CN109347634A - A kind of communication means and communication system of quantum communications interface - Google Patents
A kind of communication means and communication system of quantum communications interface Download PDFInfo
- Publication number
- CN109347634A CN109347634A CN201811308291.5A CN201811308291A CN109347634A CN 109347634 A CN109347634 A CN 109347634A CN 201811308291 A CN201811308291 A CN 201811308291A CN 109347634 A CN109347634 A CN 109347634A
- Authority
- CN
- China
- Prior art keywords
- quantum
- module
- key
- communication
- quantum communications
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
Abstract
The invention belongs to Technique on Quantum Communication fields, the communication means and communication system of a kind of quantum communications interface are disclosed, the communication system of quantum communications interface includes: photon transmitting module, receiving module, main control module, quantum parsing module, quantum coding module, quantum modulation module, encrypting module, communication evaluation module.The present invention has high security, independence, deployment convenient, fast, simple by encrypting module;Simultaneously, through communication evaluation module for entire quantum key distribution system, it being capable of maximum system throughput, maximize safe code rate error code negotiation algorithm be only it is optimal, in addition to negotiation efficiency, the otherwise performance of error code negotiation algorithm can also be had an important influence on the safe code rate of system.
Description
Technical field
The invention belongs to Technique on Quantum Communication field more particularly to a kind of communication means and communication system of quantum communications interface
System.
Background technique
Quantum communications refer to a kind of novel communication modes that information transmitting is carried out using entangled quantum effect.Quantum communication
It is the new interdisciplinary that recent two decades grow up, is quantum theory and the new research field that information theory combines.Quantum is logical
Letter relates generally to: quantum cryptography communication, quantum remotely pass state and quantum dense coding etc., this recent subject is gradually from theory
Experiment is moved towards, and is developed to functionization.The information transmission of highly effective and safe is increasingly subject to the concern of people.So-called quantum communications refer to
The novel communication modes of one kind that information transmitting is carried out using entangled quantum effect, it is novel crossed to be that recent two decades grow up
Subject is quantum theory and the new research field that information theory combines.Optical quantum communication is based primarily upon the theory of Quantum Entangled States,
Realize that information is transmitted using the mode of quantum teleportation (transmission).According to experimental verification, two particles with Entangled State without
By how far apart, as long as one changes, another can also change moment, realize that light quantum is logical using this characteristic
The process of letter is as follows: two particles are individually placed to communicating pair, will had not by a pair of particle with Entangled State of building in advance
The particle of the particle and sender of knowing quantum state carries out combined measurement (a kind of operation), then the particle moment of recipient collapses
(variation), collapse (variation) be certain state, the particle of this state and sender collapse the state after (variation) be symmetrically,
Then the information of combined measurement is sent to recipient by classical channel, receives the grain put according to the information received to collapsing
Son carries out Unitary transformation (being equivalent to reversal shift), can be obtained and the identical unknown quantum state of sender.However, existing
Quantum communications safety is not high;Meanwhile lacking comprehensive assessment to error code negotiation algorithm in quantum communications.
In conclusion problem of the existing technology is:
Existing quantum communications security is not high;Meanwhile lacking comprehensive analysis to error code negotiation algorithm in quantum communications.It is existing
Have in technology, the encryption of quantum communications, safety, independence, quick, simplicity is poor.
Summary of the invention
In view of the problems of the existing technology, the present invention provides the communication means and communication system of a kind of quantum communications interface
System.
The invention is realized in this way a kind of communication means of quantum communications interface, the communication of the quantum communications interface
Method includes:
Quantum signal is encrypted using encipheror;Include:
(1) quantum communications key storage step: for the handheld device in communication, the handheld device for initiating calling is caller
End, called handheld device are called end;The quantum communications key is encrypted based on the end-to-end handheld device of quantum cryptography
Method is stored in handheld device;
(2) initiate calling step: when needing to carry out coded communication, calling terminal initiates coded communication request to called end;
(3) quantum communications key synchronization step: called end receives after coded communication requests and confirm and answer, and sends key
Synchronization request message is to calling terminal;
(4) after calling terminal receives key synchronization request message, quantum communications confirmation of synchronization step: are read from its pool of keys
Key, then acknowledgement messages back is to called end;
(5) after called end receives confirmation message, it is close that corresponding quantum communications call answering step: are read from its pool of keys
Key;After quantum communications key is read successfully, called end send call encryption answer signal to calling terminal, calling terminal and called end into
Row coded communication;
(6) coded communication step: the cipher key management operation system of calling terminal passes through first agent's interface and second agent will
Data interaction information in quantum communications key distribution procedure is sent to apparatus management/control operating system;Apparatus management/control operating system is logical
It crosses classical channel and the data interaction information in quantum communications key distribution procedure is transferred to called end;The apparatus management/control of called end
After operating system receives the data interaction information in quantum communications key distribution procedure by classical channel, pass through the of called end
Data interaction information in quantum communications key distribution procedure is issued called end by the second agent of one proxy interface and called end
Cipher key management operation system;
(7) quantum signal transmitting step: the quantum communications encryption key distribution terminal control mechanism of calling terminal and the amount of called end
Sub- communication key distribution terminal control device is believed according to data interaction throughput in quantum communications key distribution procedure
Road carries out quantum signal transmission.
(8) quantum communications key updating step: the quantum communications key that the calling terminal and called end use all is set with
Life cycle;In communication process, the service life of the quantum communications key of calling terminal and called end respectively reaches setting state
Afterwards, by injection caller after quantum communications key is replaced by new quantum communications key, and newly quantum communications key is replaced successfully
The encryption/decryption module at end and called end;
In step (6), further comprise: by master key MSK and attribute set S, in conjunction with subgroup Gp3Generate key SK;It is logical
Cross access structure MVThe corresponding key SK of corresponding ciphertext CT and attribute set S restores outbound message;
The method for generating key SK specifically:
Select a random number t ∈ ZNAnd random elementAnd the key SK generated as the following formula:
Wherein, hiIndicate group element corresponding with the ith attribute element in attribute set U;
Restore outbound message M method particularly includes:
1) it enablesIt is defined as I={ j: ρ (j) ∈ S }, if enabledIt is the one of secret s
Then there is constant { ω in a sub-secretj∈ZNMake ∑j∈Iωjλj=s, whereina1,...,at-1To appoint
Meaning chooses t-1 random number, ZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MvThe polynomial time of size
It is inside found, recovers main secret;
2) following formula is calculated using the orthogonality of mixing rank Bilinear Groups:
Then message M=C/M'=Me (g, g) αs/e(g,g)αs;Wherein,For random element, C',
Cj、DxFor the part of obtained ciphertext CT, K, L, Kρ(j)Part for obtained key SK, hρ(j)In expression and attribute set U
The corresponding group element of a property element of ρ (j).
Further, in step (6), further comprise: algorithm is established in initialization: attribute of the input comprising all properties first
Set U, attribute is in different layerings;Then selecting a rank is N=p1p2p3Bilinearity compound group G, p1、p2、p3For not phase
Same prime number enablesExpression rank is piSubgroup, i=1,2,3;Then Stochastic a and α, random group elements are selectedWherein, a, α ∈ ZN, ZNIndicate 1 to N-1 integer;For in U | U | a property element, selection
Corresponding group elementThen common parameter PK and master key MSK are respectively as follows:
PK={ N, g, gα,e(g,g)a,h1,......,h|U|};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
Enabling attribute set S is the layering subset of attribute set U, according to attribute set S, common parameter PK, message M and one
The layering thresholding access structure (M generated in advanceV, ρ) attribute of attribute set U all levels is added with an expression formula
It is close to obtain ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable that attribute set S's is each
The number of attributes of layer is more than this layer of thresholding, and S is made to meet the access structure of layering;Specifically comprise the following steps:
Enable access structure MVIt is j × t matrix;
Select a random vector Indicate appointing in 1 to N integer set
It anticipates t, wherein s indicates secret value, y1,......,yt-1For the sharing of secret value s;
It enables| S | indicate number of elements possessed by S, setting meets:
…
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=| S |, and if only if for institute
0≤i having≤m, there is li≥ki, liIndicate the number of elements for possessing set S in i-th layer, kiIndicate the element of set S in i-th layer
Quantity thresholding;
Then for all j=1 ..., l0,...,lm, calculateMjIndicate MVIn jth row;
For the hierachy number i ∈ { 0 ..., m } of attribute set U, j=l is seti-1+ c, l-1=0, c are constant, indicate i-th
C-th of attribute of layer, i.e. j-th of attribute in attribute set U correspond to i-th layer of c-th of attribute;
Select random number rl0,......,rlm∈ZN。
Further, the attribute of all levels is subjected to encryption by following formula and obtains ciphertext CT:
Wherein, hρ(j)Indicate that group element corresponding with a property element of ρ (j) in attribute set U, ρ (j) indicate attribute
The attribute of jth layer is to access structure M in set UvJth row mapping.
Further, the communication means of the quantum communications interface and communication system specifically include:
Step 1 emits light pulse using photonic device by photon transmitting module;It is connect by receiving module using quantum
It receives device and receives quantum;
Step 2, main control module receive the state of quantum by Solution of Quantum analysis module using the parsing of Solution of Quantum parser;
Step 3 is encoded by quantum coding module using quantum bit of the quantum encoder to parsing quantum;Pass through
Quantum modulation module carries out quantum modulation using quantum bit of the Quantum modulator to quantum after coding;
Step 4 is encrypted quantum signal using encipheror by encrypting module;
Step 5 assesses quantum communications using error code negotiation algorithm by communication evaluation module.
Further, the communication evaluation module appraisal procedure includes:
1) error code negotiation efficiency is calculatedWherein N be to
The length of processing screening code, M are by the information of classical channel interaction in error code negotiations process, and S ∈ { 0,1 } N=length is N
Bit String, complete error code negotiate after correction code, I (A;B)=average mutual between any two stochastic variable A and B
Information, psucTo negotiate success rate;
2) by four error code negotiation efficiency, calculating time, network data waiting time and date transfer on network single fingers
Mark is integrated, and overall target formula is after integrationWherein f is that error code negotiates effect
Rate, N are the length of screening code to be processed, nmessageFor the data volume of interaction on classical channel, G (nmessage) it is interaction nmessage
The security key amount of data volume consumption, tcomputationFor treated length be N screening code when negotiation algorithm needed for the calculating time,
twaitingFor treated length be N screening code when wait network data consumed by the time;
3) using the performance of the assessment error code negotiation algorithm of overall target F described in step 2), the size of F and negotiation algorithm
Performance is directly proportional.
Another object of the present invention is to provide a kind of communication computer programs of quantum communications interface, which is characterized in that
The communication computer program of the quantum communications interface realizes the communication means of the quantum communications interface.
Another object of the present invention is to provide a kind of terminal, the terminal, which is at least carried, realizes the quantum communications interface
Communication means quantum communications controller.
Another object of the present invention is to provide a kind of computer readable storage mediums, including instruction, when it is in computer
When upper operation, so that computer executes the communication means of the quantum communications interface.
Another object of the present invention is to provide a kind of quantum communications of communication means for implementing the quantum communications interface
The communication system of the communication system of interface, the quantum communications interface includes:
Photon transmitting module, connect with main control module, for emitting light pulse by photonic device;
Receiving module is connect with main control module, receives quantum for throughput sub-receiver;
Main control module modulates mould with photon transmitting module, receiving module, quantum parsing module, quantum coding module, quantum
Block, encrypting module, communication evaluation module connection, work normally for controlling modules by single-chip microcontroller;
Quantum parsing module, connect with main control module, for receiving the state of quantum by the parsing of Solution of Quantum parser;
Quantum coding module, connect with main control module, for being carried out by quantum bit of the quantum encoder to parsing quantum
Coding;
Quantum modulation module, connect with main control module, for by Quantum modulator to the quantum bit of quantum after coding into
The modulation of row quantum;
Encrypting module is connect with main control module, for quantum signal to be encrypted by encipheror;
Evaluation module is communicated, is connect with main control module, for being assessed by error code negotiation algorithm quantum communications.
Another object of the present invention is to provide the quantum that one kind at least carries the communication system of the quantum communications interface
Communication equipment.
Advantages of the present invention and good effect are as follows:
The present invention makes quantum communications cipher key management interface, amount by encrypting module in quantum communications key distribution procedure
Sub- communication key assigning process control is physically isolated with apparatus management/control system interface, and it is real to enhance practical quantum communication key distribution
The safety of existing process;When needing to carry out speech scrambling, calling terminal initiates speech scrambling solicited message to called end;The present invention
Encryption have high security, independence, deployment it is convenient, fast, simple;Meanwhile by communication evaluation module for entirely measuring
For quantum key distribution system, can maximum system throughput, that is, the error code negotiation algorithm for maximizing safe code rate is only most
Excellent, in addition to negotiation efficiency, the otherwise performance of error code negotiation algorithm can also be had an important influence on the safe code rate of system.
The present invention is using the core index of quantum key distribution system --- and safe code rate proposes a kind of error code as starting point
Negotiation algorithm evaluation scheme, the program include four single indexs and a comprehensive evaluation index, and four single indexs are respectively
It is existing negotiation efficiency and algorithm operation time proposed by the present invention, network data waiting time and date transfer on network, comprehensive
It is the comprehensive score for inputting parameter that conjunction index, which is with four single indexs,.The program can more accurately reflect negotiation algorithm for
The performance of error code negotiation algorithm more comprehensively, is accurately assessed in the influence of whole system performance.
The present invention corresponds to attribute in the generator matrix of access structure, according to the importance of attribute, controls time of f operation
Number, the f operation times that important attribute carries out are few, thus the secret for including is more, and the f operation result of generation is then mapped to life
At in matrix, so that realization is relative to existing hierarchical attribute encipherment scheme, operation times are less more efficient;
The correspondence row insertion of the access structure of layering is entered for each attribute of layering when encryption, is divided to realize
Layer and fine granularity access structure combine;
0th layer of attribute is individually listed in ciphering process and is encrypted by traditional encipherment scheme, and the present invention will
The attribute of all levels is encrypted with a kind of expression formula, and ciphertext format is simplified.
Detailed description of the invention
Fig. 1 is the communication means flow chart that the present invention implements the quantum communications interface provided.
Fig. 2 is the communication system architecture block diagram that the present invention implements the quantum communications interface provided.
In Fig. 2: 1, photon transmitting module;2, receiving module;3, main control module;4, quantum parsing module;5, quantum coding
Module;6, quantum modulation module;7, encrypting module;8, evaluation module is communicated.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
With reference to the accompanying drawing and specific embodiment is further described application principle of the invention.
As shown in Figure 1, the communication means of quantum communications interface provided in an embodiment of the present invention, comprising the following steps:
S101 emits light pulse using photonic device by photon transmitting module;It is received by receiving module using quantum
Device receives quantum;
S102, main control module receive the state of quantum by Solution of Quantum analysis module using the parsing of Solution of Quantum parser;
S103 is encoded by quantum coding module using quantum bit of the quantum encoder to parsing quantum;Throughput
Sub- modulation module carries out quantum modulation using quantum bit of the Quantum modulator to quantum after coding;
S104 is encrypted quantum signal using encipheror by encrypting module;
Step S105 assesses quantum communications using error code negotiation algorithm by communication evaluation module.
As shown in Fig. 2, quantum communication system provided by the invention includes: photon transmitting module 1, receiving module 2, master control mould
Block 3, quantum parsing module 4, quantum coding module 5, quantum modulation module 6, encrypting module 7, communication evaluation module 8.
Photon transmitting module 1 is connect with main control module 3, for emitting light pulse by photonic device;
Receiving module 2 is connect with main control module 3, receives quantum for throughput sub-receiver;
Main control module 3, with photon transmitting module 1, receiving module 2, quantum parsing module 4, quantum coding module 5, quantum
Modulation module 6, encrypting module 7, communication evaluation module 8 connect, and work normally for controlling modules by single-chip microcontroller;
Quantum parsing module 4 is connect with main control module 3, for receiving the state of quantum by the parsing of Solution of Quantum parser;
Quantum coding module 5 is connect with main control module 3, for by quantum encoder to parsing quantum quantum bit into
Row coding;
Quantum modulation module 6 is connect with main control module 3, for the quantum bit by Quantum modulator to quantum after coding
Carry out quantum modulation;
Encrypting module 7 is connect with main control module 3, for quantum signal to be encrypted by encipheror;
Evaluation module 8 is communicated, is connect with main control module 3, for being assessed by error code negotiation algorithm quantum communications.
7 encryption method of encrypting module provided by the invention is as follows:
(1) quantum communications key storage step: for the handheld device in communication, the handheld device for initiating calling is caller
End, called handheld device are called end;The quantum communications key is encrypted based on the end-to-end handheld device of quantum cryptography
Method is stored in handheld device;
(2) initiate calling step: when needing to carry out coded communication, calling terminal initiates coded communication request to called end;
(3) quantum communications key synchronization step: called end receives after coded communication requests and confirm and answer, and sends key
Synchronization request message is to calling terminal;
(4) after calling terminal receives key synchronization request message, quantum communications confirmation of synchronization step: are read from its pool of keys
Key, then acknowledgement messages back is to called end;
(5) after called end receives confirmation message, it is close that corresponding quantum communications call answering step: are read from its pool of keys
Key;After quantum communications key is read successfully, called end send call encryption answer signal to calling terminal, calling terminal and called end into
Row coded communication;
(6) coded communication step: the cipher key management operation system of calling terminal passes through first agent's interface and second agent will
Data interaction information in quantum communications key distribution procedure is sent to apparatus management/control operating system;Apparatus management/control operating system is logical
It crosses classical channel and the data interaction information in quantum communications key distribution procedure is transferred to called end;The apparatus management/control of called end
After operating system receives the data interaction information in quantum communications key distribution procedure by classical channel, pass through the of called end
Data interaction information in quantum communications key distribution procedure is issued called end by the second agent of one proxy interface and called end
Cipher key management operation system;
(7) quantum signal transmitting step: the quantum communications encryption key distribution terminal control mechanism of calling terminal and the amount of called end
Sub- communication key distribution terminal control device is believed according to data interaction throughput in quantum communications key distribution procedure
Road carries out quantum signal transmission.
(8) quantum communications key updating step: the quantum communications key that the calling terminal and called end use all is set with
Life cycle;In communication process, the service life of the quantum communications key of calling terminal and called end respectively reaches setting state
Afterwards, by injection caller after quantum communications key is replaced by new quantum communications key, and newly quantum communications key is replaced successfully
The encryption/decryption module at end and called end.
8 appraisal procedures of communication evaluation module provided by the invention are as follows:
1) error code negotiation efficiency is calculatedWherein N be to
The length of processing screening code, M are by the information of classical channel interaction in error code negotiations process, and S ∈ { 0,1 } N=length is N
Bit String, complete error code negotiate after correction code, I (A;B)=average mutual between any two stochastic variable A and B
Information, psucTo negotiate success rate;
2) by four error code negotiation efficiency, calculating time, network data waiting time and date transfer on network single fingers
Mark is integrated, and overall target formula is after integrationWherein f is that error code negotiates effect
Rate, N are the length of screening code to be processed, nmessageFor the data volume of interaction on classical channel, G (nmessage) it is interaction nmessage
The security key amount of data volume consumption, tcomputationFor treated length be N screening code when negotiation algorithm needed for the calculating time,
twaitingFor treated length be N screening code when wait network data consumed by the time;
3) using the performance of the assessment error code negotiation algorithm of overall target F described in step 2), the size of F and negotiation algorithm
Performance is directly proportional.
Below with reference to concrete analysis, the invention will be further described.
The communication means of quantum communications interface provided in an embodiment of the present invention, the communication means packet of the quantum communications interface
It includes:
Quantum signal is encrypted using encipheror;Include:
(1) quantum communications key storage step: for the handheld device in communication, the handheld device for initiating calling is caller
End, called handheld device are called end;The quantum communications key is encrypted based on the end-to-end handheld device of quantum cryptography
Method is stored in handheld device;
(2) initiate calling step: when needing to carry out coded communication, calling terminal initiates coded communication request to called end;
(3) quantum communications key synchronization step: called end receives after coded communication requests and confirm and answer, and sends key
Synchronization request message is to calling terminal;
(4) after calling terminal receives key synchronization request message, quantum communications confirmation of synchronization step: are read from its pool of keys
Key, then acknowledgement messages back is to called end;
(5) after called end receives confirmation message, it is close that corresponding quantum communications call answering step: are read from its pool of keys
Key;After quantum communications key is read successfully, called end send call encryption answer signal to calling terminal, calling terminal and called end into
Row coded communication;
(6) coded communication step: the cipher key management operation system of calling terminal passes through first agent's interface and second agent will
Data interaction information in quantum communications key distribution procedure is sent to apparatus management/control operating system;Apparatus management/control operating system is logical
It crosses classical channel and the data interaction information in quantum communications key distribution procedure is transferred to called end;The apparatus management/control of called end
After operating system receives the data interaction information in quantum communications key distribution procedure by classical channel, pass through the of called end
Data interaction information in quantum communications key distribution procedure is issued called end by the second agent of one proxy interface and called end
Cipher key management operation system;
(7) quantum signal transmitting step: the quantum communications encryption key distribution terminal control mechanism of calling terminal and the amount of called end
Sub- communication key distribution terminal control device is believed according to data interaction throughput in quantum communications key distribution procedure
Road carries out quantum signal transmission.
(8) quantum communications key updating step: the quantum communications key that the calling terminal and called end use all is set with
Life cycle;In communication process, the service life of the quantum communications key of calling terminal and called end respectively reaches setting state
Afterwards, by injection caller after quantum communications key is replaced by new quantum communications key, and newly quantum communications key is replaced successfully
The encryption/decryption module at end and called end;
In step (6), further comprise: by master key MSK and attribute set S, in conjunction with subgroup Gp3Generate key SK;It is logical
Cross access structure MVThe corresponding key SK of corresponding ciphertext CT and attribute set S restores outbound message;
The method for generating key SK specifically:
Select a random number t ∈ ZNAnd random elementAnd the key SK generated as the following formula:
Wherein, hiIndicate group element corresponding with the ith attribute element in attribute set U;
Restore outbound message M method particularly includes:
1) it enablesIt is defined as I={ j: ρ (j) ∈ S }, if enabledIt is the one of secret s
Then there is constant { ω in a sub-secretj∈ZNMake ∑j∈Iωjλj=s, whereina1,...,at-1To appoint
Meaning chooses t-1 random number, ZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MvThe polynomial time of size
It is inside found, recovers main secret;
2) following formula is calculated using the orthogonality of mixing rank Bilinear Groups:
Then message M=C/M'=Me (g, g)αs/e(g,g)αs;Wherein,For random element, C',
Cj、DxFor the part of obtained ciphertext CT, K, L, Kρ(j)Part for obtained key SK, hρ(j)In expression and attribute set U
The corresponding group element of a property element of ρ (j).
In step (6), further comprise: algorithm is established in initialization: attribute set U of the input comprising all properties first,
Attribute is in different layerings;Then selecting a rank is N=p1p2p3Bilinearity compound group G, p1、p2、p3For different element
Number enablesExpression rank is piSubgroup, i=1,2,3;Then Stochastic a and α, random group elements are selectedWherein, a, α ∈ ZN, ZNIndicate 1 to N-1 integer;For in U | U | a property element, selection pair
The group element answeredThen common parameter PK and master key MSK are respectively as follows:
PK={ N, g, gα,e(g,g)a,h1,......,h|U|};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
Enabling attribute set S is the layering subset of attribute set U, according to attribute set S, common parameter PK, message M and one
The layering thresholding access structure (M generated in advanceV, ρ) attribute of attribute set U all levels is added with an expression formula
It is close to obtain ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable that attribute set S's is each
The number of attributes of layer is more than this layer of thresholding, and S is made to meet the access structure of layering;Specifically comprise the following steps:
Enable access structure MVIt is j × t matrix;
Select a random vector Indicate appointing in 1 to N integer set
It anticipates t, wherein s indicates secret value, y1,......,yt-1For the sharing of secret value s;
It enables| S | indicate number of elements possessed by S, setting meets:
…
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=| S |, and if only if for institute
0≤i having≤m, there is li≥ki, liIndicate the number of elements for possessing set S in i-th layer, kiIndicate the element of set S in i-th layer
Quantity thresholding;
Then for all j=1 ..., l0,...,lm, calculateMjIndicate MVIn jth row;
For the hierachy number i ∈ { 0 ..., m } of attribute set U, j=l is seti-1+ c, l-1=0, c are constant, indicate i-th
C-th of attribute of layer, i.e. j-th of attribute in attribute set U correspond to i-th layer of c-th of attribute;
Select random number
The attribute of all levels is subjected to encryption by following formula and obtains ciphertext CT:
Wherein, hρ(j)Indicate that group element corresponding with a property element of ρ (j) in attribute set U, ρ (j) indicate attribute
The attribute of jth layer is to access structure M in set UvJth row mapping.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or any combination thereof real
It is existing.When using entirely or partly realizing in the form of a computer program product, the computer program product include one or
Multiple computer instructions.When loading on computers or executing the computer program instructions, entirely or partly generate according to
Process described in the embodiment of the present invention or function.The computer can be general purpose computer, special purpose computer, computer network
Network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or from one
Computer readable storage medium is transmitted to another computer readable storage medium, for example, the computer instruction can be from one
A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission).The computer-readable storage medium can be any usable medium or include one that computer can access
The data storage devices such as a or multiple usable mediums integrated server, data center.The usable medium can be magnetic Jie
Matter, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid
State Disk (SSD)) etc..
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of communication means of quantum communications interface, which is characterized in that the communication means of the quantum communications interface includes: benefit
Quantum signal is encrypted with encipheror;Include:
(1) quantum communications key storage step: for the handheld device in communication, the handheld device for initiating calling is calling terminal,
Called handheld device is called end;End-to-end handheld device encryption method of the quantum communications key based on quantum cryptography
It is stored in handheld device;
(2) initiate calling step: when needing to carry out coded communication, calling terminal initiates coded communication request to called end;
(3) quantum communications key synchronization step: called end receives after coded communication requests and confirm and answer, and sends key synchronization
Request message is to calling terminal;
(4) after calling terminal receives key synchronization request message, it is close that quantum communications confirmation of synchronization step: are read from its pool of keys
Key, then acknowledgement messages back is to called end;
(5) after called end receives confirmation message, corresponding quantum communications key call answering step: is read from its pool of keys;
After quantum communications key is read successfully, called end sends call encryption answer signal and carries out to calling terminal, calling terminal and called end
Coded communication;
(6) coded communication step: the cipher key management operation system of calling terminal passes through first agent's interface and second agent for quantum
Data interaction information in communication key assigning process is sent to apparatus management/control operating system;Apparatus management/control operating system pass through through
Data interaction information in quantum communications key distribution procedure is transferred to called end by allusion quotation channel;The apparatus management/control of called end operates
After system receives the data interaction information in quantum communications key distribution procedure by classical channel, pass through the first generation of called end
Data interaction information in quantum communications key distribution procedure is issued the close of called end by the second agent of reason interface and called end
Key manages operating system;
(7) quantum signal transmitting step: the quantum communications encryption key distribution terminal control mechanism of calling terminal and the quantum of called end are logical
Believe encryption key distribution terminal control mechanism according to the data interaction throughput subchannel in quantum communications key distribution procedure into
The transmission of row quantum signal.
(8) quantum communications key updating step: the quantum communications key that the calling terminal and called end use all is set with life
Period;In communication process, after the service life of the quantum communications key of calling terminal and called end respectively reaches setting state, amount
Sub- communication key is replaced by new quantum communications key, and new quantum communications key replace successfully after by injection calling terminal and by
It is the encryption/decryption module at end;
In step (6), further comprise: by master key MSK and attribute set S, in conjunction with subgroupGenerate key SK;Pass through
Access structure MVThe corresponding key SK of corresponding ciphertext CT and attribute set S restores outbound message;
The method for generating key SK specifically:
Select a random number t ∈ ZNAnd random elementAnd the key SK generated as the following formula:
Wherein, hiIndicate group element corresponding with the ith attribute element in attribute set U;
Restore outbound message M method particularly includes:
1) it enablesIt is defined as I={ j: ρ (j) ∈ S }, if enabledIt is a son of secret s
Then there is constant { ω in secretj∈ZNMake ∑j∈Iωjλj=s, whereina1,...,at-1Arbitrarily to select
Take t-1 random number, ZNIndicate 1 integer set for arriving N;ωjIn privacy sharing generator matrix MvQuilt in the polynomial time of size
It finds, recovers main secret;
2) following formula is calculated using the orthogonality of mixing rank Bilinear Groups:
Then message M=C/M'=Me (g, g)αs/e(g,g)αs;Wherein,For random element, C', Cj、DxFor
The part of obtained ciphertext CT, K, L, Kρ(j)Part for obtained key SK, hρ(j)It indicates and the ρ (j) in attribute set U
The corresponding group element of a property element.
2. the communication means of quantum communications interface as described in claim 1, which is characterized in that in step (6), further wrap
Include: algorithm is established in initialization: attribute set U of the input comprising all properties first, attribute is in different layerings;Then it selects
One rank is N=p1p2p3Bilinearity compound group G, p1、p2、p3For different prime number, enableExpression rank is piSubgroup, i=
1,2,3;Then Stochastic a and α, random group elements are selectedWherein, a, α ∈ ZN, ZNIndicate 1 to
The integer of N-1;For in U | U | a property element selects corresponding group elementThen common parameter PK and
Master key MSK is respectively as follows:
PK={ N, g, gα,e(g,g)a,h1,......,h|U|};
MSK={ α, X3};
Wherein, e (g, g)aIndicate Bilinear map;
Enabling attribute set S is the layering subset of attribute set U, in advance according to attribute set S, common parameter PK, message M and one
The layering thresholding access structure (M of generationV, ρ) attribute of attribute set U all levels encrypt with an expression formula
To ciphertext CT, wherein function ρ indicates hierarchical access structure MVIn row to attribute mapping;Enable each layer of attribute set S
Number of attributes is more than this layer of thresholding, and S is made to meet the access structure of layering;Specifically comprise the following steps:
Enable access structure MVIt is j × t matrix;
Select a random vector Indicate any t in 1 to N integer set,
Wherein, s indicates secret value, y1,......,yt-1For the sharing of secret value s;
It enables| S | indicate number of elements possessed by S, setting meets:
…
Wherein, U0,…,UmIndicate the 0th to m layer of set U, 0≤l0≤l1≤...≤lm=| S |, and if only if for all
0≤i≤m, there is li≥ki, liIndicate the number of elements for possessing set S in i-th layer, kiIndicate the number of elements of set S in i-th layer
Thresholding;
Then for all j=1 ..., l0,...,lm, calculateMjIndicate MVIn jth row;
For the hierachy number i ∈ { 0 ..., m } of attribute set U, j=l is seti-1+ c, l-1=0, c are constant, indicate i-th layer
C-th of attribute, i.e. j-th of attribute in attribute set U correspond to i-th layer of c-th of attribute;
Select random number
3. the communication means of quantum communications interface as described in claim 1, which is characterized in that pass through the attribute of all levels
Following formula carries out encryption and obtains ciphertext CT:
Wherein, hρ(j)Indicate that group element corresponding with a property element of ρ (j) in attribute set U, ρ (j) indicate attribute set U
The attribute of middle jth layer is to access structure MvJth row mapping.
4. the communication means of quantum communications interface as described in claim 1, which is characterized in that the quantum communications interface leads to
Letter method and communication system specifically include:
Step 1 emits light pulse using photonic device by photon transmitting module;Pass through receiving module utilization sub-receiver
Receive quantum;
Step 2, main control module receive the state of quantum by Solution of Quantum analysis module using the parsing of Solution of Quantum parser;
Step 3 is encoded by quantum coding module using quantum bit of the quantum encoder to parsing quantum;Pass through quantum
Modulation module carries out quantum modulation using quantum bit of the Quantum modulator to quantum after coding;
Step 4 is encrypted quantum signal using encipheror by encrypting module;
Step 5 assesses quantum communications using error code negotiation algorithm by communication evaluation module.
5. the communication means of quantum communications interface as claimed in claim 3, which is characterized in that the communication evaluation module assessment
Method includes:
1) error code negotiation efficiency is calculatedWherein N is to be processed
The length of code is screened, M is by the information of classical channel interaction in error code negotiations process, and S ∈ { 0,1 } N=length is the ratio of N
Spy's string completes the correction code after error code is negotiated, I (A;B)=Average Mutual between any two stochastic variable A and B,
psucTo negotiate success rate;
2) by error code negotiation efficiency, calculate the time, four single indexs of network data waiting time and date transfer on network into
Row integration, overall target formula is after integrationWherein f is error code negotiation efficiency, N
For the length of screening code to be processed, nmessageFor the data volume of interaction on classical channel, G (nmessage) it is interaction nmessageData
Measure the security key amount of consumption, tcomputationFor treated length be N screening code when negotiation algorithm needed for the calculating time,
twaitingFor treated length be N screening code when wait network data consumed by the time;
3) performance of the assessment error code negotiation algorithm of overall target F described in step 2), the size of F and the performance of negotiation algorithm are utilized
It is directly proportional.
6. a kind of communication computer program of quantum communications interface, which is characterized in that the communication of the quantum communications interface calculates
Machine program realizes the communication means of quantum communications interface described in Claims 1 to 5 any one.
7. a kind of terminal, which is characterized in that the terminal, which is at least carried, realizes that quantum described in Claims 1 to 5 any one is logical
Believe the quantum communications controller of the communication means of interface.
8. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer is executed as weighed
Benefit requires the communication means of quantum communications interface described in 1-5 any one.
9. a kind of communication system of the quantum communications interface for the communication means for implementing quantum communications interface described in claim 1,
It is characterized in that, the communication system of the quantum communications interface includes:
Photon transmitting module, connect with main control module, for emitting light pulse by photonic device;
Receiving module is connect with main control module, receives quantum for throughput sub-receiver;
Main control module, with photon transmitting module, receiving module, quantum parsing module, quantum coding module, quantum modulation module,
Encrypting module, communication evaluation module connection, work normally for controlling modules by single-chip microcontroller;
Quantum parsing module, connect with main control module, for receiving the state of quantum by the parsing of Solution of Quantum parser;
Quantum coding module, connect with main control module, for being encoded by quantum bit of the quantum encoder to parsing quantum;
Quantum modulation module, connect with main control module, for the quantum bit amount of progress by Quantum modulator to quantum after coding
Son modulation;
Encrypting module is connect with main control module, for quantum signal to be encrypted by encipheror;
Evaluation module is communicated, is connect with main control module, for being assessed by error code negotiation algorithm quantum communications.
10. a kind of quantum communications equipment for the communication system at least carrying quantum communications interface described in claim 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811308291.5A CN109347634A (en) | 2018-11-05 | 2018-11-05 | A kind of communication means and communication system of quantum communications interface |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811308291.5A CN109347634A (en) | 2018-11-05 | 2018-11-05 | A kind of communication means and communication system of quantum communications interface |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109347634A true CN109347634A (en) | 2019-02-15 |
Family
ID=65314011
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811308291.5A Pending CN109347634A (en) | 2018-11-05 | 2018-11-05 | A kind of communication means and communication system of quantum communications interface |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109347634A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327365A (en) * | 2020-03-05 | 2020-06-23 | 中国科学技术大学 | Satellite-ground quantum key distribution synchronization method and device based on non-periodic synchronization light |
US20220294545A1 (en) * | 2021-03-09 | 2022-09-15 | Apple Inc. | Multi-phase-level signaling to improve data bandwidth over lossy channels |
US11606230B2 (en) | 2021-03-03 | 2023-03-14 | Apple Inc. | Channel equalization |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1865657A1 (en) * | 2006-06-09 | 2007-12-12 | Kabushiki Kaisha Toshiba | Quantum communciation system, quantum repeater apparatus, quantum repeater method, and computer program product |
CN103501221A (en) * | 2013-09-29 | 2014-01-08 | 哈尔滨工业大学 | Evaluating method of error code negotiation algorithm for quantum communication |
CN104780040A (en) * | 2015-04-06 | 2015-07-15 | 安徽问天量子科技股份有限公司 | Handheld device encryption method and system based on quantum cryptography |
CN105024801A (en) * | 2015-07-06 | 2015-11-04 | 国网山东寿光市供电公司 | Quantum encryption communication method |
CN105406967A (en) * | 2015-12-10 | 2016-03-16 | 西安电子科技大学 | Hierarchical attribute encryption method |
CN107294717A (en) * | 2017-08-15 | 2017-10-24 | 无锡南理工科技发展有限公司 | Long-range quantum encryption communication system |
CN108490882A (en) * | 2018-05-21 | 2018-09-04 | 广东水利电力职业技术学院(广东省水利电力技工学校) | A kind of laser engraving machine, control system and control method |
-
2018
- 2018-11-05 CN CN201811308291.5A patent/CN109347634A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1865657A1 (en) * | 2006-06-09 | 2007-12-12 | Kabushiki Kaisha Toshiba | Quantum communciation system, quantum repeater apparatus, quantum repeater method, and computer program product |
CN103501221A (en) * | 2013-09-29 | 2014-01-08 | 哈尔滨工业大学 | Evaluating method of error code negotiation algorithm for quantum communication |
CN104780040A (en) * | 2015-04-06 | 2015-07-15 | 安徽问天量子科技股份有限公司 | Handheld device encryption method and system based on quantum cryptography |
CN105024801A (en) * | 2015-07-06 | 2015-11-04 | 国网山东寿光市供电公司 | Quantum encryption communication method |
CN105406967A (en) * | 2015-12-10 | 2016-03-16 | 西安电子科技大学 | Hierarchical attribute encryption method |
CN107294717A (en) * | 2017-08-15 | 2017-10-24 | 无锡南理工科技发展有限公司 | Long-range quantum encryption communication system |
CN108490882A (en) * | 2018-05-21 | 2018-09-04 | 广东水利电力职业技术学院(广东省水利电力技工学校) | A kind of laser engraving machine, control system and control method |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111327365A (en) * | 2020-03-05 | 2020-06-23 | 中国科学技术大学 | Satellite-ground quantum key distribution synchronization method and device based on non-periodic synchronization light |
US11606230B2 (en) | 2021-03-03 | 2023-03-14 | Apple Inc. | Channel equalization |
US20220294545A1 (en) * | 2021-03-09 | 2022-09-15 | Apple Inc. | Multi-phase-level signaling to improve data bandwidth over lossy channels |
US11784731B2 (en) * | 2021-03-09 | 2023-10-10 | Apple Inc. | Multi-phase-level signaling to improve data bandwidth over lossy channels |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019099526A1 (en) | Method and system for quantum key distribution and data processing | |
Yang et al. | Cloud based data sharing with fine-grained proxy re-encryption | |
WO2020259635A1 (en) | Method and apparatus for sharing blockchain data | |
CN107689947B (en) | Data processing method and device | |
CN109995513A (en) | A kind of quantum key Information Mobile Service method of low latency | |
US20180109372A1 (en) | Method and system for quantum key distribution based on trusted computing | |
WO2018071191A2 (en) | Method and system for data security based on quantum communication and trusted computing | |
CN104660602A (en) | Quantum key transmission control method and system | |
CN109347634A (en) | A kind of communication means and communication system of quantum communications interface | |
CN113141252B (en) | Quantum key distribution method, quantum communication method, device and system | |
CN109995514A (en) | A kind of safe and efficient quantum key Information Mobile Service method | |
CN108600174B (en) | Access control mechanism of large cooperative network and implementation method thereof | |
CN109039611B (en) | Decruption key segmentation and decryption method, device, medium based on SM9 algorithm | |
CN104158880A (en) | User-end cloud data sharing solution | |
CN109756877A (en) | A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment | |
CN101170404A (en) | Method for secret key configuration based on specified group | |
WO2021062518A1 (en) | Obtaining keys from broadcasters in supersingular isogeny-based cryptosystems | |
Niu et al. | Security analysis of measurement-device-independent quantum secure direct communication | |
CN110620660A (en) | Key distribution method for data communication based on block chain | |
JPH09321748A (en) | Communication system by shared cryptographic key, server device and client device for the system, and method for sharing cryptographic key in communication system | |
JP6058514B2 (en) | Cryptographic processing method, cryptographic system, and server | |
Lou et al. | Benchmark performance of digital qkd platform using quantum permutation pad | |
Ma et al. | Development of video encryption scheme based on quantum controlled dense coding using GHZ state for smart home scenario | |
CN113810187B (en) | High-speed quantum key distribution system and method | |
US11310040B2 (en) | Quantum cipher based on phase inversion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190215 |