CN109510706B - Heterogeneous wireless communication method and system based on photon super-entangled state - Google Patents

Heterogeneous wireless communication method and system based on photon super-entangled state Download PDF

Info

Publication number
CN109510706B
CN109510706B CN201910012575.8A CN201910012575A CN109510706B CN 109510706 B CN109510706 B CN 109510706B CN 201910012575 A CN201910012575 A CN 201910012575A CN 109510706 B CN109510706 B CN 109510706B
Authority
CN
China
Prior art keywords
access point
wireless client
super
quantum
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910012575.8A
Other languages
Chinese (zh)
Other versions
CN109510706A (en
Inventor
马鸿洋
徐鹏翱
李嘉鑫
刘倩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao University of Technology
Original Assignee
Qingdao University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao University of Technology filed Critical Qingdao University of Technology
Priority to CN201910012575.8A priority Critical patent/CN109510706B/en
Publication of CN109510706A publication Critical patent/CN109510706A/en
Application granted granted Critical
Publication of CN109510706B publication Critical patent/CN109510706B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Abstract

The invention discloses a heterogeneous wireless communication method and a heterogeneous wireless communication system based on a photon super-entangled state, wherein a wireless network key is quantized to generate a quantum super-entangled state, the quantum super-entangled state is used for carrying out key distribution on a wireless network, some basic devices such as users, databases and servers do not need to be changed, the quantum key authentication in the super-entangled state can be carried out only by some super-entangled devices, and more keys can be coded and transmitted by the super-entangled state; the method can improve the channel capacity, super-parallel computation and greatly improve the safety, effectively solves the quantum key distribution scheme between the mobile identifier and the information server, and overcomes the defects of information safety caused by easy stealing of wireless network information and low encryption level.

Description

Heterogeneous wireless communication method and system based on photon super-entangled state
Technical Field
The disclosure belongs to the technical field of wireless network communication safety, and relates to a heterogeneous wireless communication method and system based on a photon super-entangled state.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
With the development of scientific technology, wireless networks are rapidly developed, which are communication systems with electromagnetic waves and network technologies crossed, and although data transmission is fast and convenient, problems in data security are also followed, and due to the use of electromagnetic wave communication, data scattered in the air is very easy to be attacked by EVE, and is very easy to steal. Therefore, it is very necessary to solve the security problem of the wireless network.
Due to the development of quantum information science, some theories are gradually put into practice, and as quantum keys are under the influence of absolute safety theoretically, aiming at the safety problems, a document, namely a wireless self-organizing quantum communication network routing protocol based on quantum remote transfer state, provides a concept of the wireless self-organizing quantum communication network and designs the routing protocol of the wireless self-organizing quantum communication network, and after nodes receive response messages, data is transmitted in the wireless self-organizing quantum communication network by adopting entanglement exchange and two-end approximation methods; the protocol considers how quantum invisible transmission communication is carried out in a complex wireless quantum communication network, but does not consider changing the existing key hierarchy of the wireless network. Document "data link layer selective retransmission protocol based on quantum invisible transmission state" proposes a data link layer selective retransmission protocol based on quantum invisible transmission state, only lost and wrong data are retransmitted, propagation delay in a communication process is reduced, communication efficiency is improved, burden of a classical channel is reduced, but change of the existing key layer is still not involved.
Disclosure of Invention
Aiming at the defects in the prior art, one or more embodiments of the disclosure provide a heterogeneous wireless communication method and system based on photon super-entangled state, a quantum super-entangled state is generated by quantizing a wireless network key, the quantum super-entangled state is used for carrying out key distribution of a wireless network, some basic devices such as users, databases and servers do not need to be changed, quantum key authentication in the super-entangled state can be carried out only by some super-entangled devices, and more keys can be coded and transmitted by the super-entangled state; the method can improve the channel capacity, super-parallel computation and greatly improve the safety, effectively solves the quantum key distribution scheme between the mobile identifier and the information server, and overcomes the defects of information safety caused by easy stealing of wireless network information and low encryption level.
In accordance with an aspect of one or more embodiments of the present disclosure, a method of heterogeneous wireless communication based on photonic super-entangled state is provided.
A heterogeneous wireless communication method based on photon super-entangled state, the method comprising:
the wireless client is associated with the access point, the access point performs identity authentication on the wireless client through the authentication server after connection is established, and the wireless client obtains authorization for using the connection port after the authentication is successful;
the access point starts a four-step handshake protocol, the access point sends a verification data packet to the wireless client, the wireless client receives the verification data packet to judge data integrity, a random data packet is generated when the data is complete and sent to the access point, and the access point and the wireless client generate a quantized pair key with a super-entanglement state according to the verification data packet, the random data packet, the access point and an MAC address of the wireless client;
the access point starts a four-step handshake protocol, the access point sends a quantum bit stream coded to be in a super-entanglement state to the wireless client, the wireless client sends GTK decoding information to the access point to generate a quantized main key in the super-entanglement state, authentication is carried out between the wireless client and the access point, and PTK and GTK are loaded successfully;
determining that the PTK and the GTK of the access point and the wireless client are new, determining that the PMK is the same and latest, and performing data transmission between the access point and the wireless client;
after the data transmission of the wireless client is finished, a logout data frame is sent to the access point, the access point returns logout information to the wireless client, and the authorized port of the access point is restored to the initial state.
Further, in the method, the specific step of associating the wireless client with the access point includes:
the wireless client sends an association request data frame to the access point;
the access point receives the association request data frame and returns an association request reply data frame to the wireless client;
and the wireless client receives the association request reply data frame, judges whether the obtained association request reply data frame is normal or not, associates the wireless client with the access point if the obtained association request reply data frame is normal, and cancels association if the obtained association request reply data frame is not normal.
Further, in the method, the access point performs identity authentication on the wireless client through the authentication server, and the wireless client obtains authorization to use the connection port after the authentication is successful, and the specific steps include:
the wireless client sends a starting frame to the access point;
the access point receives the starting frame and returns the identity authentication requirement to the wireless client;
the wireless client receives the identity authentication request, replies an identity authentication message to the access point, and the access point receives the identity authentication message and converts the identity authentication message into a packet to be sent to the authentication server;
the authentication server encapsulates the identity authentication requirement of the access point and sends the identity authentication requirement to the wireless client through the access point;
the wireless client receives the identity authentication requirement of the encapsulated access point, replies an identity authentication message to the access point, and the access point receives the identity authentication message and converts the identity authentication message into a packet to be sent to the authentication server;
the authentication server packages the identity authentication information of the package, converts the identity authentication information into an access point success frame through the access point and sends the access point success frame to the wireless client, and the wireless client obtains the authorization of using the connection port.
Further, in the method, when the wireless client and the access point are associated, the access point sends information containing field values to the wireless client;
the authentication packet includes the MAC address of the access point and a replay counter field value.
Further, in the method, the specific step of the wireless client receiving the verification data packet and determining the data integrity includes:
the wireless client derives a replay counter field value m from the received authentication packet1Value m of field received in association with the previous association procedure2The comparison is carried out in such a way that,
if m1≤m2If the data is not complete, the wireless client discards the data frame;
if m1>m2Without, at the same timeAnd the line client generates a client random data packet containing the MAC address information of the line client.
Further, in the method, the access point, the wireless client, and the authentication server may each generate and process a quantum super-entangled state.
Further, in the method, the quantization pair key having the super-entangled state and the quantization master key having the super-entangled state select two degrees of freedom entanglement including polarization degree of freedom entanglement and spatial degree of freedom entanglement.
Further, in the method, the key information encoding of the pair key and the master key is performed with more than two degrees of freedom entanglement.
In accordance with another aspect of one or more embodiments of the present disclosure, there is also provided a heterogeneous wireless communication system based on a photonic super-entangled state.
A heterogeneous wireless communication system based on a photon super-entangled state is applied, and the heterogeneous wireless communication method based on the photon super-entangled state comprises a wireless client, an access point and an authentication server which are sequentially connected.
Further, in the method, the wireless client, the access point and the authentication server are all devices capable of generating and processing quantum super-entangled state.
The beneficial effect of this disclosure:
according to the heterogeneous wireless communication method and system based on the photon super-entangled state, basic equipment does not need to be changed, and only equipment for generating and processing super-entangled pairs is added;
according to the heterogeneous wireless communication method and system based on the photon super-entangled state, the KEK of the pairwise key and the GTK of the group key are processed through the photon embedded super-entangled state, so that the capacity and the safety of quantum communication are improved, quantum calculation is accelerated, and the safety of a data chain is greatly guaranteed.
According to the heterogeneous wireless communication method and system based on the photon super-entangled state, the key coding is in the super-entangled state and in multiple degrees of freedom, so that the codable information is expanded at a maximum speed.
According to the heterogeneous wireless communication method and system based on the photon super-entangled state, the quantum information transmission is efficient, the time delay in the communication process is reduced, the burden of classical communication is greatly reduced, and the communication efficiency is directly improved.
The heterogeneous wireless communication method and system based on the photon super-entangled state are simple, easy to operate and easy to implement in an actual system.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application.
Fig. 1 is a flow diagram of a method of heterogeneous wireless communication based on photonic super-entangled state in accordance with one or more embodiments;
fig. 2 is a flow diagram of a particular method of heterogeneous wireless communication based on photonic super-entangled state in accordance with one or more embodiments.
The specific implementation mode is as follows:
technical solutions in one or more embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in one or more embodiments of the present disclosure, and it is apparent that the described embodiments are only a part of the embodiments of the present disclosure, and not all embodiments. All other embodiments, which can be derived by one of ordinary skill in the art based on one or more embodiments of the disclosure without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the disclosure. Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments according to the present application. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
It is noted that the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems according to various embodiments of the present disclosure. It should be noted that each block in the flowchart or block diagrams may represent a module, a segment, or a portion of code, which may comprise one or more executable instructions for implementing the logical function specified in the respective embodiment. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Without conflict, the embodiments and features of the embodiments in the present disclosure may be combined with each other, and the present disclosure will be further described with reference to the drawings and the embodiments.
As shown in fig. 1, the heterogeneous wireless communication method based on photon super-entangled state described by the method can be described as five steps.
The first step stage, initialize; the wireless client is associated with the access point, the access point performs identity authentication on the wireless client through the authentication server after connection is established, and the wireless client obtains authorization for using the connection port after the authentication is successful;
in the second step, the quantized pairwise key is started; the access point starts a four-step handshake protocol, the access point sends a verification data packet to the wireless client, the wireless client receives the verification data packet to judge data integrity, a random data packet is generated when the data is complete and sent to the access point, and the access point and the wireless client generate a quantized pair key with a super-entanglement state according to the verification data packet, the random data packet, the access point and an MAC address of the wireless client;
a third step, starting a quantized group key;
the access point starts a four-step handshake protocol, the access point sends a quantum bit stream coded to be in a super-entanglement state to the wireless client, the wireless client sends GTK decoding information to the access point to generate a quantized main key in the super-entanglement state, authentication is carried out between the wireless client and the access point, and PTK and GTK are loaded successfully;
the fourth step, data communication;
determining that the PTK and the GTK of the access point and the wireless client are new, determining that the PMK is the same and latest, and performing data transmission between the access point and the wireless client;
the fifth step, logout;
after the data transmission of the wireless client is finished, a logout data frame is sent to the access point, the access point returns logout information to the wireless client, and the authorized port of the access point is restored to the initial state.
Fig. 2 is a flow chart of a specific method for heterogeneous wireless communication based on photon super-entangled state.
1. Initialization
1) The wireless client STA and the access point AP are associated, a protocol request and a protocol request reply two data frames are needed, if the obtained data frames are normal, the association is continued, otherwise, the association is cancelled.
2) After the connection process is established in the previous step, the wireless client STA sends a Start frame E APOL-Start to the access point AP.
3) After receiving the start frame, the AP replies to the EAP-Request/Identity, that is, puts forward an Identity authentication Request to the STA.
4) The wireless client STA replies the authentication message, and the Access point AP converts the authentication message into a Radius-Access-Request packet and sends the packet to the authentication server AS after receiving the authentication message.
5) The authentication server AS encapsulates the EAP-Request in Radius-Access-Change and sends the EAP-Request to the wireless client STA through the Access point AP.
6) The wireless client STA replies EAP-Request/Method, the Access point AP converts the received EAP-Request/Method into a Radius-Access-Request packet and sends the Radius-Access-Request packet to the authentication server AS.
7) The authentication server AS converts the Radius-Access packet into an EAP-Success frame through the Access point AP and sends the EAP-Success frame to the wireless client STA, and the wireless client STA obtains the authorization of using the connection port. So far, the start is finished.
2. Quantized pairwise Key Start phase
8) And the Access point AP receives the Access-Access packet received in the initialization stage and sends the EAPOL Key + EPR to the wireless client STA. The four-step handshake protocol is initiated in order to determine that the pairwise master keys obtained by the wireless client STA and the access point AP are the same and up-to-date, and to generate the up-to-date pairwise temporary key, thereby starting the distribution of the quantized pairwise key and the group key.
9) The access point AP sends a message containing the own MAC address (APA) and the field value m of the replay counter to the wireless client STA1Etc. of the information, and (ANonce).
10) The wireless client STA receives ANonce and derives the replay counter field value m therefrom1. With field value m received during a previous association procedure2Comparison, m1≤m2When the data is incomplete, the wireless client STA discards the data frame, m1>m2The wireless client STA generates a client random packet (SNonce) including information such as its MAC address (SA). And the wireless client STA sends SNonce to the access point AP, and the two generate quantized pairwise keys by using ANonce, SNonce, the access point APA and the SA.
The wireless client STA sends SNonce to the access point AP, and the two generate a quantized pair key with a super-entanglement state by using ANonce, SNonce, the access point APA and the SA, which is shown in figure 1. The KCK is a protection key for ensuring authentication and integrity of the four-step handshake phase; the TK is a common encryption key between the wireless client STA and the access point AP; the 128-bit KEK key is encoded as a pair-wise qubit stream, where we use two degrees of freedom for entanglement, in polarization (p) and space(s), as expressed below:
Figure GDA0003219479390000071
wherein | αi|2+|βi|2=1,|αj|2+|βj|2=1,N=128。
The wireless client STA prepares 64 pairs of super-entanglement pairs (128) to deliver the KEK-encoded qubit stream to the access point AP, wherein any one of the entanglement pairs is expressed as:
Figure GDA0003219479390000072
and the corresponding particles b and c are respectively in the wireless client STA and the access point AP. The quantum state formed by any one particle a, b and c in 64 pairs of KEK is as follows:
Figure GDA0003219479390000081
wherein:
Figure GDA0003219479390000082
from the above formula, the measurement result of the STA is (| Ψ)±>ab)p(|Ψ±>ab)sThen, using the unitary transformations-I and-Z, the access point AP can obtain the transmit quantum state ((α)i|0>+βi|1>)a)p((αj|0>+βj|1>)a)s(ii) a Similarly, the wireless client STA measures (| Ψ)±>ab)p(|Φ±>ab)sOr (| Φ)±>ab)p(|Ψ± >ab)sOr (| Φ)±>ab)p(|Φ± >ab)sThen, the transmit quantum state ((α) can be obtained by unitary transformation of-I, -X, -ZY and-Zi|0>+βi|1>)a)p((αj|0>+βj|1>)a)s
Wherein the content of the first and second substances,
Figure GDA0003219479390000083
after quantum state acceptance, the key is transported through using super-entanglement pairs and decoded back into the classical information, in turn as described above, thus completing the quantized pairwise key.
The present embodiment employs a quantized key entangled in two degrees of freedom, and the fact that key information encoding can be performed with multiple degrees of freedom entanglement.
3. Quantized master key startup phase
11) In this stage, the quantization pair key process adopts the same algorithm, 64 super-entanglement pairs are utilized, the access point AP sends 128-bit group temporary keys GTK to the wireless client STA to be encoded into a quantum bit stream, and the operations are sequentially carried out, so that the quantization master key is completed.
12) And after the authentication between the wireless client STA and the access point AP is finished, the PTK and the GTK are loaded successfully.
4. Data communication phase
13) After the above quantization key starting phase is finished, the PTK and GTK of the wireless client STA and the access point AP are all brand-new, and it is determined that the obtained PMK is the same and latest, and then data transmission is performed.
5. Logout stage
14) After data transmission of the wireless client STA is finished, the EAPOL-Logoff data frame sent by the access point AP is received, and the authorized port of the access point AP is restored to the initial state, so that authentication can not be carried out.
In accordance with another aspect of one or more embodiments of the present disclosure, there is also provided a heterogeneous wireless communication system based on a photonic super-entangled state.
A heterogeneous wireless communication system based on a photon super-entangled state is applied, and the heterogeneous wireless communication method based on the photon super-entangled state comprises a wireless client, an access point and an authentication server which are sequentially connected.
Further, in the method, the wireless client, the access point and the authentication server are all devices capable of generating and processing quantum super-entangled state.
The beneficial effect of this disclosure:
according to the heterogeneous wireless communication method and system based on the photon super-entangled state, basic equipment does not need to be changed, and only equipment for generating and processing super-entangled pairs is added;
according to the heterogeneous wireless communication method and system based on the photon super-entangled state, the KEK of the pairwise key and the GTK of the group key are processed through the photon embedded super-entangled state, so that the capacity and the safety of quantum communication are improved, quantum calculation is accelerated, and the safety of a data chain is greatly guaranteed.
According to the heterogeneous wireless communication method and system based on the photon super-entangled state, the key coding is in the super-entangled state and in multiple degrees of freedom, so that the codable information is expanded at a maximum speed.
According to the heterogeneous wireless communication method and system based on the photon super-entangled state, the quantum information transmission is efficient, the time delay in the communication process is reduced, the burden of classical communication is greatly reduced, and the communication efficiency is directly improved.
The heterogeneous wireless communication method and system based on the photon super-entangled state are simple, easy to operate and easy to implement in an actual system.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A heterogeneous wireless communication method based on photon super-entangled state is characterized by comprising the following steps:
the wireless client is associated with the access point, the access point performs identity authentication on the wireless client through the authentication server after connection is established, and the wireless client obtains authorization for using the connection port after the authentication is successful;
the access point starts a four-step handshake protocol, the access point sends a verification data packet to the wireless client, the wireless client receives the verification data packet to judge data integrity, a random data packet is generated when the data is complete and sent to the access point, and the access point and the wireless client generate a quantized pair key with a super-entanglement state according to the verification data packet, the random data packet, the access point and an MAC address of the wireless client;
the specific process for generating the quantized pairwise key with the super-entangled state is as follows: the 128-bit KEK key is encoded into a pair of quantum bit streams, and is entangled by two degrees of freedom, namely polarization degree of freedom p and space degree of freedom s, and the expression is as follows:
Figure FDA0003333618280000011
wherein | αi|2+|βi|2=1,|αj|2+|βj|2=1,N=128,
Figure FDA0003333618280000012
For j quantum bits | ψ under a polarization degree of freedom pi>pAnd N-1 bit quantum bit | ψ in spatial degree of freedom sj>sIs given, wherein i and j are respectively | ψ>pAnd | ψ>sThe index subscripts of (a) and (beta) represent | ψi>pState sum | ψ ofj>sThe probability of (d);
the wireless client prepares 64 pairs of super-entangled pairs, encodes 128-bit KEK keys into a quantum bit stream and transmits the quantum bit stream to the access point, wherein the expression of any one of the entangled pairs is as follows:
Figure FDA0003333618280000013
the particles b and c corresponding to the entanglement pairs are respectively in the wireless client and the access point; the quantum state formed by any one particle a, b and c in 64 pairs of KEK is as follows:
Figure FDA0003333618280000014
wherein:
Figure FDA0003333618280000015
the wireless client measurement result is (| Ψ)±>ab)p(|Ψ±>ab)sThen, using the unitary transforms-I and-Z, the access point obtains the transmitted quantum state ((α)i|0>+βi|1>)a)p((αj|0>+βj|1>)a)s(ii) a Similarly, the wireless client measurement result is (| Ψ)±>ab)p(|Φ±>ab)sOr (| Φ)±>ab)p(|Ψ±>ab)sOr (| Φ)±>ab)p(|Φ±>ab)sThen, the sending quantum state ((alpha) is obtained by using unitary transformation-I, -X, -Y and-Zi|0>+βi|1>)a)p((αj|0>+βj|1>)a)s
Wherein the content of the first and second substances,
Figure FDA0003333618280000021
after the quantum state is received, the key is transmitted by using the super-entanglement pair and decoded back to classical information, so that the quantized pairwise key is completed;
the access point starts a four-step handshake protocol, the access point sends a quantum bit stream coded to be in a super-entanglement state to the wireless client, the wireless client sends GTK decoding information to the access point to generate a quantized main key in the super-entanglement state, authentication is carried out between the wireless client and the access point, and PTK and GTK are loaded successfully;
determining that the PTK and the GTK of the access point and the wireless client are new, determining that the PMK is the same and latest, and performing data transmission between the access point and the wireless client;
after the data transmission of the wireless client is finished, a logout data frame is sent to the access point, the access point returns logout information to the wireless client, and the authorized port of the access point is restored to the initial state.
2. The method for heterogeneous wireless communication based on photon super-entangled state according to claim 1, wherein the association between the wireless client and the access point comprises:
the wireless client sends an association request data frame to the access point;
the access point receives the association request data frame and returns an association request reply data frame to the wireless client;
and the wireless client receives the association request reply data frame, judges whether the obtained association request reply data frame is normal or not, associates the wireless client with the access point if the obtained association request reply data frame is normal, and cancels association if the obtained association request reply data frame is not normal.
3. The method as claimed in claim 1, wherein the method comprises the following steps that the access point authenticates the identity of the wireless client through an authentication server, and the wireless client obtains authorization to use the connection port after the authentication is successful, and the method comprises:
the wireless client sends a starting frame to the access point;
the access point receives the starting frame and returns the identity authentication requirement to the wireless client;
the wireless client receives the identity authentication request, replies an identity authentication message to the access point, and the access point receives the identity authentication message and converts the identity authentication message into a packet to be sent to the authentication server;
the authentication server encapsulates the identity authentication requirement of the access point and sends the identity authentication requirement to the wireless client through the access point;
the wireless client receives the identity authentication requirement of the encapsulated access point, replies an identity authentication message to the access point, and the access point receives the identity authentication message and converts the identity authentication message into a packet to be sent to the authentication server;
the authentication server packages the identity authentication information of the package, converts the identity authentication information into an access point success frame through the access point and sends the access point success frame to the wireless client, and the wireless client obtains the authorization of using the connection port.
4. The method as claimed in claim 1, wherein the method comprises the steps of, when the wireless client and the access point are associated, the access point sending information containing field values to the wireless client;
the authentication packet includes the MAC address of the access point and a replay counter field value.
5. The method as claimed in claim 4, wherein the step of receiving the verification packet and determining the data integrity by the wireless client comprises:
the wireless client derives a replay counter field value m from the received authentication packet1Value m of field received in association with the previous association procedure2The comparison is carried out in such a way that,
if m1≤m2If the data is not complete, the wireless client discards the data frame;
if m1>m2The wireless client generates a client random data packet containing its own MAC address information.
6. The method as claimed in claim 1, wherein the access point, the wireless client and the authentication server generate and process quantum super-entangled state.
7. A method for heterogeneous wireless communication based on photon super-entangled state according to claim 1, wherein the method selects two degrees of freedom entanglement including polarization degree of freedom entanglement and spatial degree of freedom entanglement for the quantized pair key with super-entangled state and the quantized master key with super-entangled state.
8. The method as claimed in claim 1, wherein the key information coding of the pairwise key and the master key is performed with more than two degrees of freedom entanglement.
9. The heterogeneous wireless communication system based on the photon super-entangled state applies the heterogeneous wireless communication method based on the photon super-entangled state according to any one of claims 1 to 8, and comprises a wireless client, an access point and an authentication server which are connected in sequence.
10. The heterogeneous wireless communication system based on photon super-entangled state according to claim 9, wherein in the method, the wireless client, the access point and the authentication server are all devices generating and processing quantum super-entangled state.
CN201910012575.8A 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state Active CN109510706B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910012575.8A CN109510706B (en) 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910012575.8A CN109510706B (en) 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state

Publications (2)

Publication Number Publication Date
CN109510706A CN109510706A (en) 2019-03-22
CN109510706B true CN109510706B (en) 2022-01-11

Family

ID=65756334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910012575.8A Active CN109510706B (en) 2019-01-07 2019-01-07 Heterogeneous wireless communication method and system based on photon super-entangled state

Country Status (1)

Country Link
CN (1) CN109510706B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111181633B (en) * 2020-01-22 2022-02-01 南京邮电大学 Time-polarization super-entangled state entanglement auxiliary noiseless linear amplification method
US11757630B2 (en) 2021-04-27 2023-09-12 Cisco Technology, Inc. Set up and distribution of post-quantum secure pre-shared keys using extendible authentication protocol
CN114024672B (en) * 2021-11-14 2024-03-26 广东电网有限责任公司电力调度控制中心 Safety protection method and system for power line carrier communication system
CN114422126B (en) * 2021-12-31 2023-11-28 广东国腾量子科技有限公司 Joint debugging test system and method for quantum key management software module

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013052903A1 (en) * 2011-10-05 2013-04-11 The Trustees Of Columbia University In The City Of New York Chip-scale interferometry for hyperentanglement processing
CN105915346A (en) * 2016-04-15 2016-08-31 青岛理工大学 RFID system bidirectional authentication method based on decoy state quantum random key
CN107786280A (en) * 2017-09-30 2018-03-09 南京邮电大学 It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338448A (en) * 2013-06-07 2013-10-02 国家电网公司 Wireless local area network security communication method based on quantum key distribution

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013052903A1 (en) * 2011-10-05 2013-04-11 The Trustees Of Columbia University In The City Of New York Chip-scale interferometry for hyperentanglement processing
CN105915346A (en) * 2016-04-15 2016-08-31 青岛理工大学 RFID system bidirectional authentication method based on decoy state quantum random key
CN107786280A (en) * 2017-09-30 2018-03-09 南京邮电大学 It is a kind of based on the super tripartite's quantum safety direct communication method for tangling Bel's state

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
《An Authentication Protocol Based on Quantum Key Distribution Using Decoy-State Method for Heterogeneous IoT》;Hongyang ma et al.;《Wireless Personal Communications》;20160823;全文 *
《Development of Security WLAN Protocol Based on Quantum GHZ Stats》;Hongyang Ma et al.;《Wireless Personal Communications》;20140815;正文2-4节,图1 *
《光子两自由度超并行量子计算与超纠缠态操控》;任宝藏等;《物理学报》;20151231;第64卷(第16期);正文第1节 *

Also Published As

Publication number Publication date
CN109510706A (en) 2019-03-22

Similar Documents

Publication Publication Date Title
CN109510706B (en) Heterogeneous wireless communication method and system based on photon super-entangled state
CN108111301B (en) Method and system for realizing SSH protocol based on post-quantum key exchange
CN110213060B (en) Non-entanglement quantum blind signature method and system based on quantum walking
CN110830255B (en) Bidirectional user authentication and secret information quantum communication transfer method
CN110086616B (en) Forward one-time pad secret communication method based on wireless channel
CN110138550B (en) QKD network system model construction method
CN110401494B (en) Quantum secure direct communication method irrelevant to measuring equipment on high-dimensional subspace
WO2022142307A1 (en) Secure relay-based quantum communication method and communication network
CN109995528B (en) Semi-quantum secure direct communication method and storage medium
WO2021000329A1 (en) Multi-party quantum key agreement method, computer terminal and storage device
CN107666491B (en) Data transmission method of air-ground integrated network based on symmetric encryption
CN111416712B (en) Quantum secret communication identity authentication system and method based on multiple mobile devices
CN111082938B (en) Method and device for improving quantum key distribution system code rate
CN116056080A (en) Satellite switching authentication method for low-orbit satellite network
CN110247768B (en) Certificable semi-quantum secret sharing method and system based on GHZ state
CN110932863B (en) Generalized signcryption method based on coding
Li et al. Quantum key agreement via non-maximally entangled cluster states
Li et al. Deterministic quantum secure direct communication protocol based on hyper-entangled state
CN106487502B (en) Lightweight key negotiation method based on password
Zhou et al. Controlled deterministic secure semi-quantum communication
CN114844649B (en) Secret key distribution method containing trusted third party based on superlattice PUF
CN113094721B (en) Post-quantum password authentication key exchange method based on modular error learning
Ma et al. Quantum mutual authentication key agreement scheme using five-qubit entanglement towards different realm architecture
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
CN110912695B (en) Quantum arbitration signature method and system based on six-particle invisible transmission state

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant