) the authentication access terminal sends a request for applying the quantum password to the quantum password processing gateway of the Alice sending terminal;
3) the method comprises the steps that an Alice sending terminal quantum password processing gateway responds to a request for applying a quantum password sent by an authentication access terminal, and meanwhile, the quantum password is subjected to binarization conversion to form a quantum digital watermark which is sent to the authentication access terminal;
4) the authentication access terminal receives the quantum digital watermark sent by the quantum cryptography processing gateway of the Alice sending terminal and embeds the quantum digital watermark into the fingerprint image in the step 1) to generate an authentication fingerprint image;
5) the authentication access terminal sends the authentication fingerprint image in the step 4) to the authentication terminal as an access request for accessing the authentication access terminal to the authentication terminal;
6) the authentication terminal receives an authentication fingerprint image sent by the authentication access terminal, decomposes the authentication fingerprint image into a quantum digital watermark and a fingerprint image, calls a locally pre-stored fingerprint image and compares the fingerprint image obtained by decomposing the authentication fingerprint image, and sends the quantum digital watermark obtained by decomposing the authentication fingerprint image to the Bob receiving terminal quantum cryptography processing gateway after the comparison is successful;
7) the Bob receiving terminal quantum cryptography processing gateway receives the quantum digital watermark sent by the authentication terminal and compares the quantum digital watermark with the quantum digital watermark in the authentication terminal;
8) the Bob receiving terminal quantum cryptography processing gateway feeds back the comparison result of the quantum digital watermarks to the authentication terminal, the comparison is successful, the authentication terminal accepts the access request of the authentication access terminal, the comparison is failed, and the authentication terminal refuses to accept the access request of the authentication access terminal;
the quantum password generation network comprises a Bob receiving terminal and at least one Alice transmitting terminal, and quantum passwords are generated between the Bob receiving terminal in the quantum password generation network and each Alice transmitting terminal in the quantum password generation network according to a BB84 protocol.
CN201810754331.2A 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark Active CN108810016B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810754331.2A CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810754331.2A CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Publications (2)

Publication Number Publication Date
CN108810016A CN108810016A (en) 2018-11-13
CN108810016B true CN108810016B (en) 2020-08-28

Family

ID=64074827

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810754331.2A Active CN108810016B (en) 2018-07-11 2018-07-11 Terminal access authentication method based on quantum cipher watermark

Country Status (1)

Country Link
CN (1) CN108810016B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995785B (en) * 2019-04-04 2021-02-09 长春大学 Quantum password-based method for safely unlocking files in local area network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009047833A1 (en) * 2007-10-09 2009-04-16 C4 Technology, Inc. Electronic watermark embedding method, electronic watermark embedding apparatus, program, and computer-readable recording medium
CN102750529B (en) * 2012-07-24 2014-04-16 南京邮电大学 Biometric fingerprint authentication method based on quantum fuzzy commitment
CN103366334A (en) * 2013-07-10 2013-10-23 北京工业大学 Quantum watermark authentication method based on quantum discrete cosine transform (QDCT)
CN105323064B (en) * 2014-07-01 2018-07-10 柯呈翰 In on line add instant file dynamic labels, encrypted system and method
CN107257283B (en) * 2017-04-26 2019-11-08 中南大学 Fingerprint verification method based on quantum figure state

Also Published As

Publication number Publication date
CN108810016A (en) 2018-11-13

Similar Documents

Publication Publication Date Title
CN113783836B (en) Internet of things data access control method and system based on block chain and IBE algorithm
JP4869944B2 (en) User authentication methods and related architectures based on the use of biometric identification technology
US9209969B2 (en) System and method of per-packet keying
CN110519046B (en) Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD
CN108900298B (en) Quantum cipher watermark-based private block chain honest node authentication access method
US20130088327A1 (en) Template delivery type cancelable biometric authentication system and method therefor
CN102026195A (en) One-time password (OTP) based mobile terminal identity authentication method and system
Bi et al. Internet of things assisted public security management platform for urban transportation using hybridised cryptographic‐integrated steganography
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
KR102011043B1 (en) Method for digital signature based on quantum key distribution and system performing the same
WO2023151427A1 (en) Quantum key transmission method, device and system
CN111490874B (en) Distribution network safety protection method, system, device and storage medium
TWI476629B (en) Data security and security systems and methods
CN114401087B (en) Passive lock identity authentication and key agreement system based on state cryptographic algorithm
CN114154181A (en) Privacy calculation method based on distributed storage
CN108810016B (en) Terminal access authentication method based on quantum cipher watermark
JP2022533979A (en) User authentication and signature device using user biometrics, and method thereof
CN111541652B (en) System for improving security of secret information keeping and transmission
CN115580415B (en) Data interaction authentication method, device and system in block chain
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm
CN110266483A (en) Based on unsymmetrical key pond to and the quantum communications service station cryptographic key negotiation method of QKD, system, equipment
CN114244509A (en) Method for carrying out SM2 one-time pad bidirectional authentication unlocking by using mobile terminal
CN114244529A (en) Method for carrying out SM2 one-time pad bidirectional authentication unlocking by using electronic key
Abduljabbar et al. Robust scheme to protect authentication code of message/image documents in cloud computing
CN109120589B (en) Terminal information protection method and device based on encryption password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant