CN108900298A - Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark - Google Patents

Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark Download PDF

Info

Publication number
CN108900298A
CN108900298A CN201810754285.6A CN201810754285A CN108900298A CN 108900298 A CN108900298 A CN 108900298A CN 201810754285 A CN201810754285 A CN 201810754285A CN 108900298 A CN108900298 A CN 108900298A
Authority
CN
China
Prior art keywords
quantum cryptography
mobile terminal
quantum
entity authentication
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810754285.6A
Other languages
Chinese (zh)
Other versions
CN108900298B (en
Inventor
吴佳楠
张迪
宋立军
朱德新
陈丽
黄贺艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University
Original Assignee
Changchun University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University filed Critical Changchun University
Priority to CN201810754285.6A priority Critical patent/CN108900298B/en
Publication of CN108900298A publication Critical patent/CN108900298A/en
Application granted granted Critical
Publication of CN108900298B publication Critical patent/CN108900298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark, belong to field of quantum secure communication, this method can generate the security password with truly random property, it is applied in digital watermark technology the safety and robustness that can effectively improve watermarking algorithm, in conjunction with the fingerprint identification technology with uniqueness and stability, more believable certification meshed network considerably reduces a possibility that playing tricks and attack block chain, and permission control can also greatly reduce risk.Privately owned block chain honesty entity authentication cut-in method proposed by the present invention based on quantum cryptography watermark can carry out honest entity authentication to access node some or all of in block chain, and then make block chain partially or fully node is completely credible.

Description

Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
Technical field
The present invention relates to field of quantum secure communication, more particularly, to a kind of privately owned block chain based on quantum cryptography watermark Honest entity authentication cut-in method.
Background technique
Block chain is a kind of decentralization, can not distort, believable distributed account book, it provides a set of safety, steady Mode that is fixed, transparent, can auditing and efficiently record transaction and data information interaction, can store data, can also run Application program.Block chain technology is mainly used in existence proof, intelligent contract, Internet of Things, authentication, prediction city at present The fields such as field, transaction in assets, file storage.
Its characteristics are as follows:
1) distributed account book that is highly safe, can not distorting.
2) it is present in internet, is disclosed to all users.
3) it helps to realize point-to-point transaction and exchange between person to person, object and object.
4) exchange of value can be completed without third-party intervention.
And there are mainly three types of the forms of block chain:Publicly-owned chain, alliance's chain, privately owned chain.
1) publicly-owned chain:Anyone can read block chain information, send and trade and can be identified, participate in the area of common recognition process Block chain.
2) alliance's chain:It can be participated in, be traded according to node set by certain feature, common recognition process is controlled by preselected node Block chain, though the scope of privately owned chain is actually still fallen between publicly-owned chain and privately owned chain.
3) privately owned chain:Permission is written only in a tissue hand, reading permission may confined block chain.To company The settlement of transactions in audit testing and banking institution inside government has very big value.
It opens, with complete without permitting necessary publicly-owned chain different, alliance's chain and privately owned chain are at information extent of disclosure and center It is limited in terms of control, these limitations can help block chain to meet different types of application demand.But with model The safety of the diminution enclosed, privately owned chain inevitably falls under suspicion, even if the security of system guaranteed with common recognition mechanism It is more credible, but privately owned chain lesser for range still has such as 51% attack hidden danger in common recognition mechanism.Wherein 51% attack It hits after referring to that some client or tissue have grasped the 51% calculation power of block chain the whole network, calculates power with these to recalculate The block of confirmed mistake, the behavior for making block chain generate bifurcated and acquiring an advantage.
Since privately owned chain still maintains the characteristic of block chain authenticity and part decentralization, need on this basis The system that access privilege control is more stringent, and modification even reading permission is only limitted to a few users is createed, is allowed to have concurrently The characteristics of centralization and centralization.Need design authority setting and mechanism of permitting the entrance, the node to ensure block chain substantially harmless simultaneously.
Thus while privately owned chain, which has, to have a extensive future, learns wildly from other's strong points, reducing the advantages such as threat, flexible compared to publicly-owned chain, But also simultaneously because comparing that closing, innovation ability are open to suspicion, and there are trust problems.
The information security of Technique on Quantum Communication is based on quantum cryptology, breaches conventional cryptography using quantum state as key The constraint of method, have can not eavesdrop, non-reproduction and theoretic " Unconditional security ".Any intercepting and capturing or test quantum The operation of key, can all change quantum state, and quantum communications can ensure that encryption key distribution is perfectly safe with what is communicated between two places Property.
Summary of the invention
It is proposed by the present invention based on the privately owned of quantum cryptography watermark in view of mechanism hidden danger of knowing together present in block chain technology Block chain honesty entity authentication cut-in method can carry out honest entity authentication to access node some or all of in block chain, into And makes block chain partially or fully node is completely credible.
The present invention adopts the following technical scheme that:
Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark, which is characterized in that this method is adopted System includes:Quantum cryptography service area, authentication service area and certification termination environment,
The quantum cryptography service area includes quantum cryptography dissemination system and quantum cryptography cloud, quantum cryptography cloud amount Sub- password management services, quantum cryptography management server is for receiving quantum cryptography application and distributing quantum cryptography, parsing shifting The nearest quantum cryptography distribution terminal of dynamic host ID, selection mobile terminal is matched with mobile terminal, and transmitting mobile terminal Identification code distributes terminal to the quantum cryptography;
Contain privately owned block chain honesty meshed network and honest entity authentication server in the authentication service area, wherein private Block chain honesty meshed network is the mobile terminal application authentication network to be accessed;Honest entity authentication server is for authenticating It is intended to access the mobile terminal of privately owned block chain honesty meshed network, the registration letter of user is prestored in honest entity authentication server Breath and finger print information;
Several quantum cryptographys distribution terminal is contained in the certification termination environment and mobile terminal to be certified, each quantum are close Code distribution terminal has its corresponding quantum cryptography distribution area, receiving area's mobile terminal in the quantum cryptography distribution area Quantum cryptography is requested and is distributed in quantum cryptography application, and quantum cryptography distribution area locating for mobile terminal includes as area identification In the mobile terminal identification code of mobile terminal;When mobile terminal submits certification application to honest entity authentication server, root A string of mobile terminal identification codes are generated with certification application one according to locating quantum cryptography distribution area and the unique identification of itself And submit to honest entity authentication server;
Specific authentication accessing method includes the following steps:
1) mobile terminal to be certified sends certification application and mobile terminal identification code to honest entity authentication server;
2) user name and password of honest entity authentication server authentication mobile terminal, after being proved to be successful, honest node is recognized Card server to quantum password management services transmitting mobile terminal identification code and sends the sub- password request of applications;
3) quantum cryptography management server receive mobile terminal identification code that honest entity authentication server is sent to it and Apply quantum password request, quantum cryptography management server distribute a pair of quantum cryptography KEY and with received mobile terminal identification Code pairing association, replies to honest entity authentication server for quantum cryptography KEY and associated mobile terminal identification code;It measures simultaneously Sub- password management services parse mobile terminal identification code, quantum cryptography distribution area locating for mobile terminal are obtained, by quantum Password KEY distributes terminal to the quantum cryptography that associated mobile terminal identification code is sent to corresponding quantum cryptography distribution area;
4) after honest entity authentication server receives the quantum cryptography KEY of answer, to mobile terminal quantum watermark The authorization prompt of fingerprint image;
5) after mobile terminal receives authorization prompt, quantum cryptography of quantum cryptography distribution area distributes terminal where to it It sends mobile terminal identification code and submits quantum cryptography application;
6) the mobile terminal identification code that is sent according to mobile terminal of quantum cryptography distribution terminal store inside it in inquire With the associated quantum cryptography KEY of mobile terminal identification code, and quantum cryptography KEY is replied into mobile terminal;
7) after mobile terminal receives quantum cryptography KEY, input is prompted the user with by two, the end of quantum cryptography KEY and is referred to Fixed fingerprint, and the fingerprint of typing is generated into fingerprint image;Quantum cryptography KEY rest part is converted into binary map, root simultaneously Binary map is embedded into the fingerprint image using Digital Watermarking Embedded Algorithm according to the embedded position information that quantum cryptography KEY is provided Middle generation quantum watermark fingerprint image, and it is sent to honest entity authentication server, it waits to be certified;
8) after honest entity authentication server receives the quantum cryptography KEY that quantum cryptography management server replies, according to Two, the end of quantum cryptography KEY corresponding finger print information of calling and obtaining user in local library, and quantum cryptography KEY rest part is turned It is changed to binary map;
9) amount that honest entity authentication server is sent according to the embedded position information in quantum cryptography KEY from mobile terminal Sub- watermark fingerprint image extracts fingerprint image and binary map;
10) finger that honest entity authentication server is carried out and is locally stored respectively to the fingerprint image and binary map that extract Print image and binary map are compared, and reject the certification request of mobile terminal if comparing failure, if comparing successfully, will move Terminal authentication is honest node, is requested by mobile terminal authentication.
Wherein, two, the end of quantum cryptography KEY described in step 7) value is for 00,01,10 or 11,00,01,10 and 11 Typing fingerprint number, and 00,01,10 and 11 finger print informations for respectively corresponding thumb, index finger, middle finger and the third finger.
Through the above design, the present invention can be brought the following benefits:It is proposed by the present invention to be based on quantum cryptography The privately owned block chain honesty entity authentication cut-in method of watermark can carry out access node some or all of in block chain honest Entity authentication, and then make block chain partially or fully node is completely credible.Wherein, the quantum based on quantum key distribution mechanism Secret signalling can generate the security password with truly random property, and being applied in digital watermark technology effectively to mention The safety and robustness of high watermarking algorithm, it is more believable in conjunction with the fingerprint identification technology with uniqueness and stability Certification meshed network considerably reduces a possibility that playing tricks and attack block chain, and permission control can also greatly reduce risk.
Detailed description of the invention
The invention will be further described with specific embodiment for explanation with reference to the accompanying drawing:
Fig. 1 is that the present invention is based on the network implementations of the privately owned block chain honesty entity authentication cut-in method of quantum cryptography watermark Schematic diagram;
Fig. 2 is that the present invention is based on the workflows of the privately owned block chain honesty entity authentication cut-in method of quantum cryptography watermark Figure;
Fig. 3 is that the present invention is based on the certification of the privately owned block chain honesty entity authentication cut-in method of quantum cryptography watermark accesses Timing diagram;
Fig. 4 is quantum cryptography management servers process flow chart;
Fig. 5 is quantum watermark fingerprint image product process figure;
Fig. 6 is the flow chart of honest entity authentication server authentication quantum watermark fingerprint image;
Fig. 7 is quantum cryptography structure chart.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer with reference to specific embodiments and reference Attached drawing, the present invention is described in further detail.
Shown in referring to Fig.1, what the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark used is There are three area, respectively quantum cryptography service area in system, authentication service area and certification termination environment, wherein between the area Tu Zhongge and Solid line connection indicates that classical wire channel transmits data in connection relationship between each component, and dotted line connection indicates that quantum channel passes Transmission of data, wifi connection indicate that classical wireless channel transmits data, are described as follows:
Quantum cryptography service area mainly has quantum cryptography dissemination system and quantum cryptography cloud two parts, close for realizing quantum Generation, storage and the management of code.Quantum cryptography dissemination system includes Alice transmitting terminal and the receiving end Bob, and main function is to generate Quantum cryptography with truly random property;Quantum cryptography cloud contains quantum password management services, and effect is that processing is close to quantum The nearest quantum cryptography distribution terminal of the application of code, distribution quantum cryptography, parsing mobile terminal identification code, selection mobile terminal is simultaneously Transmitting mobile terminal identification code distributes terminal to quantum cryptography.
Contain privately owned block chain honesty meshed network and honest entity authentication server in authentication service area.Wherein, privately owned area Block chain honesty meshed network is the mobile terminal application authentication network to be accessed, the node in privately owned block chain honesty meshed network It is regarded as honest node, i.e., the block that privately owned block chain honesty meshed network interior joint generates all is believable;Honesty section Point certificate server plays the authentication role to the mobile terminal for being intended to access privately owned block chain honesty meshed network, and honest node is recognized The registration information and finger print information of user are prestored in card server.
Several quantum cryptographys distribution terminal is contained in certification termination environment, and mobile terminal to be certified is also separately divided to the area Domain.The wherein quantum cryptography distribution area that each quantum cryptography distribution terminal has its responsible, is responsible for mobile terminal in its region Quantum cryptography application, and quantum cryptography distribution area locating for mobile terminal will be embodied in its transmission mobile terminal identification code In the position of part, i.e., quantum cryptography distribution area locating for mobile terminal is as area identification included in the mobile terminal of mobile terminal Identification code.Mobile terminal is then the promoter once authenticated, and the person of being certified once authenticated, is taken to honest entity authentication It, can be according to locating quantum cryptography distribution area and unique identification a string of the movements of generation of itself when business device submits certification application Host ID submits to honest entity authentication server with certification application together.
In conjunction with Fig. 2, Fig. 3, Fig. 4, Fig. 5 and Fig. 6, the privately owned block chain honesty entity authentication access based on quantum cryptography watermark Method detailed process is described as follows:
1) mobile terminal to be certified sends certification application and mobile terminal identification code to honest entity authentication server, really Physical node certificate server verifies the user name and password of mobile terminal, and the certification Shen of mobile terminal is started to process after being proved to be successful Please;
2) honest entity authentication server is submitted quantum cryptography application to quantum password management services and is moved to its forwarding The mobile terminal identification code that dynamic terminal is sent;
3) quantum cryptography management server distribution a pair of quantum cryptography KEY is associated with the pairing of received mobile terminal identification code Afterwards, quantum cryptography management server by a pair of of quantum cryptography KEY wherein one be sent to honest entity authentication server;
4) quantum cryptography management server parses mobile terminal identification code, obtains the distribution of quantum cryptography locating for mobile terminal The mobile terminal identification code of another quantum cryptography KEY and its pairing are sent to the nearest quantum cryptography of mobile terminal by region The quantum cryptography of distribution area distributes terminal;
5) after honest entity authentication server receives quantum cryptography KEY, to mobile terminal quantum watermark fingerprint image The authorization prompt of picture;
6) after mobile terminal receives authorization prompt, quantum cryptography of quantum cryptography distribution area distributes terminal where to it It sends mobile terminal identification code and submits quantum cryptography application;
7) the mobile terminal identification code that is sent according to mobile terminal of quantum cryptography distribution terminal store inside it in inquire With the associated quantum cryptography KEY of mobile terminal identification code, and quantum cryptography KEY is replied into mobile terminal;
8) after mobile terminal receives quantum cryptography KEY, it is corresponding that two, the end according to quantum cryptography KEY prompts the user with typing The fingerprint of number, and quantum cryptography KEY rest part is converted into binary map;
9) embedded position information that mobile terminal incorporating quantum password KEY is provided utilizes Digital Watermarking Embedded Algorithm by two-value Figure is embedded into generation quantum watermark fingerprint image in fingerprint image, and is sent to honest entity authentication server, waits to be certified;
10) after honest entity authentication server receives the quantum cryptography KEY that quantum cryptography management server replies, according to Two, the end of quantum cryptography KEY corresponding finger print information of calling and obtaining user in local library, and quantum cryptography KEY rest part is turned It is changed to binary map;
11) honest entity authentication server is sent according to the embedded position information in quantum cryptography KEY from mobile terminal Quantum watermark fingerprint image extracts fingerprint image and binary map;
12) finger that honest entity authentication server is carried out and is locally stored respectively to the fingerprint image and binary map that extract Print image and binary map are compared, and reject the certification request of mobile terminal if comparing failure, if comparing successfully, will move Terminal authentication is honest node, is requested by mobile terminal authentication.
Fig. 7 shows the quantum cryptography structure of the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark Figure, is described as follows:
1) a quantum for being used for the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark is close Code should have the position (n × m+n+2) character, be divided into the part (n+1), there is the position (m+1) character in every part of the preceding part n;
2) before before every part of the part n m characters as quantum digital watermarking embedded position information, the position (m+1) character Pixel value as production quantity sub-figure watermark;
3) (n+1) of quantum cryptography is partially fingerprint selection position, shares 2 quantum cryptographys, possible value is respectively 00,01,10 and 11,00,01,10 and 11 number for typing fingerprint, and 00,01,10 and 11 respectively correspond thumb, index finger, middle finger And nameless finger print information;
4) to sum up, the quantum cryptography of a position (n × m+n+2) produces the quantum number water with n pixel It prints, and the location information that each pixel has its corresponding m quantum cryptography to be embedded in fingerprint image as it, wherein quantum number The fingerprint image that word watermark is embedded into is determined by the fingerprint selection position of quantum cryptography.

Claims (2)

1. the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark, which is characterized in that this method uses System include:Quantum cryptography service area, authentication service area and certification termination environment,
The quantum cryptography service area includes quantum cryptography dissemination system and quantum cryptography cloud, and it is close that quantum cryptography cloud contains quantum Code management server, quantum cryptography management server is for receiving quantum cryptography application and distributing quantum cryptography, parsing movement eventually The nearest quantum cryptography distribution terminal of end identification code, selection mobile terminal is matched with mobile terminal, and transmitting mobile terminal identifies Code distributes terminal to the quantum cryptography;
Contain privately owned block chain honesty meshed network and honest entity authentication server in the authentication service area, wherein privately owned area Block chain honesty meshed network is the mobile terminal application authentication network to be accessed;Honest entity authentication server is intended to connect for authenticating Enter the mobile terminal of privately owned block chain honesty meshed network, prestored in honest entity authentication server user registration information and Finger print information;
Contain several quantum cryptographys distribution terminal and mobile terminal to be certified, each quantum cryptography point in the certification termination environment Hair terminal has its corresponding quantum cryptography distribution area, the quantum of receiving area's mobile terminal in the quantum cryptography distribution area Quantum cryptography is requested and is distributed in password application, and quantum cryptography distribution area locating for mobile terminal is included in as area identification and moves In the mobile terminal identification code of dynamic terminal;When mobile terminal submits certification application to honest entity authentication server, according to institute The quantum cryptography distribution area at place and the unique identification of itself generate a string of mobile terminal identification codes and mention together with certification application Give honest entity authentication server;
Specific authentication accessing method includes the following steps:
1) mobile terminal to be certified sends certification application and mobile terminal identification code to honest entity authentication server;
2) user name and password of honest entity authentication server authentication mobile terminal, after being proved to be successful, honest entity authentication clothes Business device to quantum password management services transmitting mobile terminal identification code and sends the sub- password request of applications;
3) quantum cryptography management server receives the mobile terminal identification code and application that honest entity authentication server is sent to it Quantum cryptography request, quantum cryptography management server distribution a pair of quantum cryptography KEY simultaneously match with received mobile terminal identification code To association, quantum cryptography KEY and associated mobile terminal identification code are replied into honest entity authentication server;Quantum is close simultaneously Code management server parses mobile terminal identification code, quantum cryptography distribution area locating for mobile terminal is obtained, by quantum cryptography KEY distributes terminal to the quantum cryptography that associated mobile terminal identification code is sent to corresponding quantum cryptography distribution area;
4) after honest entity authentication server receives the quantum cryptography KEY of answer, to mobile terminal quantum watermark fingerprint The authorization prompt of image;
5) after mobile terminal receives authorization prompt, the quantum cryptography distribution terminal of quantum cryptography distribution area where to it is sent Mobile terminal identification code submits quantum cryptography application;
6) the mobile terminal identification code that is sent according to mobile terminal of quantum cryptography distribution terminal store inside it in inquire and shifting The dynamic associated quantum cryptography KEY of host ID, and quantum cryptography KEY is replied into mobile terminal;
7) after mobile terminal receives quantum cryptography KEY, prompt the user with what input was specified by two, the end of quantum cryptography KEY Fingerprint, and the fingerprint of typing is generated into fingerprint image;Quantum cryptography KEY rest part is converted into binary map simultaneously, according to amount Binary map is embedded into the fingerprint image raw by the embedded position information that sub- password KEY is provided using Digital Watermarking Embedded Algorithm At quantum watermark fingerprint image, and it is sent to honest entity authentication server, waited to be certified;
8) after honest entity authentication server receives the quantum cryptography KEY that quantum cryptography management server replies, according to quantum Two, the end of password KEY corresponding finger print information of calling and obtaining user in local library, and quantum cryptography KEY rest part is converted to Binary map;
9) the quantum water that honest entity authentication server is sent according to the embedded position information in quantum cryptography KEY from mobile terminal Print fingerprint image extracts fingerprint image and binary map;
10) fingerprint image that honest entity authentication server is carried out and is locally stored respectively to the fingerprint image and binary map that extract Picture and binary map are compared, and the certification request of mobile terminal are rejected if comparing failure, if comparing successfully, by mobile terminal Certification is honest node, is requested by mobile terminal authentication.
2. the privately owned block chain honesty entity authentication cut-in method according to claim 1 based on quantum cryptography watermark, It is characterized in that:It is typing that two, the end value of quantum cryptography KEY described in step 7), which is 00,01,10 or 11,00,01,10 and 11, Fingerprint number, and 00,01,10 and 11 finger print informations for respectively corresponding thumb, index finger, middle finger and the third finger.
CN201810754285.6A 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method Active CN108900298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810754285.6A CN108900298B (en) 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810754285.6A CN108900298B (en) 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method

Publications (2)

Publication Number Publication Date
CN108900298A true CN108900298A (en) 2018-11-27
CN108900298B CN108900298B (en) 2020-09-18

Family

ID=64348808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810754285.6A Active CN108900298B (en) 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method

Country Status (1)

Country Link
CN (1) CN108900298B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109672518A (en) * 2019-03-02 2019-04-23 西安邮电大学 The node data processing of the block chain of anti-quantum attack
CN109951511A (en) * 2019-01-08 2019-06-28 上海大学 Buyer seller's secure digital Watermarking Protocol generation method based on block platform chain
CN110147683A (en) * 2019-04-26 2019-08-20 江苏信实云安全技术有限公司 Safety of image sharing platform construction method based on block chain
CN111183444A (en) * 2019-08-27 2020-05-19 阿里巴巴集团控股有限公司 System and method for registering a subscribeable sub-state in a blockchain
CN113765665A (en) * 2021-11-10 2021-12-07 济南量子技术研究院 Block chain network based on quantum key and data secure transmission method
US11334667B1 (en) 2020-01-17 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection
US11336462B1 (en) 2019-09-10 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11366897B1 (en) 2020-01-17 2022-06-21 Wells Fargo Bank, N.A. Systems and methods for layered quantum computing detection

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
US20130315395A1 (en) * 2012-05-25 2013-11-28 The Johns Hopkins University Embedded Authentication Protocol for Quantum Key Distribution Systems
CN105812367A (en) * 2016-03-15 2016-07-27 浙江神州量子网络科技有限公司 Authentication system and authentication method of network access device in quantum network
US20160248586A1 (en) * 2013-09-30 2016-08-25 Los Alamos National Security, Llc Streaming authentication and multi-level security for communications networks using quantum cryptography
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
US20130315395A1 (en) * 2012-05-25 2013-11-28 The Johns Hopkins University Embedded Authentication Protocol for Quantum Key Distribution Systems
US20160248586A1 (en) * 2013-09-30 2016-08-25 Los Alamos National Security, Llc Streaming authentication and multi-level security for communications networks using quantum cryptography
CN105812367A (en) * 2016-03-15 2016-07-27 浙江神州量子网络科技有限公司 Authentication system and authentication method of network access device in quantum network
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
NICOLAS BUCHMANN: "Enhancing Breeder Document Long-Term Security using Blockchain Technology", 《IEEE》 *
吴佳楠: "融合量子密钥真随机性的二值图像水印", 《光学 精密工程》 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951511A (en) * 2019-01-08 2019-06-28 上海大学 Buyer seller's secure digital Watermarking Protocol generation method based on block platform chain
CN109672518A (en) * 2019-03-02 2019-04-23 西安邮电大学 The node data processing of the block chain of anti-quantum attack
CN110147683A (en) * 2019-04-26 2019-08-20 江苏信实云安全技术有限公司 Safety of image sharing platform construction method based on block chain
CN111183444A (en) * 2019-08-27 2020-05-19 阿里巴巴集团控股有限公司 System and method for registering a subscribeable sub-state in a blockchain
CN111183444B (en) * 2019-08-27 2023-12-12 创新先进技术有限公司 System and method for registering subscribed sub-states in a blockchain
US11336462B1 (en) 2019-09-10 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11736302B1 (en) 2019-09-10 2023-08-22 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11736303B1 (en) 2019-09-10 2023-08-22 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11334667B1 (en) 2020-01-17 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection
US11366897B1 (en) 2020-01-17 2022-06-21 Wells Fargo Bank, N.A. Systems and methods for layered quantum computing detection
US11914707B1 (en) 2020-01-17 2024-02-27 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection
CN113765665A (en) * 2021-11-10 2021-12-07 济南量子技术研究院 Block chain network based on quantum key and data secure transmission method

Also Published As

Publication number Publication date
CN108900298B (en) 2020-09-18

Similar Documents

Publication Publication Date Title
CN108900298A (en) Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
US11496310B2 (en) Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
US10475273B2 (en) Architecture for access management
CN111429254B (en) Business data processing method and device and readable storage medium
KR101883156B1 (en) System and method for authentication, user terminal, authentication server and service server for executing the same
KR101159371B1 (en) Method and system for integrating multiple identities, identity mechanisms and identity providers in a single user paradigm
US8613067B2 (en) Single sign on with multiple authentication factors
CN110493347A (en) Data access control method and system in large-scale cloud storage based on block chain
CN108235805A (en) Account unifying method and device and storage medium
CN110235410A (en) Replace the method for the login of user using the block chain database of the agreement based on UTXO and by the certification based on PKI and utilizes its server
KR102248237B1 (en) Decentralized identifiers system using browser-based security personal identification number authentication and method thereof
KR101941227B1 (en) A FIDO authentication device capable of identity confirmation or non-repudiation and the method thereof
JP2003534589A (en) Authentication system and method
KR20150052261A (en) Method and system for verifying an access request
JP2010072976A5 (en)
CN109670825A (en) One kind being based on the associated digital asset real name register system of certificate
CN114127764A (en) Destination addressing associated with distributed ledger
KR101348079B1 (en) System for digital signing using portable terminal
Abubakar et al. A lightweight and user-centric two-factor authentication mechanism for iot based on blockchain and smart contract
KR102517001B1 (en) System and method for processing digital signature on a blockchain network
Weerasinghe et al. Security framework for mobile banking
CN107370728B (en) Instant license generation and verification system and method based on electronic license library
CN116980163A (en) Data processing method, device, equipment and medium based on trusted execution environment
Wang et al. Not yet another digital ID: privacy-preserving humanitarian aid distribution
CN111541708A (en) Identity authentication method based on power distribution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant