CN109510706A - Surpass the heterogeneous wireless communication method and system of Entangled State based on photon - Google Patents
Surpass the heterogeneous wireless communication method and system of Entangled State based on photon Download PDFInfo
- Publication number
- CN109510706A CN109510706A CN201910012575.8A CN201910012575A CN109510706A CN 109510706 A CN109510706 A CN 109510706A CN 201910012575 A CN201910012575 A CN 201910012575A CN 109510706 A CN109510706 A CN 109510706A
- Authority
- CN
- China
- Prior art keywords
- access point
- wireless client
- photon
- entangled state
- super
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of heterogeneous wireless communication method and system for surpassing Entangled State based on photon, this method is by carrying out quantization for wireless network keys, it generates the super of quantum and tangles state, the encryption key distribution of wireless network is carried out using the super Entangled State of quantum, it does not need to change some infrastructure devices such as user, database, server, it only needs some super equipment of tangling to can be carried out the quantum key certification of super Entangled State, and more keys can be subjected to coding transmission using super Entangled State;Channel capacity can be improved, super parallel computation, safety can also be greatly improved, the quantum-key distribution scheme between mobile identifier and information server is effectively solved, overcomes the shortcomings of that radio network information is easily stolen and the too low bring information security of encryption level.
Description
Technical field
The disclosure belongs to the technical field of wireless communication safety, be related to it is a kind of based on photon surpass the isomery of Entangled State without
Line communication means and system.
Background technique
Only there is provided background technical informations relevant to the disclosure for the statement of this part, it is not necessary to so constitute first skill
Art.
With the development of science and technology, wireless network is quickly grown, it is the communication system that electromagnetic wave intersects with network technology
System, although data transmission is efficient and convenient, the problem in data safety is also following, due to using electromagnetic communication, dissipates
The aerial data of cloth are highly susceptible to the attack of EVE, it is easy to stolen to get data.So solving wireless network
Safety problem is very important.
Due to the development of quantum information science, some theoretical gradually realityization, since quantum key is in theoretically absolutely
The influence of safety, for above-mentioned safety issue, document " remotely passes the wireless Ad Hoc quantum communication network of state based on quantum
Routing Protocol ", it proposes wireless Ad Hoc quantum communication network concept and designs its Routing Protocol, when node receives response message
Afterwards, data are transmitted in wireless Ad Hoc quantum communication network using entanglement transfer and both ends approach method;The agreement considers
How quantum teleportation communication is carried out in complicated wireless quantum communication network, but there is no consider that changing wireless network shows
Some key hierarchies.Document " the data link layer selective repeat protocol based on quantum teleportation " proposes hidden based on quantum
Shape passes the data link layer selective repeat protocol of state, the data lost with mistake is only retransmitted, when reducing the propagation of communication process
Prolong, improve communication efficiency, reduce the burden of classical channel, but is not related to the variation of existing key hierarchy still.
Summary of the invention
For the deficiencies in the prior art, one or more other embodiments of the present disclosure provide a kind of super based on photon
The heterogeneous wireless communication method and system of Entangled State generate the super of quantum and tangle by the way that wireless network keys are carried out quantization
State carries out the encryption key distribution of wireless network using the super Entangled State of quantum, does not need to change user, database, server etc.
Some infrastructure devices, it is only necessary to which some super equipment of tangling can be carried out the quantum key certification of super Entangled State, and utilize super
More keys can be carried out coding transmission by Entangled State;Channel capacity, super parallel computation can be improved, moreover it is possible to greatly improve
Safety effectively solves the quantum-key distribution scheme between mobile identifier and information server, wireless network is overcome to believe
Breath easily steals the deficiency with the too low bring information security of encryption level.
According to the one aspect of one or more other embodiments of the present disclosure, a kind of isomery for surpassing Entangled State based on photon is provided
Wireless communications method.
A kind of heterogeneous wireless communication method surpassing Entangled State based on photon, this method comprises:
Wireless client and access point are associated, and access point passes through certificate server to wireless client after establishing connection
Authentication is carried out, wireless client obtains the authorization for using connectivity port after authenticating successfully;
Access point starts four way handshake protocols, and access point sends verify data packet, wireless client termination to wireless client
It receives verify data packet and judges data integrity, random data packet is generated when data are complete and is sent to access point, access point and nothing
Line client, which generates to have to surpass according to the MAC Address of verify data packet, random data packet and access point, wireless client, tangles shape
The quantization pairwise key of state;
Access point starts four way handshake protocols, and access point is sent to wireless client to be encoded into the super amount for tangling state
Sub- bit stream, wireless client send GTK decoded information to access point, and generation has the super quantization master key for tangling state,
It is authenticated between wireless client and access point, PTK and GTK load success;
It determines that PTK, GTK of access point and wireless client are new, and determines that PMK is identical and newest, access point
Carry out data transmission between wireless client;
It after wireless client the data transfer ends, is sent to access point and nullifies data frame, access point returns to log-off message extremely
The authorized ports of wireless client, access point revert to original state.
Further, in the method, the specific steps that the wireless client and access point are associated include:
Wireless client sends association request data frame to access point;
Access point receives association request data frame, returns to association request and replys data frame to wireless client;
Wireless client receives association request and replys data frame, and whether just the association request judged replys data frame
Often, then wireless client and access point are associated if normal, otherwise, cancel association.
Further, in the method, described access point carries out authentication to wireless client by certificate server,
Wireless client obtains the authorization for using connectivity port after authenticating successfully, and specific steps include:
Wireless client sends starting frame to access point;
Access point receives starting frame, returns to authentication and requires to wireless client;
Wireless client receives authentication requirement, replys identity authentication message to access point, access point, which receives identity, to be recognized
Card message is carried out conversion package and is sent to certificate server;
The authentication of access point is required to be packaged and is sent to wireless client by access point by certificate server;
Wireless client receives the authentication requirement for passing through the access point of encapsulation, replys identity authentication message to access
Point, access point receive identity authentication message carried out conversion package be sent to certificate server;
The identity authentication message of package is carried out package and is converted to access point success frame hair by access point by certificate server
It send to wireless client, wireless client obtains the authorization for using connectivity port.
Further, in the method, when wireless client and access point are associated, access point is to wireless client
Send the information comprising field value;
The verify data packet includes the MAC Address and playback counter field value of access point.
Further, in the method, the wireless client reception verify data packet judges the specific of data integrity
Step includes:
Wireless client obtains playback counter field value m from the verify data packet received1, with association process before
When the field value m that receives2It is compared,
If m1≤m2, then the data are imperfect, and wireless client abandons the data frame;
If m1>m2, wireless client generation includes the client random data packet of own MAC address information.
Further, in the method, described access point, wireless client and certificate server can produce and treating capacity
The super Entangled State of son.
Further, in the method, state is tangled with the super quantization pairwise key for tangling state and with super
Quantization master key selects two freedom degrees to tangle, including polarization freedom degree is tangled and tangled with spatial degrees of freedom.
Further, in the method, the close of pairwise key and master key is carried out using tangling greater than two freedom degrees
Key information coding.
According to the other side of one or more other embodiments of the present disclosure, also provides and a kind of Entangled State is surpassed based on photon
Heterogeneous wireless communication system.
A kind of heterogeneous wireless communication system surpassing Entangled State based on photon is based on the super Entangled State of photon using described one kind
Heterogeneous wireless communication method, including sequentially connected wireless client, access point and certificate server.
Further, in the method, the wireless client, access point and certificate server are that can produce and handle
The equipment of the super Entangled State of quantum.
The disclosure the utility model has the advantages that
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, do not need variation one
A little infrastructure devices generate and the super equipment tangled pair of processing as long as increasing;
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, by being embedded in photon
Super Entangled State handle the KEK of pairwise key, the GTK of group key, improve capacity and the safety, acceleration amount of quantum communications
Son calculates, and greatly ensure that the safety of data-link.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, due to key coding
It is to tangle state in super, in multiple freedom degrees, then the information of codified is with very big speed expanded.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, quantum information transmission
High efficiency, reduce the time delay of communication process, substantially reduce the burden of classical communication, directly raising communication efficiency.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, this method are more simple
Single, operation is simple, is easy to realize in systems in practice.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows
Meaning property embodiment and its explanation are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of heterogeneous wireless communication method flow for surpassing Entangled State based on photon according to one or more embodiments
Figure;
Fig. 2 is the specific side according to a kind of heterogeneous wireless communication for surpassing Entangled State based on photon of one or more embodiments
Method flow chart.
Specific embodiment:
Below in conjunction with the attached drawing in one or more other embodiments of the present disclosure, to one or more other embodiments of the present disclosure
In technical solution be clearly and completely described, it is clear that described embodiments are only a part of the embodiments of the present invention,
Instead of all the embodiments.Based on one or more other embodiments of the present disclosure, those of ordinary skill in the art are not being made
Every other embodiment obtained, shall fall within the protection scope of the present invention under the premise of creative work.
It is noted that following detailed description is all illustrative, it is intended to provide further instruction to the application.Unless another
It indicates, all technical and scientific terms that the present embodiment uses have and the application person of an ordinary skill in the technical field
Normally understood identical meanings.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root
According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular
Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet
Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
It should be noted that flowcharts and block diagrams in the drawings show according to various embodiments of the present disclosure method and
The architecture, function and operation in the cards of system.It should be noted that each box in flowchart or block diagram can represent
A part of one module, program segment or code, a part of the module, program segment or code may include one or more
A executable instruction for realizing the logic function of defined in each embodiment.It should also be noted that some alternately
Realization in, function marked in the box can also occur according to the sequence that is marked in attached drawing is different from.For example, two connect
The box even indicated can actually be basically executed in parallel or they can also be executed in a reverse order sometimes,
This depends on related function.It should also be noted that each box and flow chart in flowchart and or block diagram
And/or the combination of the box in block diagram, the dedicated hardware based system that functions or operations as defined in executing can be used are come
It realizes, or the combination of specialized hardware and computer instruction can be used to realize.
In the absence of conflict, the feature in the embodiment and embodiment in the disclosure can be combined with each other, and tie below
It closes attached drawing and embodiment is described further the disclosure.
As shown in Figure 1, the described heterogeneous wireless communication method for surpassing Entangled State based on photon of this method can be described as five
A step stage.
First step stage, initialization;Wireless client and access point are associated, and access point is by recognizing after establishing connection
It demonstrate,proves server and authentication is carried out to wireless client, wireless client obtains the authorization for using connectivity port after authenticating successfully;
Second step stage, the starting of quantization pairwise key;Access point starts four way handshake protocols, and access point is to wireless visitor
Family end send verify data packet, wireless client receive verify data packet judge data integrity, when data are complete generation with
Machine data packet is sent to access point, access point and wireless client according to verify data packet, random data packet and access point, wireless
The MAC Address of client, which generates, has the super quantization pairwise key for tangling state;
Third step stage, the starting of quantization group key;
Access point starts four way handshake protocols, and access point is sent to wireless client to be encoded into the super amount for tangling state
Sub- bit stream, wireless client send GTK decoded information to access point, and generation has the super quantization master key for tangling state,
It is authenticated between wireless client and access point, PTK and GTK load success;
Four steps stage, data communication;
It determines that PTK, GTK of access point and wireless client are new, and determines that PMK is identical and newest, access point
Carry out data transmission between wireless client;
5th step stage is nullified;
It after wireless client the data transfer ends, is sent to access point and nullifies data frame, access point returns to log-off message extremely
The authorized ports of wireless client, access point revert to original state.
It is illustrated in figure 2 the specific method flow chart for surpassing the heterogeneous wireless communication of Entangled State based on photon.
1. initialization
1) wireless client STA and access point AP are associated, and agreement request, agreement request is needed to reply two data
Frame, if obtained data frame normally if continue, otherwise cancel association.
2) after previous step establishes connection procedure, wireless client STA issues starting frame to access point AP
E APOL-Start。
3) after access point AP receives starting frame, EAP-Request/Identity is replied, is exactly mentioned to wireless client STA
Identity authentication requesting out.
4) wireless client STA replys certification message, and access point AP is converted into Radius-Access- after receiving
Request package is sent to certificate server AS.
5) EAP-Request is packaged in Radius-Access-Challenge and passes through access point by certificate server AS
AP is sent to wireless client STA.
6) wireless client STA replys EAP-Response, and access point AP is converted into Radius-Access- after receiving
Request package is sent to certificate server AS.
7) Radius-Access-Accept package is converted into EAP- by access point AP by certificate server AS
Success frame issues wireless client STA, and wireless client STA obtains the authorization for using connectivity port.So far, starting terminates.
2. quantization pairwise key startup stage
8) access point AP receives the Access-Accept package received in initial phase, starts four way handshake protocols, mesh
Be that and can be produced to determine that the pairwise master key that wireless client STA and access point AP are obtained is identical and newest
Raw newest pairs of temporary key, to start quantization pairwise key, group key shares out the work.
9) it includes own MAC address (APA), playback counter field value m that access point AP is issued to wireless client STA1
Etc. information Authenticator Nonce (ANonce).
10) wireless client STA receives ANonce, and therefrom obtains playback counter field value m1.Be associated with before
The field value m received when journey2Compare, m1≤m2, the data are imperfect, and wireless client STA abandons the data frame, m1>m2, wirelessly
Client STA generates the client random data packet (SNonce) comprising information such as own MAC address (SA).Wireless client
STA sends SNonce to access point AP, and the two is generated quantized close in pairs using ANonce, SNonce, access point APA, SA
Key
Wireless client STA sends SNonce to access point AP, and the two utilizes ANonce, SNonce, access point APA, SA
Generating has the super quantization pairwise key for tangling state, sees Fig. 1.Wherein, KCK be guarantee the certification of four step handshake phases with it is complete
The protection key of property;TK is the common encryption key between wireless client STA and access point AP;128 KEK key codings
At pairs of quantum bit stream, we select two freedom degrees to tangle here, in polarization freedom degree (p) and spatial degrees of freedom (s)
It tangles, expression formula is as follows:
Wherein | αi|2+
|βi|2=1, | αj|2+|βj|2=1, N=128.
64 pairs of wireless client STA preparation, which surpasses to tangle to spread the KEK quantum bit encoded into (128), passs access point
AP, wherein optional one tangles pair, expression formula are as follows:And the particle b that is corresponding to it,
C is respectively in wireless client STA, access point AP hand.Optional particle a in 64 couples of KEK, the quantum state with b, c composition are as follows:
Wherein:
From the above equation, we can see that wireless client STA measurement result be (| Ψ±>ab)p(|Ψ±>ab)sWhen, utilize Unitary transformation-I
Quantum state ((α can be obtained with-Z, access point APi|0>+βi|1>)a)p((αj|0>+βj|1>)a)s;Similarly, wireless client
Hold STA measurement result be (| Ψ±>ab)p(|Φ±>ab)sOr (| Φ±>ab)p(|Ψ±>ab)sOr (| Φ±>ab)p(|Φ±>ab)s
When, using Unitary transformation-I, X ,-iY and available quantum the state ((α of-Zi|0>+βi|1>)a)p((αj|0>+βj|1>)a)s
Wherein,
After quantum state receives, successively as described above, transmitted using super tangle to by key, and decode and back through allusion quotation letter
Breath, to complete quantum chemical conversion to key.
The present embodiment uses the quantization key tangled in two freedom degrees, and the fact can use multiple freedom degrees
It tangles and carries out key information coding.
3. quantization master key startup stage
11) this stage and quantization pairwise key process above use essentially the same algorithm, super are tangled using 64
It is right, access point AP is encoded into quantum bit stream to the group temporary key GTK that wireless client STA sends 128, is successively carried out
Operation above, to complete quantization master key
12) certification between wireless client STA and access point AP terminates, and PTK and GTK load success.
4. data communication phase
13) after quantization key startup stage above, wireless client STA, access point AP PTK, GTK all
Brand-new, and determine obtained PMK be it is identical and newest, carry out data transmission therewith.
5. the stage of cancellation
14) after wireless client STA the data transfer ends, EAPOL-Logoff data frame, access are sent to access point AP
The authorized ports of point AP revert to original state, then can not be authenticated again.
According to the other side of one or more other embodiments of the present disclosure, also provides and a kind of Entangled State is surpassed based on photon
Heterogeneous wireless communication system.
A kind of heterogeneous wireless communication system surpassing Entangled State based on photon is based on the super Entangled State of photon using described one kind
Heterogeneous wireless communication method, including sequentially connected wireless client, access point and certificate server.
Further, in the method, the wireless client, access point and certificate server are that can produce and handle
The equipment of the super Entangled State of quantum.
The disclosure the utility model has the advantages that
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, do not need variation one
A little infrastructure devices generate and the super equipment tangled pair of processing as long as increasing;
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, by being embedded in photon
Super Entangled State handle the KEK of pairwise key, the GTK of group key, improve capacity and the safety, acceleration amount of quantum communications
Son calculates, and greatly ensure that the safety of data-link.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, due to key coding
It is to tangle state in super, in multiple freedom degrees, then the information of codified is with very big speed expanded.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, quantum information transmission
High efficiency, reduce the time delay of communication process, substantially reduce the burden of classical communication, directly raising communication efficiency.
A kind of heterogeneous wireless communication method and system surpassing Entangled State based on photon of the present invention, this method are more simple
Single, operation is simple, is easy to realize in systems in practice.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.Therefore, the present invention is not intended to be limited to this
These embodiments shown in text, and it is to fit to the widest scope consistent with the principles and novel features disclosed herein.
Claims (10)
1. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon, which is characterized in that this method comprises:
Wireless client and access point are associated, and access point carries out wireless client by certificate server after establishing connection
Authentication, wireless client obtains the authorization for using connectivity port after authenticating successfully;
Access point starts four way handshake protocols, and access point sends verify data packet to wireless client, and wireless client reception is tested
Card data packet judges data integrity, and random data packet is generated when data are complete and is sent to access point, access point and wireless visitor
Family end, which generates to have to surpass according to the MAC Address of verify data packet, random data packet and access point, wireless client, tangles state
Quantization pairwise key;
Access point starts four way handshake protocols, and access point is sent to wireless client to be encoded into the super quantum ratio for tangling state
Spy's stream, wireless client send GTK decoded information to access point, and generating has the super quantization master key for tangling state, wirelessly
It is authenticated between client and access point, PTK and GTK load success;
It determines that PTK, GTK of access point and wireless client are new, and determines that PMK is identical and newest, access point and nothing
Carry out data transmission between line client;
It after wireless client the data transfer ends, is sent to access point and nullifies data frame, access point returns to log-off message to wireless
The authorized ports of client, access point revert to original state.
2. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this
In method, the specific steps that the wireless client and access point are associated include:
Wireless client sends association request data frame to access point;
Access point receives association request data frame, returns to association request and replys data frame to wireless client;
Wireless client receives association request and replys data frame, and whether the association request reply data frame judged is normal, if
Normal then wireless client and access point are associated, and otherwise, cancel association.
3. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this
In method, described access point carries out authentication, wireless client after authenticating successfully to wireless client by certificate server
The authorization for using connectivity port is obtained, specific steps include:
Wireless client sends starting frame to access point;
Access point receives starting frame, returns to authentication and requires to wireless client;
Wireless client receives authentication requirement, replys identity authentication message to access point, access point receives authentication and disappears
Breath is carried out conversion package and is sent to certificate server;
The authentication of access point is required to be packaged and is sent to wireless client by access point by certificate server;
Wireless client receives the authentication requirement of the access point by encapsulation, replys identity authentication message to access point, connects
Access point receive identity authentication message carried out conversion package be sent to certificate server;
The identity authentication message progress package of package is converted to access point success frame by access point and is sent to by certificate server
Wireless client, wireless client obtain the authorization for using connectivity port.
4. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this
In method, when wireless client and access point are associated, access point sends the information comprising field value to wireless client;
The verify data packet includes the MAC Address and playback counter field value of access point.
5. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as claimed in claim 4, which is characterized in that at this
In method, the wireless client reception verify data packet judges that the specific steps of data integrity include:
Wireless client obtains playback counter field value m from the verify data packet received1, received when with association process before
The field value m arrived2It is compared,
If m1≤m2, then the data are imperfect, and wireless client abandons the data frame;
If m1>m2, wireless client generation includes the client random data packet of own MAC address information.
6. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this
In method, described access point, wireless client and certificate server can produce and handle the super Entangled State of quantum.
7. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this
In method, certainly with the super quantization pairwise key for tangling state and with the super quantization master key selection two for tangling state
It is tangled by degree, including polarization freedom degree is tangled and tangled with spatial degrees of freedom.
8. a kind of heterogeneous wireless communication method for surpassing Entangled State based on photon as described in claim 1, which is characterized in that at this
In method, the key information coding for carrying out pairwise key and master key is tangled using the freedom degree greater than two.
9. a kind of heterogeneous wireless communication system for surpassing Entangled State based on photon, using such as of any of claims 1-8
A kind of heterogeneous wireless communication method surpassing Entangled State based on photon, including sequentially connected wireless client, access point and certification
Server.
10. a kind of heterogeneous wireless communication system for surpassing Entangled State based on photon as claimed in claim 9, which is characterized in that
In this method, the wireless client, access point and certificate server are the equipment that can produce and handle the super Entangled State of quantum.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910012575.8A CN109510706B (en) | 2019-01-07 | 2019-01-07 | Heterogeneous wireless communication method and system based on photon super-entangled state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910012575.8A CN109510706B (en) | 2019-01-07 | 2019-01-07 | Heterogeneous wireless communication method and system based on photon super-entangled state |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109510706A true CN109510706A (en) | 2019-03-22 |
CN109510706B CN109510706B (en) | 2022-01-11 |
Family
ID=65756334
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910012575.8A Active CN109510706B (en) | 2019-01-07 | 2019-01-07 | Heterogeneous wireless communication method and system based on photon super-entangled state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109510706B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111181633A (en) * | 2020-01-22 | 2020-05-19 | 南京邮电大学 | Time-polarization super-entangled state entanglement auxiliary noiseless linear amplification method |
CN114024672A (en) * | 2021-11-14 | 2022-02-08 | 广东电网有限责任公司电力调度控制中心 | Safety protection method and system for low-voltage power line carrier communication system |
CN114422126A (en) * | 2021-12-31 | 2022-04-29 | 广东国腾量子科技有限公司 | Joint debugging test system and method for quantum key management software module |
US11757630B2 (en) | 2021-04-27 | 2023-09-12 | Cisco Technology, Inc. | Set up and distribution of post-quantum secure pre-shared keys using extendible authentication protocol |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013052903A1 (en) * | 2011-10-05 | 2013-04-11 | The Trustees Of Columbia University In The City Of New York | Chip-scale interferometry for hyperentanglement processing |
CN103338448A (en) * | 2013-06-07 | 2013-10-02 | 国家电网公司 | Wireless local area network security communication method based on quantum key distribution |
CN105915346A (en) * | 2016-04-15 | 2016-08-31 | 青岛理工大学 | RFID system bidirectional authentication method based on decoy state quantum random key |
CN107786280A (en) * | 2017-09-30 | 2018-03-09 | 南京邮电大学 | It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state |
-
2019
- 2019-01-07 CN CN201910012575.8A patent/CN109510706B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013052903A1 (en) * | 2011-10-05 | 2013-04-11 | The Trustees Of Columbia University In The City Of New York | Chip-scale interferometry for hyperentanglement processing |
CN103338448A (en) * | 2013-06-07 | 2013-10-02 | 国家电网公司 | Wireless local area network security communication method based on quantum key distribution |
CN105915346A (en) * | 2016-04-15 | 2016-08-31 | 青岛理工大学 | RFID system bidirectional authentication method based on decoy state quantum random key |
CN107786280A (en) * | 2017-09-30 | 2018-03-09 | 南京邮电大学 | It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state |
Non-Patent Citations (3)
Title |
---|
HONGYANG MA ET AL.: "《An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT》", 《WIRELESS PERSONAL COMMUNICATIONS》 * |
HONGYANG MA ET AL.: "《Development of Security WLAN Protocol Based on Quantum GHZ Stats》", 《WIRELESS PERSONAL COMMUNICATIONS》 * |
任宝藏等: "《光子两自由度超并行量子计算与超纠缠态操控》", 《物理学报》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111181633A (en) * | 2020-01-22 | 2020-05-19 | 南京邮电大学 | Time-polarization super-entangled state entanglement auxiliary noiseless linear amplification method |
CN111181633B (en) * | 2020-01-22 | 2022-02-01 | 南京邮电大学 | Time-polarization super-entangled state entanglement auxiliary noiseless linear amplification method |
US11757630B2 (en) | 2021-04-27 | 2023-09-12 | Cisco Technology, Inc. | Set up and distribution of post-quantum secure pre-shared keys using extendible authentication protocol |
US11909872B2 (en) | 2021-04-27 | 2024-02-20 | Cisco Technology, Inc. | Set up and distribution of post-quantum secure pre-shared keys using extendible authentication protocol |
CN114024672A (en) * | 2021-11-14 | 2022-02-08 | 广东电网有限责任公司电力调度控制中心 | Safety protection method and system for low-voltage power line carrier communication system |
CN114024672B (en) * | 2021-11-14 | 2024-03-26 | 广东电网有限责任公司电力调度控制中心 | Safety protection method and system for power line carrier communication system |
CN114422126A (en) * | 2021-12-31 | 2022-04-29 | 广东国腾量子科技有限公司 | Joint debugging test system and method for quantum key management software module |
CN114422126B (en) * | 2021-12-31 | 2023-11-28 | 广东国腾量子科技有限公司 | Joint debugging test system and method for quantum key management software module |
Also Published As
Publication number | Publication date |
---|---|
CN109510706B (en) | 2022-01-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109510706A (en) | Surpass the heterogeneous wireless communication method and system of Entangled State based on photon | |
CN102946313B (en) | A kind of user authentication model for quantum key distribution network and method | |
CN105684344B (en) | A kind of cipher key configuration method and apparatus | |
CN102916806B (en) | Cryptograph key distribution system | |
CN109347809A (en) | A kind of application virtualization safety communicating method towards under autonomous controllable environment | |
CN108886468A (en) | System and method for distributing the keying material and certificate of identity-based | |
CN107493168B (en) | Quanta identity authentication method and its application method during quantum key distribution | |
CN101814991B (en) | Mutual authentication method and system based on identity | |
CN109327308A (en) | A kind of quantum key delivering method and system with bidirectional identity authentication function | |
CN109787761A (en) | A kind of equipment certification and key distribution system and method based on physics unclonable function | |
Shen et al. | Quantum dialogue with authentication based on Bell states | |
CN109756877A (en) | A kind of anti-quantum rapid authentication and data transmission method of magnanimity NB-IoT equipment | |
CN106534050A (en) | Method and device for realizing key agreement of virtual private network (VPN) | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
KR100892616B1 (en) | Method For Joining New Device In Wireless Sensor Network | |
CN104780169B (en) | A kind of quantum repeater network coding scheme based on controller | |
CN105848140A (en) | Safe end-to-end establishment method capable of achieving communication supervision in 5G network | |
CN108966214A (en) | Authentication method, the wireless network safety communication method and device of wireless network | |
Ma et al. | Quantum mutual authentication key agreement scheme using five-qubit entanglement towards different realm architecture | |
CN113938275B (en) | Quantum homomorphic signature method based on d-dimension Bell state | |
Hajny et al. | Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices | |
CN106330430B (en) | A kind of third party's method of mobile payment based on NTRU | |
CN213279684U (en) | Quantum secret communication user side and quantum secret communication system | |
CN114386020A (en) | Quick secondary identity authentication method and system based on quantum security | |
Zhu et al. | A one-round quantum mutual authenticated key agreement protocol with semi-honest server using three-particle entangled states |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |