CN109510706A - Surpass the heterogeneous wireless communication method and system of Entangled State based on photon - Google Patents

Surpass the heterogeneous wireless communication method and system of Entangled State based on photon Download PDF

Info

Publication number
CN109510706A
CN109510706A CN201910012575.8A CN201910012575A CN109510706A CN 109510706 A CN109510706 A CN 109510706A CN 201910012575 A CN201910012575 A CN 201910012575A CN 109510706 A CN109510706 A CN 109510706A
Authority
CN
China
Prior art keywords
access point
wireless client
photon
entangled state
super
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910012575.8A
Other languages
Chinese (zh)
Other versions
CN109510706B (en
Inventor
马鸿洋
徐鹏翱
李嘉鑫
刘倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao University of Technology
Original Assignee
Qingdao University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao University of Technology filed Critical Qingdao University of Technology
Priority to CN201910012575.8A priority Critical patent/CN109510706B/en
Publication of CN109510706A publication Critical patent/CN109510706A/en
Application granted granted Critical
Publication of CN109510706B publication Critical patent/CN109510706B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of heterogeneous wireless communication method and system for surpassing Entangled State based on photon, this method is by carrying out quantization for wireless network keys, it generates the super of quantum and tangles state, the encryption key distribution of wireless network is carried out using the super Entangled State of quantum, it does not need to change some infrastructure devices such as user, database, server, it only needs some super equipment of tangling to can be carried out the quantum key certification of super Entangled State, and more keys can be subjected to coding transmission using super Entangled State;Channel capacity can be improved, super parallel computation, safety can also be greatly improved, the quantum-key distribution scheme between mobile identifier and information server is effectively solved, overcomes the shortcomings of that radio network information is easily stolen and the too low bring information security of encryption level.

Description

Surpass the heterogeneous wireless communication method and system of Entangled State based on photon
Technical field
The disclosure belongs to the technical field of wireless communication safety, be related to it is a kind of based on photon surpass the isomery of Entangled State without Line communication means and system.
Background technique
Only there is provided background technical informations relevant to the disclosure for the statement of this part, it is not necessary to so constitute first skill Art.
With the development of science and technology, wireless network is quickly grown, it is the communication system that electromagnetic wave intersects with network technology System, although data transmission is efficient and convenient, the problem in data safety is also following, due to using electromagnetic communication, dissipates The aerial data of cloth are highly susceptible to the attack of EVE, it is easy to stolen to get data.So solving wireless network Safety problem is very important.
Due to the development of quantum information science, some theoretical gradually realityization, since quantum key is in theoretically absolutely The influence of safety, for above-mentioned safety issue, document " remotely passes the wireless Ad Hoc quantum communication network of state based on quantum Routing Protocol ", it proposes wireless Ad Hoc quantum communication network concept and designs its Routing Protocol, when node receives response message Afterwards, data are transmitted in wireless Ad Hoc quantum communication network using entanglement transfer and both ends approach method;The agreement considers How quantum teleportation communication is carried out in complicated wireless quantum communication network, but there is no consider that changing wireless network shows Some key hierarchies.Document " the data link layer selective repeat protocol based on quantum teleportation " proposes hidden based on quantum Shape passes the data link layer selective repeat protocol of state, the data lost with mistake is only retransmitted, when reducing the propagation of communication process Prolong, improve communication efficiency, reduce the burden of classical channel, but is not related to the variation of existing key hierarchy still.
Summary of the invention
For the deficiencies in the prior art, one or more other embodiments of the present disclosure provide a kind of super based on photon The heterogeneous wireless communication method and system of Entangled State generate the super of quantum and tangle by the way that wireless network keys are carried out quantization State carries out the encryption key distribution of wireless network using the super Entangled State of quantum, does not need to change user, database, server etc. Some infrastructure devices, it is only necessary to which some super equipment of tangling can be carried out the quantum key certification of super Entangled State, and utilize super More keys can be carried out coding transmission by Entangled State;Channel capacity, super parallel computation can be improved, moreover it is possible to greatly improve Safety effectively solves the quantum-key distribution scheme between mobile identifier and information server, wireless network is overcome to believe Breath easily steals the deficiency with the too low bring information security of encryption level.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of isomery for surpassing Entangled State based on photon is provided Wireless communications method.
A kind of heterogeneous wireless communication method surpassing Entangled State based on photon, this method comprises:
Wireless client and access point are associated, and access point passes through certificate server to wireless client after establishing connection Authentication is carried out, wireless client obtains the authorization for using connectivity port after authenticating successfully;
Access point starts four way handshake protocols, and access point sends verify data packet, wireless client termination to wireless client It receives verify data packet and judges data integrity, random data packet is generated when data are complete and is sent to access point, access point and nothing Line client, which generates to have to surpass according to the MAC Address of verify data packet, random data packet and access point, wireless client, tangles shape The quantization pairwise key of state;
Access point starts four way handshake protocols, and access point is sent to wireless client to be encoded into the super amount for tangling state Sub- bit stream, wireless client send GTK decoded information to access point, and generation has the super quantization master key for tangling state, It is authenticated between wireless client and access point, PTK and GTK load success;
It determines that PTK, GTK of access point and wireless client are new, and determines that PMK is identical and newest, access point Carry out data transmission between wireless client;
It after wireless client the data transfer ends, is sent to access point and nullifies data frame, access point returns to log-off message extremely The authorized ports of wireless client, access point revert to original state.
Further, in the method, the specific steps that the wireless client and access point are associated include:
Wireless client sends association request data frame to access point;
Access point receives association request data frame, returns to association request and replys data frame to wireless client;
Wireless client receives association request and replys data frame, and whether just the association request judged replys data frame Often, then wireless client and access point are associated if normal, otherwise, cancel association.
Further, in the method, described access point carries out authentication to wireless client by certificate server, Wireless client obtains the authorization for using connectivity port after authenticating successfully, and specific steps include:
Wireless client sends starting frame to access point;
Access point receives starting frame, returns to authentication and requires to wireless client;
Wireless client receives authentication requirement, replys identity authentication message to access point, access point, which receives identity, to be recognized Card message is carried out conversion package and is sent to certificate server;
The authentication of access point is required to be packaged and is sent to wireless client by access point by certificate server;
Wireless client receives the authentication requirement for passing through the access point of encapsulation, replys identity authentication message to access Point, access point receive identity authentication message carried out conversion package be sent to certificate server;
The identity authentication message of package is carried out package and is converted to access point success frame hair by access point by certificate server It send to wireless client, wireless client obtains the authorization for using connectivity port.
Further, in the method, when wireless client and access point are associated, access point is to wireless client Send the information comprising field value;
The verify data packet includes the MAC Address and playback counter field value of access point.
Further, in the method, the wireless client reception verify data packet judges the specific of data integrity Step includes:
Wireless client obtains playback counter field value m from the verify data packet received1, with association process before When the field value m that receives2It is compared,
If m1≤m2, then the data are imperfect, and wireless client abandons the data frame;
If m1>m2, wireless client generation includes the client random data packet of own MAC address information.
Further, in the method, described access point, wireless client and certificate server can produce and treating capacity The super Entangled State of son.
Further, in the method, state is tangled with the super quantization pairwise key for tangling state and with super Quantization master key selects two freedom degrees to tangle, including polarization freedom degree is tangled and tangled with spatial degrees of freedom.
Further, in the method, the close of pairwise key and master key is carried out using tangling greater than two freedom degrees Key information coding.
According to the other side of one or more other embodiments of the present disclosure, also provides and a kind of Entangled State is surpassed based on photon Heterogeneous wireless communication system.
A kind of heterogeneous wireless communication system surpassing Entangled State based on photon is based on the super Entangled State of photon using described one kind Heterogeneous wireless communication method, including sequentially connected wireless client, access point and certificate server.
Further, in the method, the wireless client, access point and certificate server are that can produce and handle The equipment of the super Entangled State of quantum.
The disclosure the utility model has the advantages that
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, do not need variation one A little infrastructure devices generate and the super equipment tangled pair of processing as long as increasing;
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, by being embedded in photon Super Entangled State handle the KEK of pairwise key, the GTK of group key, improve capacity and the safety, acceleration amount of quantum communications Son calculates, and greatly ensure that the safety of data-link.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, due to key coding It is to tangle state in super, in multiple freedom degrees, then the information of codified is with very big speed expanded.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, quantum information transmission High efficiency, reduce the time delay of communication process, substantially reduce the burden of classical communication, directly raising communication efficiency.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, this method are more simple Single, operation is simple, is easy to realize in systems in practice.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows Meaning property embodiment and its explanation are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of heterogeneous wireless communication method flow for surpassing Entangled State based on photon according to one or more embodiments Figure;
Fig. 2 is the specific side according to a kind of heterogeneous wireless communication for surpassing Entangled State based on photon of one or more embodiments Method flow chart.
Specific embodiment:
Below in conjunction with the attached drawing in one or more other embodiments of the present disclosure, to one or more other embodiments of the present disclosure In technical solution be clearly and completely described, it is clear that described embodiments are only a part of the embodiments of the present invention, Instead of all the embodiments.Based on one or more other embodiments of the present disclosure, those of ordinary skill in the art are not being made Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of creative work.
It is noted that following detailed description is all illustrative, it is intended to provide further instruction to the application.Unless another It indicates, all technical and scientific terms that the present embodiment uses have and the application person of an ordinary skill in the technical field Normally understood identical meanings.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
It should be noted that flowcharts and block diagrams in the drawings show according to various embodiments of the present disclosure method and The architecture, function and operation in the cards of system.It should be noted that each box in flowchart or block diagram can represent A part of one module, program segment or code, a part of the module, program segment or code may include one or more A executable instruction for realizing the logic function of defined in each embodiment.It should also be noted that some alternately Realization in, function marked in the box can also occur according to the sequence that is marked in attached drawing is different from.For example, two connect The box even indicated can actually be basically executed in parallel or they can also be executed in a reverse order sometimes, This depends on related function.It should also be noted that each box and flow chart in flowchart and or block diagram And/or the combination of the box in block diagram, the dedicated hardware based system that functions or operations as defined in executing can be used are come It realizes, or the combination of specialized hardware and computer instruction can be used to realize.
In the absence of conflict, the feature in the embodiment and embodiment in the disclosure can be combined with each other, and tie below It closes attached drawing and embodiment is described further the disclosure.
As shown in Figure 1, the described heterogeneous wireless communication method for surpassing Entangled State based on photon of this method can be described as five A step stage.
First step stage, initialization;Wireless client and access point are associated, and access point is by recognizing after establishing connection It demonstrate,proves server and authentication is carried out to wireless client, wireless client obtains the authorization for using connectivity port after authenticating successfully;
Second step stage, the starting of quantization pairwise key;Access point starts four way handshake protocols, and access point is to wireless visitor Family end send verify data packet, wireless client receive verify data packet judge data integrity, when data are complete generation with Machine data packet is sent to access point, access point and wireless client according to verify data packet, random data packet and access point, wireless The MAC Address of client, which generates, has the super quantization pairwise key for tangling state;
Third step stage, the starting of quantization group key;
Access point starts four way handshake protocols, and access point is sent to wireless client to be encoded into the super amount for tangling state Sub- bit stream, wireless client send GTK decoded information to access point, and generation has the super quantization master key for tangling state, It is authenticated between wireless client and access point, PTK and GTK load success;
Four steps stage, data communication;
It determines that PTK, GTK of access point and wireless client are new, and determines that PMK is identical and newest, access point Carry out data transmission between wireless client;
5th step stage is nullified;
It after wireless client the data transfer ends, is sent to access point and nullifies data frame, access point returns to log-off message extremely The authorized ports of wireless client, access point revert to original state.
It is illustrated in figure 2 the specific method flow chart for surpassing the heterogeneous wireless communication of Entangled State based on photon.
1. initialization
1) wireless client STA and access point AP are associated, and agreement request, agreement request is needed to reply two data Frame, if obtained data frame normally if continue, otherwise cancel association.
2) after previous step establishes connection procedure, wireless client STA issues starting frame to access point AP
E APOL-Start。
3) after access point AP receives starting frame, EAP-Request/Identity is replied, is exactly mentioned to wireless client STA Identity authentication requesting out.
4) wireless client STA replys certification message, and access point AP is converted into Radius-Access- after receiving Request package is sent to certificate server AS.
5) EAP-Request is packaged in Radius-Access-Challenge and passes through access point by certificate server AS AP is sent to wireless client STA.
6) wireless client STA replys EAP-Response, and access point AP is converted into Radius-Access- after receiving Request package is sent to certificate server AS.
7) Radius-Access-Accept package is converted into EAP- by access point AP by certificate server AS Success frame issues wireless client STA, and wireless client STA obtains the authorization for using connectivity port.So far, starting terminates.
2. quantization pairwise key startup stage
8) access point AP receives the Access-Accept package received in initial phase, starts four way handshake protocols, mesh Be that and can be produced to determine that the pairwise master key that wireless client STA and access point AP are obtained is identical and newest Raw newest pairs of temporary key, to start quantization pairwise key, group key shares out the work.
9) it includes own MAC address (APA), playback counter field value m that access point AP is issued to wireless client STA1 Etc. information Authenticator Nonce (ANonce).
10) wireless client STA receives ANonce, and therefrom obtains playback counter field value m1.Be associated with before The field value m received when journey2Compare, m1≤m2, the data are imperfect, and wireless client STA abandons the data frame, m1>m2, wirelessly Client STA generates the client random data packet (SNonce) comprising information such as own MAC address (SA).Wireless client STA sends SNonce to access point AP, and the two is generated quantized close in pairs using ANonce, SNonce, access point APA, SA Key
Wireless client STA sends SNonce to access point AP, and the two utilizes ANonce, SNonce, access point APA, SA Generating has the super quantization pairwise key for tangling state, sees Fig. 1.Wherein, KCK be guarantee the certification of four step handshake phases with it is complete The protection key of property;TK is the common encryption key between wireless client STA and access point AP;128 KEK key codings At pairs of quantum bit stream, we select two freedom degrees to tangle here, in polarization freedom degree (p) and spatial degrees of freedom (s) It tangles, expression formula is as follows:
Wherein | αi|2+ |βi|2=1, | αj|2+|βj|2=1, N=128.
64 pairs of wireless client STA preparation, which surpasses to tangle to spread the KEK quantum bit encoded into (128), passs access point AP, wherein optional one tangles pair, expression formula are as follows:And the particle b that is corresponding to it, C is respectively in wireless client STA, access point AP hand.Optional particle a in 64 couples of KEK, the quantum state with b, c composition are as follows:
Wherein:
From the above equation, we can see that wireless client STA measurement result be (| Ψ±>ab)p(|Ψ±>ab)sWhen, utilize Unitary transformation-I Quantum state ((α can be obtained with-Z, access point APi|0>+βi|1>)a)p((αj|0>+βj|1>)a)s;Similarly, wireless client Hold STA measurement result be (| Ψ±>ab)p(|Φ±>ab)sOr (| Φ±>ab)p(|Ψ±>ab)sOr (| Φ±>ab)p(|Φ±>ab)s When, using Unitary transformation-I, X ,-iY and available quantum the state ((α of-Zi|0>+βi|1>)a)p((αj|0>+βj|1>)a)s
Wherein,
After quantum state receives, successively as described above, transmitted using super tangle to by key, and decode and back through allusion quotation letter Breath, to complete quantum chemical conversion to key.
The present embodiment uses the quantization key tangled in two freedom degrees, and the fact can use multiple freedom degrees It tangles and carries out key information coding.
3. quantization master key startup stage
11) this stage and quantization pairwise key process above use essentially the same algorithm, super are tangled using 64 It is right, access point AP is encoded into quantum bit stream to the group temporary key GTK that wireless client STA sends 128, is successively carried out Operation above, to complete quantization master key
12) certification between wireless client STA and access point AP terminates, and PTK and GTK load success.
4. data communication phase
13) after quantization key startup stage above, wireless client STA, access point AP PTK, GTK all Brand-new, and determine obtained PMK be it is identical and newest, carry out data transmission therewith.
5. the stage of cancellation
14) after wireless client STA the data transfer ends, EAPOL-Logoff data frame, access are sent to access point AP The authorized ports of point AP revert to original state, then can not be authenticated again.
According to the other side of one or more other embodiments of the present disclosure, also provides and a kind of Entangled State is surpassed based on photon Heterogeneous wireless communication system.
A kind of heterogeneous wireless communication system surpassing Entangled State based on photon is based on the super Entangled State of photon using described one kind Heterogeneous wireless communication method, including sequentially connected wireless client, access point and certificate server.
Further, in the method, the wireless client, access point and certificate server are that can produce and handle The equipment of the super Entangled State of quantum.
The disclosure the utility model has the advantages that
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, do not need variation one A little infrastructure devices generate and the super equipment tangled pair of processing as long as increasing;
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, by being embedded in photon Super Entangled State handle the KEK of pairwise key, the GTK of group key, improve capacity and the safety, acceleration amount of quantum communications Son calculates, and greatly ensure that the safety of data-link.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, due to key coding It is to tangle state in super, in multiple freedom degrees, then the information of codified is with very big speed expanded.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, quantum information transmission High efficiency, reduce the time delay of communication process, substantially reduce the burden of classical communication, directly raising communication efficiency.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, this method are more simple Single, operation is simple, is easy to realize in systems in practice.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.Therefore, the present invention is not intended to be limited to this These embodiments shown in text, and it is to fit to the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon, which is characterized in that this method comprises:
Wireless client and access point are associated, and access point carries out wireless client by certificate server after establishing connection Authentication, wireless client obtains the authorization for using connectivity port after authenticating successfully;
Access point starts four way handshake protocols, and access point sends verify data packet to wireless client, and wireless client reception is tested Card data packet judges data integrity, and random data packet is generated when data are complete and is sent to access point, access point and wireless visitor Family end, which generates to have to surpass according to the MAC Address of verify data packet, random data packet and access point, wireless client, tangles state Quantization pairwise key;
Access point starts four way handshake protocols, and access point is sent to wireless client to be encoded into the super quantum ratio for tangling state Spy's stream, wireless client send GTK decoded information to access point, and generating has the super quantization master key for tangling state, wirelessly It is authenticated between client and access point, PTK and GTK load success;
It determines that PTK, GTK of access point and wireless client are new, and determines that PMK is identical and newest, access point and nothing Carry out data transmission between line client;
It after wireless client the data transfer ends, is sent to access point and nullifies data frame, access point returns to log-off message to wireless The authorized ports of client, access point revert to original state.
2. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this In method, the specific steps that the wireless client and access point are associated include:
Wireless client sends association request data frame to access point;
Access point receives association request data frame, returns to association request and replys data frame to wireless client;
Wireless client receives association request and replys data frame, and whether the association request reply data frame judged is normal, if Normal then wireless client and access point are associated, and otherwise, cancel association.
3. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this In method, described access point carries out authentication, wireless client after authenticating successfully to wireless client by certificate server The authorization for using connectivity port is obtained, specific steps include:
Wireless client sends starting frame to access point;
Access point receives starting frame, returns to authentication and requires to wireless client;
Wireless client receives authentication requirement, replys identity authentication message to access point, access point receives authentication and disappears Breath is carried out conversion package and is sent to certificate server;
The authentication of access point is required to be packaged and is sent to wireless client by access point by certificate server;
Wireless client receives the authentication requirement of the access point by encapsulation, replys identity authentication message to access point, connects Access point receive identity authentication message carried out conversion package be sent to certificate server;
The identity authentication message progress package of package is converted to access point success frame by access point and is sent to by certificate server Wireless client, wireless client obtain the authorization for using connectivity port.
4. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this In method, when wireless client and access point are associated, access point sends the information comprising field value to wireless client;
The verify data packet includes the MAC Address and playback counter field value of access point.
5. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as claimed in claim 4, which is characterized in that at this In method, the wireless client reception verify data packet judges that the specific steps of data integrity include:
Wireless client obtains playback counter field value m from the verify data packet received1, received when with association process before The field value m arrived2It is compared,
If m1≤m2, then the data are imperfect, and wireless client abandons the data frame;
If m1>m2, wireless client generation includes the client random data packet of own MAC address information.
6. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this In method, described access point, wireless client and certificate server can produce and handle the super Entangled State of quantum.
7. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this In method, certainly with the super quantization pairwise key for tangling state and with the super quantization master key selection two for tangling state It is tangled by degree, including polarization freedom degree is tangled and tangled with spatial degrees of freedom.
8. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this In method, the key information coding for carrying out pairwise key and master key is tangled using the freedom degree greater than two.
9. a kind of heterogeneous wireless communication system for surpassing Entangled State based on photon, using such as of any of claims 1-8 A kind of heterogeneous wireless communication method surpassing Entangled State based on photon, including sequentially connected wireless client, access point and certification Server.
10. a kind of heterogeneous wireless communication system for surpassing Entangled State based on photon as claimed in claim 9, which is characterized in that In this method, the wireless client, access point and certificate server are the equipment that can produce and handle the super Entangled State of quantum.
CN201910012575.8A 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state Active CN109510706B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910012575.8A CN109510706B (en) 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910012575.8A CN109510706B (en) 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state

Publications (2)

Publication Number Publication Date
CN109510706A true CN109510706A (en) 2019-03-22
CN109510706B CN109510706B (en) 2022-01-11

Family

ID=65756334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910012575.8A Active CN109510706B (en) 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state

Country Status (1)

Country Link
CN (1) CN109510706B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181633A (en) * 2020-01-22 2020-05-19 南京邮电大学 Time-polarization super-entangled state entanglement auxiliary noiseless linear amplification method
CN114024672A (en) * 2021-11-14 2022-02-08 广东电网有限责任公司电力调度控制中心 Safety protection method and system for low-voltage power line carrier communication system
CN114422126A (en) * 2021-12-31 2022-04-29 广东国腾量子科技有限公司 Joint debugging test system and method for quantum key management software module
US11757630B2 (en) 2021-04-27 2023-09-12 Cisco Technology, Inc. Set up and distribution of post-quantum secure pre-shared keys using extendible authentication protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013052903A1 (en) * 2011-10-05 2013-04-11 The Trustees Of Columbia University In The City Of New York Chip-scale interferometry for hyperentanglement processing
CN103338448A (en) * 2013-06-07 2013-10-02 国家电网公司 Wireless local area network security communication method based on quantum key distribution
CN105915346A (en) * 2016-04-15 2016-08-31 青岛理工大学 RFID system bidirectional authentication method based on decoy state quantum random key
CN107786280A (en) * 2017-09-30 2018-03-09 南京邮电大学 It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013052903A1 (en) * 2011-10-05 2013-04-11 The Trustees Of Columbia University In The City Of New York Chip-scale interferometry for hyperentanglement processing
CN103338448A (en) * 2013-06-07 2013-10-02 国家电网公司 Wireless local area network security communication method based on quantum key distribution
CN105915346A (en) * 2016-04-15 2016-08-31 青岛理工大学 RFID system bidirectional authentication method based on decoy state quantum random key
CN107786280A (en) * 2017-09-30 2018-03-09 南京邮电大学 It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HONGYANG MA ET AL.: "《An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT》", 《WIRELESS PERSONAL COMMUNICATIONS》 *
HONGYANG MA ET AL.: "《Development of Security WLAN Protocol Based on Quantum GHZ Stats》", 《WIRELESS PERSONAL COMMUNICATIONS》 *
任宝藏等: "《光子两自由度超并行量子计算与超纠缠态操控》", 《物理学报》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181633A (en) * 2020-01-22 2020-05-19 南京邮电大学 Time-polarization super-entangled state entanglement auxiliary noiseless linear amplification method
CN111181633B (en) * 2020-01-22 2022-02-01 南京邮电大学 Time-polarization super-entangled state entanglement auxiliary noiseless linear amplification method
US11757630B2 (en) 2021-04-27 2023-09-12 Cisco Technology, Inc. Set up and distribution of post-quantum secure pre-shared keys using extendible authentication protocol
US11909872B2 (en) 2021-04-27 2024-02-20 Cisco Technology, Inc. Set up and distribution of post-quantum secure pre-shared keys using extendible authentication protocol
CN114024672A (en) * 2021-11-14 2022-02-08 广东电网有限责任公司电力调度控制中心 Safety protection method and system for low-voltage power line carrier communication system
CN114024672B (en) * 2021-11-14 2024-03-26 广东电网有限责任公司电力调度控制中心 Safety protection method and system for power line carrier communication system
CN114422126A (en) * 2021-12-31 2022-04-29 广东国腾量子科技有限公司 Joint debugging test system and method for quantum key management software module
CN114422126B (en) * 2021-12-31 2023-11-28 广东国腾量子科技有限公司 Joint debugging test system and method for quantum key management software module

Also Published As

Publication number Publication date
CN109510706B (en) 2022-01-11

Similar Documents

Publication Publication Date Title
CN109510706A (en) Surpass the heterogeneous wireless communication method and system of Entangled State based on photon
CN102946313B (en) A kind of user authentication model for quantum key distribution network and method
CN105684344B (en) A kind of cipher key configuration method and apparatus
CN102916806B (en) Cryptograph key distribution system
CN109347809A (en) A kind of application virtualization safety communicating method towards under autonomous controllable environment
CN108886468A (en) System and method for distributing the keying material and certificate of identity-based
CN107493168B (en) Quanta identity authentication method and its application method during quantum key distribution
CN101814991B (en) Mutual authentication method and system based on identity
CN109327308A (en) A kind of quantum key delivering method and system with bidirectional identity authentication function
CN109787761A (en) A kind of equipment certification and key distribution system and method based on physics unclonable function
Shen et al. Quantum dialogue with authentication based on Bell states
CN109756877A (en) A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment
CN106534050A (en) Method and device for realizing key agreement of virtual private network (VPN)
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
KR100892616B1 (en) Method For Joining New Device In Wireless Sensor Network
CN104780169B (en) A kind of quantum repeater network coding scheme based on controller
CN105848140A (en) Safe end-to-end establishment method capable of achieving communication supervision in 5G network
CN108966214A (en) Authentication method, the wireless network safety communication method and device of wireless network
Ma et al. Quantum mutual authentication key agreement scheme using five-qubit entanglement towards different realm architecture
CN113938275B (en) Quantum homomorphic signature method based on d-dimension Bell state
Hajny et al. Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices
CN106330430B (en) A kind of third party's method of mobile payment based on NTRU
CN213279684U (en) Quantum secret communication user side and quantum secret communication system
CN114386020A (en) Quick secondary identity authentication method and system based on quantum security
Zhu et al. A one-round quantum mutual authenticated key agreement protocol with semi-honest server using three-particle entangled states

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant