CN108900298A - Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark - Google Patents
Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark Download PDFInfo
- Publication number
- CN108900298A CN108900298A CN201810754285.6A CN201810754285A CN108900298A CN 108900298 A CN108900298 A CN 108900298A CN 201810754285 A CN201810754285 A CN 201810754285A CN 108900298 A CN108900298 A CN 108900298A
- Authority
- CN
- China
- Prior art keywords
- quantum cryptography
- mobile terminal
- quantum
- entity authentication
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
Abstract
Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark, belong to field of quantum secure communication, this method can generate the security password with truly random property, it is applied in digital watermark technology the safety and robustness that can effectively improve watermarking algorithm, in conjunction with the fingerprint identification technology with uniqueness and stability, more believable certification meshed network considerably reduces a possibility that playing tricks and attack block chain, and permission control can also greatly reduce risk.Privately owned block chain honesty entity authentication cut-in method proposed by the present invention based on quantum cryptography watermark can carry out honest entity authentication to access node some or all of in block chain, and then make block chain partially or fully node is completely credible.
Description
Technical field
The present invention relates to field of quantum secure communication, more particularly, to a kind of privately owned block chain based on quantum cryptography watermark
Honest entity authentication cut-in method.
Background technique
Block chain is a kind of decentralization, can not distort, believable distributed account book, it provides a set of safety, steady
Mode that is fixed, transparent, can auditing and efficiently record transaction and data information interaction, can store data, can also run
Application program.Block chain technology is mainly used in existence proof, intelligent contract, Internet of Things, authentication, prediction city at present
The fields such as field, transaction in assets, file storage.
Its characteristics are as follows:
1) distributed account book that is highly safe, can not distorting.
2) it is present in internet, is disclosed to all users.
3) it helps to realize point-to-point transaction and exchange between person to person, object and object.
4) exchange of value can be completed without third-party intervention.
And there are mainly three types of the forms of block chain:Publicly-owned chain, alliance's chain, privately owned chain.
1) publicly-owned chain:Anyone can read block chain information, send and trade and can be identified, participate in the area of common recognition process
Block chain.
2) alliance's chain:It can be participated in, be traded according to node set by certain feature, common recognition process is controlled by preselected node
Block chain, though the scope of privately owned chain is actually still fallen between publicly-owned chain and privately owned chain.
3) privately owned chain:Permission is written only in a tissue hand, reading permission may confined block chain.To company
The settlement of transactions in audit testing and banking institution inside government has very big value.
It opens, with complete without permitting necessary publicly-owned chain different, alliance's chain and privately owned chain are at information extent of disclosure and center
It is limited in terms of control, these limitations can help block chain to meet different types of application demand.But with model
The safety of the diminution enclosed, privately owned chain inevitably falls under suspicion, even if the security of system guaranteed with common recognition mechanism
It is more credible, but privately owned chain lesser for range still has such as 51% attack hidden danger in common recognition mechanism.Wherein 51% attack
It hits after referring to that some client or tissue have grasped the 51% calculation power of block chain the whole network, calculates power with these to recalculate
The block of confirmed mistake, the behavior for making block chain generate bifurcated and acquiring an advantage.
Since privately owned chain still maintains the characteristic of block chain authenticity and part decentralization, need on this basis
The system that access privilege control is more stringent, and modification even reading permission is only limitted to a few users is createed, is allowed to have concurrently
The characteristics of centralization and centralization.Need design authority setting and mechanism of permitting the entrance, the node to ensure block chain substantially harmless simultaneously.
Thus while privately owned chain, which has, to have a extensive future, learns wildly from other's strong points, reducing the advantages such as threat, flexible compared to publicly-owned chain,
But also simultaneously because comparing that closing, innovation ability are open to suspicion, and there are trust problems.
The information security of Technique on Quantum Communication is based on quantum cryptology, breaches conventional cryptography using quantum state as key
The constraint of method, have can not eavesdrop, non-reproduction and theoretic " Unconditional security ".Any intercepting and capturing or test quantum
The operation of key, can all change quantum state, and quantum communications can ensure that encryption key distribution is perfectly safe with what is communicated between two places
Property.
Summary of the invention
It is proposed by the present invention based on the privately owned of quantum cryptography watermark in view of mechanism hidden danger of knowing together present in block chain technology
Block chain honesty entity authentication cut-in method can carry out honest entity authentication to access node some or all of in block chain, into
And makes block chain partially or fully node is completely credible.
The present invention adopts the following technical scheme that:
Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark, which is characterized in that this method is adopted
System includes:Quantum cryptography service area, authentication service area and certification termination environment,
The quantum cryptography service area includes quantum cryptography dissemination system and quantum cryptography cloud, quantum cryptography cloud amount
Sub- password management services, quantum cryptography management server is for receiving quantum cryptography application and distributing quantum cryptography, parsing shifting
The nearest quantum cryptography distribution terminal of dynamic host ID, selection mobile terminal is matched with mobile terminal, and transmitting mobile terminal
Identification code distributes terminal to the quantum cryptography;
Contain privately owned block chain honesty meshed network and honest entity authentication server in the authentication service area, wherein private
Block chain honesty meshed network is the mobile terminal application authentication network to be accessed;Honest entity authentication server is for authenticating
It is intended to access the mobile terminal of privately owned block chain honesty meshed network, the registration letter of user is prestored in honest entity authentication server
Breath and finger print information;
Several quantum cryptographys distribution terminal is contained in the certification termination environment and mobile terminal to be certified, each quantum are close
Code distribution terminal has its corresponding quantum cryptography distribution area, receiving area's mobile terminal in the quantum cryptography distribution area
Quantum cryptography is requested and is distributed in quantum cryptography application, and quantum cryptography distribution area locating for mobile terminal includes as area identification
In the mobile terminal identification code of mobile terminal;When mobile terminal submits certification application to honest entity authentication server, root
A string of mobile terminal identification codes are generated with certification application one according to locating quantum cryptography distribution area and the unique identification of itself
And submit to honest entity authentication server;
Specific authentication accessing method includes the following steps:
1) mobile terminal to be certified sends certification application and mobile terminal identification code to honest entity authentication server;
2) user name and password of honest entity authentication server authentication mobile terminal, after being proved to be successful, honest node is recognized
Card server to quantum password management services transmitting mobile terminal identification code and sends the sub- password request of applications;
3) quantum cryptography management server receive mobile terminal identification code that honest entity authentication server is sent to it and
Apply quantum password request, quantum cryptography management server distribute a pair of quantum cryptography KEY and with received mobile terminal identification
Code pairing association, replies to honest entity authentication server for quantum cryptography KEY and associated mobile terminal identification code;It measures simultaneously
Sub- password management services parse mobile terminal identification code, quantum cryptography distribution area locating for mobile terminal are obtained, by quantum
Password KEY distributes terminal to the quantum cryptography that associated mobile terminal identification code is sent to corresponding quantum cryptography distribution area;
4) after honest entity authentication server receives the quantum cryptography KEY of answer, to mobile terminal quantum watermark
The authorization prompt of fingerprint image;
5) after mobile terminal receives authorization prompt, quantum cryptography of quantum cryptography distribution area distributes terminal where to it
It sends mobile terminal identification code and submits quantum cryptography application;
6) the mobile terminal identification code that is sent according to mobile terminal of quantum cryptography distribution terminal store inside it in inquire
With the associated quantum cryptography KEY of mobile terminal identification code, and quantum cryptography KEY is replied into mobile terminal;
7) after mobile terminal receives quantum cryptography KEY, input is prompted the user with by two, the end of quantum cryptography KEY and is referred to
Fixed fingerprint, and the fingerprint of typing is generated into fingerprint image;Quantum cryptography KEY rest part is converted into binary map, root simultaneously
Binary map is embedded into the fingerprint image using Digital Watermarking Embedded Algorithm according to the embedded position information that quantum cryptography KEY is provided
Middle generation quantum watermark fingerprint image, and it is sent to honest entity authentication server, it waits to be certified;
8) after honest entity authentication server receives the quantum cryptography KEY that quantum cryptography management server replies, according to
Two, the end of quantum cryptography KEY corresponding finger print information of calling and obtaining user in local library, and quantum cryptography KEY rest part is turned
It is changed to binary map;
9) amount that honest entity authentication server is sent according to the embedded position information in quantum cryptography KEY from mobile terminal
Sub- watermark fingerprint image extracts fingerprint image and binary map;
10) finger that honest entity authentication server is carried out and is locally stored respectively to the fingerprint image and binary map that extract
Print image and binary map are compared, and reject the certification request of mobile terminal if comparing failure, if comparing successfully, will move
Terminal authentication is honest node, is requested by mobile terminal authentication.
Wherein, two, the end of quantum cryptography KEY described in step 7) value is for 00,01,10 or 11,00,01,10 and 11
Typing fingerprint number, and 00,01,10 and 11 finger print informations for respectively corresponding thumb, index finger, middle finger and the third finger.
Through the above design, the present invention can be brought the following benefits:It is proposed by the present invention to be based on quantum cryptography
The privately owned block chain honesty entity authentication cut-in method of watermark can carry out access node some or all of in block chain honest
Entity authentication, and then make block chain partially or fully node is completely credible.Wherein, the quantum based on quantum key distribution mechanism
Secret signalling can generate the security password with truly random property, and being applied in digital watermark technology effectively to mention
The safety and robustness of high watermarking algorithm, it is more believable in conjunction with the fingerprint identification technology with uniqueness and stability
Certification meshed network considerably reduces a possibility that playing tricks and attack block chain, and permission control can also greatly reduce risk.
Detailed description of the invention
The invention will be further described with specific embodiment for explanation with reference to the accompanying drawing:
Fig. 1 is that the present invention is based on the network implementations of the privately owned block chain honesty entity authentication cut-in method of quantum cryptography watermark
Schematic diagram;
Fig. 2 is that the present invention is based on the workflows of the privately owned block chain honesty entity authentication cut-in method of quantum cryptography watermark
Figure;
Fig. 3 is that the present invention is based on the certification of the privately owned block chain honesty entity authentication cut-in method of quantum cryptography watermark accesses
Timing diagram;
Fig. 4 is quantum cryptography management servers process flow chart;
Fig. 5 is quantum watermark fingerprint image product process figure;
Fig. 6 is the flow chart of honest entity authentication server authentication quantum watermark fingerprint image;
Fig. 7 is quantum cryptography structure chart.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer with reference to specific embodiments and reference
Attached drawing, the present invention is described in further detail.
Shown in referring to Fig.1, what the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark used is
There are three area, respectively quantum cryptography service area in system, authentication service area and certification termination environment, wherein between the area Tu Zhongge and
Solid line connection indicates that classical wire channel transmits data in connection relationship between each component, and dotted line connection indicates that quantum channel passes
Transmission of data, wifi connection indicate that classical wireless channel transmits data, are described as follows:
Quantum cryptography service area mainly has quantum cryptography dissemination system and quantum cryptography cloud two parts, close for realizing quantum
Generation, storage and the management of code.Quantum cryptography dissemination system includes Alice transmitting terminal and the receiving end Bob, and main function is to generate
Quantum cryptography with truly random property;Quantum cryptography cloud contains quantum password management services, and effect is that processing is close to quantum
The nearest quantum cryptography distribution terminal of the application of code, distribution quantum cryptography, parsing mobile terminal identification code, selection mobile terminal is simultaneously
Transmitting mobile terminal identification code distributes terminal to quantum cryptography.
Contain privately owned block chain honesty meshed network and honest entity authentication server in authentication service area.Wherein, privately owned area
Block chain honesty meshed network is the mobile terminal application authentication network to be accessed, the node in privately owned block chain honesty meshed network
It is regarded as honest node, i.e., the block that privately owned block chain honesty meshed network interior joint generates all is believable;Honesty section
Point certificate server plays the authentication role to the mobile terminal for being intended to access privately owned block chain honesty meshed network, and honest node is recognized
The registration information and finger print information of user are prestored in card server.
Several quantum cryptographys distribution terminal is contained in certification termination environment, and mobile terminal to be certified is also separately divided to the area
Domain.The wherein quantum cryptography distribution area that each quantum cryptography distribution terminal has its responsible, is responsible for mobile terminal in its region
Quantum cryptography application, and quantum cryptography distribution area locating for mobile terminal will be embodied in its transmission mobile terminal identification code
In the position of part, i.e., quantum cryptography distribution area locating for mobile terminal is as area identification included in the mobile terminal of mobile terminal
Identification code.Mobile terminal is then the promoter once authenticated, and the person of being certified once authenticated, is taken to honest entity authentication
It, can be according to locating quantum cryptography distribution area and unique identification a string of the movements of generation of itself when business device submits certification application
Host ID submits to honest entity authentication server with certification application together.
In conjunction with Fig. 2, Fig. 3, Fig. 4, Fig. 5 and Fig. 6, the privately owned block chain honesty entity authentication access based on quantum cryptography watermark
Method detailed process is described as follows:
1) mobile terminal to be certified sends certification application and mobile terminal identification code to honest entity authentication server, really
Physical node certificate server verifies the user name and password of mobile terminal, and the certification Shen of mobile terminal is started to process after being proved to be successful
Please;
2) honest entity authentication server is submitted quantum cryptography application to quantum password management services and is moved to its forwarding
The mobile terminal identification code that dynamic terminal is sent;
3) quantum cryptography management server distribution a pair of quantum cryptography KEY is associated with the pairing of received mobile terminal identification code
Afterwards, quantum cryptography management server by a pair of of quantum cryptography KEY wherein one be sent to honest entity authentication server;
4) quantum cryptography management server parses mobile terminal identification code, obtains the distribution of quantum cryptography locating for mobile terminal
The mobile terminal identification code of another quantum cryptography KEY and its pairing are sent to the nearest quantum cryptography of mobile terminal by region
The quantum cryptography of distribution area distributes terminal;
5) after honest entity authentication server receives quantum cryptography KEY, to mobile terminal quantum watermark fingerprint image
The authorization prompt of picture;
6) after mobile terminal receives authorization prompt, quantum cryptography of quantum cryptography distribution area distributes terminal where to it
It sends mobile terminal identification code and submits quantum cryptography application;
7) the mobile terminal identification code that is sent according to mobile terminal of quantum cryptography distribution terminal store inside it in inquire
With the associated quantum cryptography KEY of mobile terminal identification code, and quantum cryptography KEY is replied into mobile terminal;
8) after mobile terminal receives quantum cryptography KEY, it is corresponding that two, the end according to quantum cryptography KEY prompts the user with typing
The fingerprint of number, and quantum cryptography KEY rest part is converted into binary map;
9) embedded position information that mobile terminal incorporating quantum password KEY is provided utilizes Digital Watermarking Embedded Algorithm by two-value
Figure is embedded into generation quantum watermark fingerprint image in fingerprint image, and is sent to honest entity authentication server, waits to be certified;
10) after honest entity authentication server receives the quantum cryptography KEY that quantum cryptography management server replies, according to
Two, the end of quantum cryptography KEY corresponding finger print information of calling and obtaining user in local library, and quantum cryptography KEY rest part is turned
It is changed to binary map;
11) honest entity authentication server is sent according to the embedded position information in quantum cryptography KEY from mobile terminal
Quantum watermark fingerprint image extracts fingerprint image and binary map;
12) finger that honest entity authentication server is carried out and is locally stored respectively to the fingerprint image and binary map that extract
Print image and binary map are compared, and reject the certification request of mobile terminal if comparing failure, if comparing successfully, will move
Terminal authentication is honest node, is requested by mobile terminal authentication.
Fig. 7 shows the quantum cryptography structure of the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
Figure, is described as follows:
1) a quantum for being used for the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark is close
Code should have the position (n × m+n+2) character, be divided into the part (n+1), there is the position (m+1) character in every part of the preceding part n;
2) before before every part of the part n m characters as quantum digital watermarking embedded position information, the position (m+1) character
Pixel value as production quantity sub-figure watermark;
3) (n+1) of quantum cryptography is partially fingerprint selection position, shares 2 quantum cryptographys, possible value is respectively
00,01,10 and 11,00,01,10 and 11 number for typing fingerprint, and 00,01,10 and 11 respectively correspond thumb, index finger, middle finger
And nameless finger print information;
4) to sum up, the quantum cryptography of a position (n × m+n+2) produces the quantum number water with n pixel
It prints, and the location information that each pixel has its corresponding m quantum cryptography to be embedded in fingerprint image as it, wherein quantum number
The fingerprint image that word watermark is embedded into is determined by the fingerprint selection position of quantum cryptography.
Claims (2)
1. the privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark, which is characterized in that this method uses
System include:Quantum cryptography service area, authentication service area and certification termination environment,
The quantum cryptography service area includes quantum cryptography dissemination system and quantum cryptography cloud, and it is close that quantum cryptography cloud contains quantum
Code management server, quantum cryptography management server is for receiving quantum cryptography application and distributing quantum cryptography, parsing movement eventually
The nearest quantum cryptography distribution terminal of end identification code, selection mobile terminal is matched with mobile terminal, and transmitting mobile terminal identifies
Code distributes terminal to the quantum cryptography;
Contain privately owned block chain honesty meshed network and honest entity authentication server in the authentication service area, wherein privately owned area
Block chain honesty meshed network is the mobile terminal application authentication network to be accessed;Honest entity authentication server is intended to connect for authenticating
Enter the mobile terminal of privately owned block chain honesty meshed network, prestored in honest entity authentication server user registration information and
Finger print information;
Contain several quantum cryptographys distribution terminal and mobile terminal to be certified, each quantum cryptography point in the certification termination environment
Hair terminal has its corresponding quantum cryptography distribution area, the quantum of receiving area's mobile terminal in the quantum cryptography distribution area
Quantum cryptography is requested and is distributed in password application, and quantum cryptography distribution area locating for mobile terminal is included in as area identification and moves
In the mobile terminal identification code of dynamic terminal;When mobile terminal submits certification application to honest entity authentication server, according to institute
The quantum cryptography distribution area at place and the unique identification of itself generate a string of mobile terminal identification codes and mention together with certification application
Give honest entity authentication server;
Specific authentication accessing method includes the following steps:
1) mobile terminal to be certified sends certification application and mobile terminal identification code to honest entity authentication server;
2) user name and password of honest entity authentication server authentication mobile terminal, after being proved to be successful, honest entity authentication clothes
Business device to quantum password management services transmitting mobile terminal identification code and sends the sub- password request of applications;
3) quantum cryptography management server receives the mobile terminal identification code and application that honest entity authentication server is sent to it
Quantum cryptography request, quantum cryptography management server distribution a pair of quantum cryptography KEY simultaneously match with received mobile terminal identification code
To association, quantum cryptography KEY and associated mobile terminal identification code are replied into honest entity authentication server;Quantum is close simultaneously
Code management server parses mobile terminal identification code, quantum cryptography distribution area locating for mobile terminal is obtained, by quantum cryptography
KEY distributes terminal to the quantum cryptography that associated mobile terminal identification code is sent to corresponding quantum cryptography distribution area;
4) after honest entity authentication server receives the quantum cryptography KEY of answer, to mobile terminal quantum watermark fingerprint
The authorization prompt of image;
5) after mobile terminal receives authorization prompt, the quantum cryptography distribution terminal of quantum cryptography distribution area where to it is sent
Mobile terminal identification code submits quantum cryptography application;
6) the mobile terminal identification code that is sent according to mobile terminal of quantum cryptography distribution terminal store inside it in inquire and shifting
The dynamic associated quantum cryptography KEY of host ID, and quantum cryptography KEY is replied into mobile terminal;
7) after mobile terminal receives quantum cryptography KEY, prompt the user with what input was specified by two, the end of quantum cryptography KEY
Fingerprint, and the fingerprint of typing is generated into fingerprint image;Quantum cryptography KEY rest part is converted into binary map simultaneously, according to amount
Binary map is embedded into the fingerprint image raw by the embedded position information that sub- password KEY is provided using Digital Watermarking Embedded Algorithm
At quantum watermark fingerprint image, and it is sent to honest entity authentication server, waited to be certified;
8) after honest entity authentication server receives the quantum cryptography KEY that quantum cryptography management server replies, according to quantum
Two, the end of password KEY corresponding finger print information of calling and obtaining user in local library, and quantum cryptography KEY rest part is converted to
Binary map;
9) the quantum water that honest entity authentication server is sent according to the embedded position information in quantum cryptography KEY from mobile terminal
Print fingerprint image extracts fingerprint image and binary map;
10) fingerprint image that honest entity authentication server is carried out and is locally stored respectively to the fingerprint image and binary map that extract
Picture and binary map are compared, and the certification request of mobile terminal are rejected if comparing failure, if comparing successfully, by mobile terminal
Certification is honest node, is requested by mobile terminal authentication.
2. the privately owned block chain honesty entity authentication cut-in method according to claim 1 based on quantum cryptography watermark,
It is characterized in that:It is typing that two, the end value of quantum cryptography KEY described in step 7), which is 00,01,10 or 11,00,01,10 and 11,
Fingerprint number, and 00,01,10 and 11 finger print informations for respectively corresponding thumb, index finger, middle finger and the third finger.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810754285.6A CN108900298B (en) | 2018-07-11 | 2018-07-11 | Quantum cipher watermark-based private block chain honest node authentication access method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810754285.6A CN108900298B (en) | 2018-07-11 | 2018-07-11 | Quantum cipher watermark-based private block chain honest node authentication access method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108900298A true CN108900298A (en) | 2018-11-27 |
CN108900298B CN108900298B (en) | 2020-09-18 |
Family
ID=64348808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810754285.6A Active CN108900298B (en) | 2018-07-11 | 2018-07-11 | Quantum cipher watermark-based private block chain honest node authentication access method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108900298B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109672518A (en) * | 2019-03-02 | 2019-04-23 | 西安邮电大学 | The node data processing of the block chain of anti-quantum attack |
CN109951511A (en) * | 2019-01-08 | 2019-06-28 | 上海大学 | Buyer seller's secure digital Watermarking Protocol generation method based on block platform chain |
CN110147683A (en) * | 2019-04-26 | 2019-08-20 | 江苏信实云安全技术有限公司 | Safety of image sharing platform construction method based on block chain |
CN111183444A (en) * | 2019-08-27 | 2020-05-19 | 阿里巴巴集团控股有限公司 | System and method for registering a subscribeable sub-state in a blockchain |
CN113765665A (en) * | 2021-11-10 | 2021-12-07 | 济南量子技术研究院 | Block chain network based on quantum key and data secure transmission method |
US11334667B1 (en) | 2020-01-17 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for disparate quantum computing threat detection |
US11336462B1 (en) | 2019-09-10 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11366897B1 (en) | 2020-01-17 | 2022-06-21 | Wells Fargo Bank, N.A. | Systems and methods for layered quantum computing detection |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729256A (en) * | 2008-10-24 | 2010-06-09 | 深圳宝嘉电子设备有限公司 | Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark |
US20130315395A1 (en) * | 2012-05-25 | 2013-11-28 | The Johns Hopkins University | Embedded Authentication Protocol for Quantum Key Distribution Systems |
CN105812367A (en) * | 2016-03-15 | 2016-07-27 | 浙江神州量子网络科技有限公司 | Authentication system and authentication method of network access device in quantum network |
US20160248586A1 (en) * | 2013-09-30 | 2016-08-25 | Los Alamos National Security, Llc | Streaming authentication and multi-level security for communications networks using quantum cryptography |
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
-
2018
- 2018-07-11 CN CN201810754285.6A patent/CN108900298B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101729256A (en) * | 2008-10-24 | 2010-06-09 | 深圳宝嘉电子设备有限公司 | Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark |
US20130315395A1 (en) * | 2012-05-25 | 2013-11-28 | The Johns Hopkins University | Embedded Authentication Protocol for Quantum Key Distribution Systems |
US20160248586A1 (en) * | 2013-09-30 | 2016-08-25 | Los Alamos National Security, Llc | Streaming authentication and multi-level security for communications networks using quantum cryptography |
CN105812367A (en) * | 2016-03-15 | 2016-07-27 | 浙江神州量子网络科技有限公司 | Authentication system and authentication method of network access device in quantum network |
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
Non-Patent Citations (2)
Title |
---|
NICOLAS BUCHMANN: "Enhancing Breeder Document Long-Term Security using Blockchain Technology", 《IEEE》 * |
吴佳楠: "融合量子密钥真随机性的二值图像水印", 《光学 精密工程》 * |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951511A (en) * | 2019-01-08 | 2019-06-28 | 上海大学 | Buyer seller's secure digital Watermarking Protocol generation method based on block platform chain |
CN109672518A (en) * | 2019-03-02 | 2019-04-23 | 西安邮电大学 | The node data processing of the block chain of anti-quantum attack |
CN110147683A (en) * | 2019-04-26 | 2019-08-20 | 江苏信实云安全技术有限公司 | Safety of image sharing platform construction method based on block chain |
CN111183444A (en) * | 2019-08-27 | 2020-05-19 | 阿里巴巴集团控股有限公司 | System and method for registering a subscribeable sub-state in a blockchain |
CN111183444B (en) * | 2019-08-27 | 2023-12-12 | 创新先进技术有限公司 | System and method for registering subscribed sub-states in a blockchain |
US11336462B1 (en) | 2019-09-10 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11736302B1 (en) | 2019-09-10 | 2023-08-22 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11736303B1 (en) | 2019-09-10 | 2023-08-22 | Wells Fargo Bank, N.A. | Systems and methods for post-quantum cryptography optimization |
US11334667B1 (en) | 2020-01-17 | 2022-05-17 | Wells Fargo Bank, N.A. | Systems and methods for disparate quantum computing threat detection |
US11366897B1 (en) | 2020-01-17 | 2022-06-21 | Wells Fargo Bank, N.A. | Systems and methods for layered quantum computing detection |
US11914707B1 (en) | 2020-01-17 | 2024-02-27 | Wells Fargo Bank, N.A. | Systems and methods for disparate quantum computing threat detection |
CN113765665A (en) * | 2021-11-10 | 2021-12-07 | 济南量子技术研究院 | Block chain network based on quantum key and data secure transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN108900298B (en) | 2020-09-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108900298A (en) | Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark | |
US11496310B2 (en) | Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication | |
US10475273B2 (en) | Architecture for access management | |
CN111429254B (en) | Business data processing method and device and readable storage medium | |
KR101883156B1 (en) | System and method for authentication, user terminal, authentication server and service server for executing the same | |
KR101159371B1 (en) | Method and system for integrating multiple identities, identity mechanisms and identity providers in a single user paradigm | |
US8613067B2 (en) | Single sign on with multiple authentication factors | |
CN110493347A (en) | Data access control method and system in large-scale cloud storage based on block chain | |
CN108235805A (en) | Account unifying method and device and storage medium | |
CN110235410A (en) | Replace the method for the login of user using the block chain database of the agreement based on UTXO and by the certification based on PKI and utilizes its server | |
KR102248237B1 (en) | Decentralized identifiers system using browser-based security personal identification number authentication and method thereof | |
KR101941227B1 (en) | A FIDO authentication device capable of identity confirmation or non-repudiation and the method thereof | |
JP2003534589A (en) | Authentication system and method | |
KR20150052261A (en) | Method and system for verifying an access request | |
JP2010072976A5 (en) | ||
CN109670825A (en) | One kind being based on the associated digital asset real name register system of certificate | |
CN114127764A (en) | Destination addressing associated with distributed ledger | |
KR101348079B1 (en) | System for digital signing using portable terminal | |
Abubakar et al. | A lightweight and user-centric two-factor authentication mechanism for iot based on blockchain and smart contract | |
KR102517001B1 (en) | System and method for processing digital signature on a blockchain network | |
Weerasinghe et al. | Security framework for mobile banking | |
CN107370728B (en) | Instant license generation and verification system and method based on electronic license library | |
CN116980163A (en) | Data processing method, device, equipment and medium based on trusted execution environment | |
Wang et al. | Not yet another digital ID: privacy-preserving humanitarian aid distribution | |
CN111541708A (en) | Identity authentication method based on power distribution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |