CN110380859A - Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system - Google Patents
Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system Download PDFInfo
- Publication number
- CN110380859A CN110380859A CN201910464740.3A CN201910464740A CN110380859A CN 110380859 A CN110380859 A CN 110380859A CN 201910464740 A CN201910464740 A CN 201910464740A CN 110380859 A CN110380859 A CN 110380859A
- Authority
- CN
- China
- Prior art keywords
- key
- service station
- message
- authentication
- certification message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3242—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
This application discloses it is a kind of based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system, system includes masters, passive side, service station QA, service station QB and communication network;Masters and passive side are each configured with client key card, and service station public key pond and a pair of of client public and private key are stored in client key card;Service station QA and service station QB is each configured with service station key card, and client public key pond, service station private key pond, service station public key pond, quantum communications service station public key pond and quantum communications service station private key are stored in the key card of service station.The risk that unsymmetrical key in the application is cracked is low, and it solves pool of symmetric keys and gives quantum communications service station bring key storage pressure, data in identifying procedure can only be decrypted by DH private key owner, improve the safety of the identifying procedure based on symmetric key algorithm.
Description
Technical field
The application belongs to safety communication technology field, and in particular to the quantum communications based on unsymmetrical key pond and DH agreement
Identity identifying method and system.Implement the identity authorization system under quantum communications service station between client and client.
Background technique
The Internet of rapid development brings huge convenience to people's lives, work, and people can be sitting in family
It sent and received e-mail, made a phone call by Internet, carrying out the activities such as shopping online, bank transfer.The network information security simultaneously
It is increasingly becoming a potential huge problem.In general the network information is faced with following several security risks: the network information
It is stolen, information is tampered, attacker palms off information, malicious sabotage etc..
Wherein authentication is a kind of means of one of protection people's network information.Authentication is also referred to as " identity
Verifying " or " identity identification ", refer to the process of confirmation operation person's identity in computer and computer network system, so that it is determined that
Whether the user has access and access right to certain resource, and then enables the access strategy of computer and networks system
It reliably and efficiently executes, prevents attacker from palming off the access authority that legitimate user obtains resource, guarantee the peace of system and data
Entirely, and authorization visitor legitimate interests.
And currently ensure that authentication successfully mainly relies on cryptographic technique, and in field of cryptography of today, it is main
Will there are two types of cryptographic system, first is that symmetric key cryptosystem, i.e. encryption key and decruption key use it is same.The other is
Public key cryptosystem, i.e. encryption key and decruption key difference, one of them can be disclosed.Current most identity is recognized
Card relies primarily on public key cryptography system using algorithm.
The encryption key pair (public key) and decryption key (private key) that Public Key Cryptographic Systems uses are different.Due to encryption
Key be it is disclosed, the distribution of key and management are just very simple, and Public Key Cryptographic Systems can also be easily carried out number
Signature.
Since public key encryption comes out, scholars propose many kinds of public key encryption methods, their safety is all base
In complicated difficult math question.Classified according to the difficult math question being based on, have following three classes system be presently believed to be safety and
It is effective: big integer factorization system (representative to have RSA), Discrete log systems (representative to have DSA) and ellipse from
It dissipates Logarithmic system (ECC).
But with the development of quantum computer, classical asymmetric-key encryption algorithm will be no longer safe, no matter encryption and decryption
Or private key can be calculated in key exchange method, quantum computer by public key, therefore currently used asymmetric close
Key will become cannot withstand a single blow in the quantum epoch.Quantum key distribution equipment QKD can ensure that the key of negotiation can not be acquired at present.
But QKD is mainly used for quantum main line, client device to quantum communications service station is still classic network, therefore by non-right
Claim algorithm it is difficult to ensure that authentication procedures safety.
Due to the potential threat of quantum computer, the existing scheme that authentication is carried out based on pool of symmetric keys, utilization
Symmetric key between sub- communication service station and quantum key card carries out authentication, abandons using public key cryptography, to avoid
Identity authorization system is cracked by quantum computer.
Problem of the existing technology:
1. the existing scheme for carrying out authentication based on pool of symmetric keys, between quantum communications service station and quantum key card
Using pool of symmetric keys, capacity is huge, brings pressure to the key storage in quantum communications service station;
2. the existing scheme that authentication is carried out based on pool of symmetric keys, since pool of symmetric keys key capacity is huge, amount
Sub- communication service station, which has to encrypt key, to be stored in common storage such as hard disk, and can not be stored in quantum communications
In the key card in service station;
3. the existing scheme for carrying out authentication based on pool of symmetric keys is given since pool of symmetric keys key capacity is huge
Cipher key backup causes trouble.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide it is a kind of based on unsymmetrical key pond to and DH agreement amount
Sub- communication service station identity identifying method and system.
This application discloses based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, it is real
It applies in masters, the quantum communications service station identity identifying method, comprising:
It generates the first parameters for authentication X and is sent to passive side;The first parameters for authentication X is used for raw in conjunction with one's own side for passive side
At the second parameters for authentication Y obtain the first certification message, the first certification message is used to be forwarded to service station QB through passive side
The second certification message is obtained for service station QB afterwards;
The second certification message from passive side is received, is generated according to the second certification message and the first parameters for authentication X
Third authenticates message, service station QA public key PKQA5 and one's own side private key SKA is obtained from one's own side's key card, and utilize the service
The QA public key PKQA5 and one's own side's private key SKA that stands generates DH key K5, the third message authentication encrypted using the DH key K5
Code and the third of encryption authenticate message;
The third message authentication code of encryption and the third certification message of encryption are sent to service station QA;The third message is recognized
Card code is used for for trusting the third certification message, the third certification message after being verified for service station QA for service station
QA obtains the 4th certification message, and the 4th certification message includes using one's own side's private key by service station QA to the first parameters for authentication X
The 4th signature signed with the second parameters for authentication Y;
The 4th certification message for obtaining the encryption from service station QA, obtains service station QA public key from one's own side's key card
PKQA6 and one's own side private key SKA, and DH key K6 is generated using the service station QA public key PKQA6 and one's own side's private key SKA, it utilizes
The DH key K6 decrypts to obtain the 4th certification message;
The 4th certification message is sent to passive side;The 4th certification message is after passive side is forwarded to service station QB
It parses to obtain the 4th signature for service station QB, the 4th signature is for for obtaining authentication knot after the QB sign test of service station
Fruit, the identity authentication result for passive side for being received and confirmed by.
This application discloses based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, it is real
It applies in passive side, the quantum communications service station identity identifying method, comprising:
The first parameters for authentication X from masters is obtained, generates the second parameters for authentication Y in one's own side, and according to described first
Parameters for authentication X and the second parameters for authentication Y obtain the first certification message, and service station QB public key PKQB2 is obtained from one's own side's key card
With one's own side private key SKB, and DH key K2 is generated using the service station QB public key PKQB2 and one's own side's private key SKB, utilizes the DH
First certification message of the first message authentication code that key K2 is encrypted and encryption;The first parameters for authentication X is by masters
It generates;
The first message authentication code of encryption and the first certification message of encryption are sent to service station QB;The first message is recognized
Card code is used for for trusting the first certification message, the first certification message after being verified for service station QB for service station
QB obtains the second certification message;
The the second certification message for obtaining the encryption from service station QB, obtains service station QB public affairs from one's own side's key card
Key PKQB3 and one's own side private key SKB, and DH key K3, benefit are generated using the service station QB public key PKQB3 and one's own side's private key SKB
It is decrypted to obtain the second certification message with the DH key K3;
The second certification message is sent to masters;The second certification message is used to combine the first certification for masters
Parameter X generates third and authenticates message, and third certification message is used to obtain the 4th certification message for service station QA, and the described 4th
Certification message includes the to be signed using one's own side's private key to the first parameters for authentication X and the second parameters for authentication Y by service station QA
Four signatures;
The 4th certification message from masters is obtained, the 4th certification message is encrypted;
The 4th certification message of encryption is sent to service station QB;The 4th certification message for service station QB for parsing
To the 4th signature, the 4th signature is for for obtaining identity authentication result after the QB sign test of service station;
Receive the identity authentication result from service station QB.
This application discloses based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, it is real
It applies in service station QB, the quantum communications service station identity identifying method, comprising:
Obtain the first message authentication code of the encryption from passive side and the first certification message of encryption;
Passive side's public key PKB and one's own side private key SKQB2 are obtained from one's own side's key card, and utilize passive side's public key
PKB and one's own side's private key SKQB2 generate DH key K2, decrypt to obtain the first message authentication code and the using the DH key K2
One certification message trusts the first certification message after passing through to the first message authentication code verifying;
The second certification message is obtained according to the first certification message, passive side's public key PKB is obtained from one's own side's key card
With one's own side private key SKQB3, and DH key K3 is generated using passive side's public key PKB and one's own side's private key SKQB3, utilizes the DH
Key K3 is to the second certification message encryption;
The second certification message of encryption is sent to passive side;The second certification message is forwarded to actively through passive side
It combines the first parameters for authentication X to generate third for masters behind side and authenticates message, the third certification message is used for for service station QA
Obtain the 4th certification message, the 4th certification message include by service station QA using one's own side's private key to the first parameters for authentication X and
The 4th signature that second parameters for authentication Y signs;
The 4th certification message for receiving the encryption from passive side obtains after decryption according to the 4th certification message described
4th signature, and identity authentication result is obtained after carrying out sign test to the 4th signature;The 4th certification message is by masters
It is forwarded to passive side;
The identity authentication result is sent to passive side.
This application discloses based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, it is real
It applies in service station QA, the quantum communications service station identity identifying method, comprising:
The third of the third message authentication code and encryption that receive the encryption from masters authenticates message;
Masters public key PKA and one's own side private key SKQA5 are obtained from one's own side's key card, and utilize the masters public key
PKA and one's own side's private key SKQA5 generates DH key K5, decrypts to obtain third message authentication code using the DH key K5 and third is recognized
Message is demonstrate,proved, the third certification message is trusted after passing through to third message authentication code verifying;
Message is authenticated according to the third and obtains the first parameters for authentication X and the second parameters for authentication Y, and utilizes one's own side's private key pair
The 4th signature that first parameters for authentication X and the second parameters for authentication Y sign obtains the 4th certification according to the 4th signature and disappears
Breath obtains masters public key PKA and one's own side private key SKQA6 from one's own side's key card, and utilizes the masters public key PKA and oneself
Square private key SKQA6 generates DH key K6, encrypts the 4th certification message using the DH key K6;
The 4th certification message of encryption is sent to masters;The 4th certification message is forwarded to passive side through masters,
The 4th certification message parses to obtain the 4th signature for service station QB after passive side is forwarded to service station QB, and described the
Four signatures are for for obtaining identity authentication result after the QB sign test of service station, the identity authentication result to be used to receive simultaneously for passive side
Confirmation.
This application discloses based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, institute
The quantum communications service station identity identifying method stated, comprising:
The masters generate the first parameters for authentication X and are sent to passive side;
The passive side obtains the first parameters for authentication X from masters, generates the second parameters for authentication Y, and root in one's own side
The first certification message is obtained according to the first parameters for authentication X and the second parameters for authentication Y, service station QB is obtained from one's own side's key card
Public key PKQB2 and one's own side private key SKB, and DH key K2 is generated using the service station QB public key PKQB2 and one's own side's private key SKB,
The first message authentication code encrypted using the DH key K2 and the first certification message of encryption are sent to service station QB;
The service station QB obtains the first message authentication code of the encryption from passive side and the first certification message of encryption,
Passive side's public key PKB and one's own side private key SKQB2 are obtained from one's own side's key card, and utilize passive side's public key PKB and one's own side
Private key SKQB2 generates DH key K2, decrypts to obtain the first message authentication code using the DH key K2 and the first certification disappears
Breath trusts the first certification message after passing through to the first message authentication code verifying, obtained according to the first certification message
To the second certification message, passive side's public key PKB and one's own side private key SKQB3 are obtained from one's own side's key card, and utilization is described passive
Square public key PKB and one's own side's private key SKQB3 generates DH key K3, authenticates message encryption to described second using the DH key K3,
The second certification message of encryption is sent to passive side;
The passive side obtains the second certification message of the encryption from service station QB, obtains from one's own side's key card
Service station QB public key PKQB3 and one's own side private key SKB, and DH is generated using the service station QB public key PKQB3 and one's own side's private key SKB
Key K3, decrypts to obtain the second certification message using the DH key K3, sends the second certification message to masters;
The masters receive the second certification message from passive side, according to the second certification message and the first certification
Parameter X generates third and authenticates message, service station QA public key PKQA5 and one's own side private key SKA is obtained from one's own side's key card, and utilize
The service station QA public key PKQA5 and one's own side's private key SKA generates DH key K5, the third encrypted using the DH key K5
Message authentication code and the third of encryption certification message are sent to service station QA;
The service station QA receives the third message authentication code of the encryption from masters and the third of encryption authenticates message,
Masters public key PKA and one's own side private key SKQA5 are obtained from one's own side's key card, and utilize the masters public key PKA and one's own side
Private key SKQA5 generates DH key K5, decrypts to obtain third message authentication code using the DH key K5 and third authenticates message, right
Third message authentication code verifying trusts the third certification message after passing through, authenticate message according to the third and obtain the first certification
Parameter X and the second parameters for authentication Y, and to be signed using one's own side's private key to the first parameters for authentication X and the second parameters for authentication Y
Four signatures obtain the 4th certification message according to the 4th signature, masters public key PKA and one's own side are obtained from one's own side's key card
Private key SKQA6, and DH key K6 is generated using the masters public key PKA and one's own side's private key SKQA6, utilize the DH key K6
It encrypts the 4th certification message and is sent to masters;
The masters obtain the 4th certification message of the encryption from service station QA, are serviced from one's own side's key card
Stand QA public key PKQA6 and one's own side private key SKA, and generates DH key using the service station QA public key PKQA6 and one's own side's private key SKA
K6, decrypts to obtain the 4th certification message using the DH key K6, sends the 4th certification message to passive side;
The passive side obtains the 4th certification message from masters, carries out at encryption to the 4th certification message
Reason sends the 4th certification message of encryption to service station QB;
The service station QB receives the 4th certification message of the encryption from passive side, according to the 4th certification after decryption
Message obtains the 4th signature, and is sent to passive side to identity authentication result is obtained after the 4th signature progress sign test;
The passive side receives the identity authentication result from service station QB.
Further, the masters and passive side are each configured with client key card, in the client key card
It is stored with service station public key pond and a pair of of client public and private key;The service station QA and service station QB are each configured with service station
It is logical to be stored with client public key pond, service station private key pond, service station public key pond, quantum in the service station key card for key card
Telecommunications services station public key pond and quantum communications service station private key.
Further, the step of generation DH key Ki includes:
If service station public key be PKQi, service station private key be SKQi, client public key PK, client private key SK, then
DH key Ki=PKQi^SK mod p is generated using the service station public key PKQi and client private key SK;Utilize client public affairs
Key PK and service station private key SKQi generates DH key Ki '=PK^SKQi mod p;
It can be obtained according to Diffie-Hellman agreement, PKQi^SK mod p=PK^SKQi mod p, i.e. Ki=Ki '.
Disclosed herein as well is a kind of computer equipment, including memory and processor, the memory is stored with calculating
Machine program, the processor realize the step of the quantum communications service station identity identifying method when executing the computer program
Suddenly.
Disclosed herein as well is it is a kind of based on unsymmetrical key pond to and DH agreement the authentication of quantum communications service station
System, including masters, passive side, service station QA, service station QB and communication network;The masters and passive side match respectively
It is equipped with client key card, service station public key pond and a pair of of client public and private key are stored in the client key card;It is described
Service station QA and service station QB is each configured with service station key card, is stored with client public key in the service station key card
Pond, service station private key pond, service station public key pond, quantum communications service station public key pond and quantum communications service station private key;
The masters, passive side, service station QA and service station QB realize that the quantum is logical by the communication network
The step of telecommunications services station identity identifying method.
In the application, the key card used is independent hardware isolated equipment.Public key, private key and other relevant parameters are deposited
A possibility that storing up the data safety area in key card, stealing key by Malware or malicious operation substantially reduces, will not
It is obtained and is cracked by quantum computer.Simultaneously unsymmetrical key pond solve pool of symmetric keys brought to quantum communications service station it is close
Key stores pressure, reduces carrying cost.And the identifying procedure based on symmetric key algorithm is improved, so that identifying procedure
In data, such as between B and service station interaction random number and digital signature, the symmetric key encryption obtained by DH algorithm protects
Shield.Since the symmetric key that DH algorithm obtains can only calculate gained by communicating pair, the data in authentication authorization and accounting process can only be by DH
Private key owner decryption, all other men can not decrypt, therefore improve the peace of the identifying procedure based on symmetric key algorithm
Quan Xing.
Detailed description of the invention
Fig. 1 is the pool of keys distribution schematic diagram of service station key card in the application;
Fig. 2 is the pool of keys distribution schematic diagram of client key card in the application;
Fig. 3 is the authentication process figure of embodiment 1.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on
Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall in the protection scope of this application.
In order to better describe and illustrate embodiments herein, one or more attached drawing can refer to, but attached for describing
The additional detail or example of figure are not construed as to present invention creation, current described embodiment or preferred side
The limitation of the range of any one in formula.
It should be understood that there is no stringent sequences to limit for the execution of each step unless expressly stating otherwise herein,
These steps can execute in other order.Moreover, at least part step may include multiple sub-steps or multiple ranks
Section, these sub-steps or stage are not necessarily to execute completion in synchronization, but can execute at different times, this
The execution sequence in a little step perhaps stage be also not necessarily successively carry out but can be with other steps or other steps
Sub-step or at least part in stage execute in turn or alternately.
In one embodiment, provide it is a kind of based on unsymmetrical key pond to and the quantum communications service station identity of DH agreement recognize
Card method is implemented in masters, the quantum communications service station identity identifying method, comprising:
It generates the first parameters for authentication X and is sent to passive side;The first parameters for authentication X is used for raw in conjunction with one's own side for passive side
At the second parameters for authentication Y obtain the first certification message, the first certification message is used to be forwarded to service station QB through passive side
The second certification message is obtained for service station QB afterwards;
The second certification message from passive side is received, is generated according to the second certification message and the first parameters for authentication X
Third authenticates message, service station QA public key PKQA5 and one's own side private key SKA is obtained from one's own side's key card, and utilize the service
The QA public key PKQA5 and one's own side's private key SKA that stands generates DH key K5, the third message authentication encrypted using the DH key K5
Code and the third of encryption authenticate message;
The third message authentication code of encryption and the third certification message of encryption are sent to service station QA;The third message is recognized
Card code is used for for trusting the third certification message, the third certification message after being verified for service station QA for service station
QA obtains the 4th certification message, and the 4th certification message includes using one's own side's private key by service station QA to the first parameters for authentication X
The 4th signature signed with the second parameters for authentication Y;
The 4th certification message for obtaining the encryption from service station QA, obtains service station QA public key from one's own side's key card
PKQA6 and one's own side private key SKA, and DH key K6 is generated using the service station QA public key PKQA6 and one's own side's private key SKA, it utilizes
The DH key K6 decrypts to obtain the 4th certification message;
The 4th certification message is sent to passive side;The 4th certification message is after passive side is forwarded to service station QB
It parses to obtain the 4th signature for service station QB, the 4th signature is for for obtaining authentication knot after the QB sign test of service station
Fruit, the identity authentication result for passive side for being received and confirmed by.
In the present embodiment, the DH key encipherment protection that the message transmitted when each side conversates is obtained by DH algorithm, due to
DH key can only be calculated by communicating pair, to improve the safety of the identifying procedure based on symmetric key algorithm.
In one embodiment, provide it is a kind of based on unsymmetrical key pond to and the quantum communications service station identity of DH agreement recognize
Card method is implemented in passive side, the quantum communications service station identity identifying method, comprising:
The first parameters for authentication X from masters is obtained, generates the second parameters for authentication Y in one's own side, and according to described first
Parameters for authentication X and the second parameters for authentication Y obtain the first certification message, and service station QB public key PKQB2 is obtained from one's own side's key card
With one's own side private key SKB, and DH key K2 is generated using the service station QB public key PKQB2 and one's own side's private key SKB, utilizes the DH
First certification message of the first message authentication code that key K2 is encrypted and encryption;The first parameters for authentication X is by masters
It generates;
The first message authentication code of encryption and the first certification message of encryption are sent to service station QB;The first message is recognized
Card code is used for for trusting the first certification message, the first certification message after being verified for service station QB for service station
QB obtains the second certification message;
The the second certification message for obtaining the encryption from service station QB, obtains service station QB public affairs from one's own side's key card
Key PKQB3 and one's own side private key SKB, and DH key K3, benefit are generated using the service station QB public key PKQB3 and one's own side's private key SKB
It is decrypted to obtain the second certification message with the DH key K3;
The second certification message is sent to masters;The second certification message is used to combine the first certification for masters
Parameter X generates third and authenticates message, and third certification message is used to obtain the 4th certification message for service station QA, and the described 4th
Certification message includes the to be signed using one's own side's private key to the first parameters for authentication X and the second parameters for authentication Y by service station QA
Four signatures;
The 4th certification message from masters is obtained, the 4th certification message is encrypted;
The 4th certification message of encryption is sent to service station QB;The 4th certification message for service station QB for parsing
To the 4th signature, the 4th signature is for for obtaining identity authentication result after the QB sign test of service station;
Receive the identity authentication result from service station QB.
In the present embodiment, the DH key encipherment protection that the message transmitted when each side conversates is obtained by DH algorithm, due to
DH key can only be calculated by communicating pair, to improve the safety of the identifying procedure based on symmetric key algorithm.
In one embodiment, provide it is a kind of based on unsymmetrical key pond to and the quantum communications service station identity of DH agreement recognize
Card method is implemented in service station QB, the quantum communications service station identity identifying method, comprising:
The first message authentication code of the encryption from passive side and the first certification message of encryption are obtained, from one's own side's key card
In obtain passive side's public key PKB and one's own side private key SKQB2, and generated using passive side's public key PKB and one's own side's private key SKQB2
DH key K2 decrypts to obtain the first message authentication code and the first certification message using the DH key K2, to described first
Message authentication code verifying trusts the first certification message after passing through, obtain the second certification according to the first certification message and disappear
Breath obtains passive side's public key PKB and one's own side private key SKQB3 from one's own side's key card, and utilizes passive side's public key PKB and oneself
Square private key SKQB3 generates DH key K3, using the DH key K3 to the second certification message encryption;
The second certification message of encryption is sent to passive side;The second certification message is forwarded to actively through passive side
It combines the first parameters for authentication X to generate third for masters behind side and authenticates message, the third certification message is used for for service station QA
Obtain the 4th certification message, the 4th certification message include by service station QA using one's own side's private key to the first parameters for authentication X and
The 4th signature that second parameters for authentication Y signs;
The 4th certification message for receiving the encryption from passive side obtains after decryption according to the 4th certification message described
4th signature, and identity authentication result is obtained after carrying out sign test to the 4th signature;The 4th certification message is by masters
It is forwarded to passive side;
The identity authentication result is sent to passive side.
In the present embodiment, the DH key encipherment protection that the message transmitted when each side conversates is obtained by DH algorithm, due to
DH key can only be calculated by communicating pair, to improve the safety of the identifying procedure based on symmetric key algorithm.
In one embodiment, provide it is a kind of based on unsymmetrical key pond to and the quantum communications service station identity of DH agreement recognize
Card method is implemented in service station QA, the quantum communications service station identity identifying method, comprising:
The third of the third message authentication code and encryption that receive the encryption from masters authenticates message, from one's own side's key card
In obtain masters public key PKA and one's own side private key SKQA5, and generated using the masters public key PKA and one's own side's private key SKQA5
DH key K5 is decrypted to obtain third message authentication code and third is authenticated message, to third message authentication using the DH key K5
Code trusts the third certification message after being verified, authenticate message according to the third and obtain the first parameters for authentication X and second
Parameters for authentication Y, and the 4th signature signed using one's own side's private key to the first parameters for authentication X and the second parameters for authentication Y, according to
4th signature obtains the 4th certification message, and masters public key PKA and one's own side private key SKQA6 are obtained from one's own side's key card,
And DH key K6 is generated using the masters public key PKA and one's own side's private key SKQA6, described the is encrypted using the DH key K6
Four certification message;
The 4th certification message of encryption is sent to masters;The 4th certification message is forwarded to passive side through masters,
The 4th certification message parses to obtain the 4th signature for service station QB after passive side is forwarded to service station QB, and described the
Four signatures are for for obtaining identity authentication result after the QB sign test of service station, the identity authentication result to be used to receive simultaneously for passive side
Confirmation.
In the present embodiment, the DH key encipherment protection that the message transmitted when each side conversates is obtained by DH algorithm, due to
DH key can only be calculated by communicating pair, to improve the safety of the identifying procedure based on symmetric key algorithm.
In one embodiment, provide it is a kind of based on unsymmetrical key pond to and the quantum communications service station identity of DH agreement recognize
Card method, the quantum communications service station identity identifying method, comprising:
The masters generate the first parameters for authentication X and are sent to passive side;
The passive side obtains the first parameters for authentication X from masters, generates the second parameters for authentication Y, and root in one's own side
The first certification message is obtained according to the first parameters for authentication X and the second parameters for authentication Y, service station QB is obtained from one's own side's key card
Public key PKQB2 and one's own side private key SKB, and DH key K2 is generated using the service station QB public key PKQB2 and one's own side's private key SKB,
The first message authentication code encrypted using the DH key K2 and the first certification message of encryption are sent to service station QB;
The service station QB obtains the first message authentication code of the encryption from passive side and the first certification message of encryption,
Passive side's public key PKB and one's own side private key SKQB2 are obtained from one's own side's key card, and utilize passive side's public key PKB and one's own side
Private key SKQB2 generates DH key K2, decrypts to obtain the first message authentication code using the DH key K2 and the first certification disappears
Breath trusts the first certification message after passing through to the first message authentication code verifying, obtained according to the first certification message
To the second certification message, passive side's public key PKB and one's own side private key SKQB3 are obtained from one's own side's key card, and utilization is described passive
Square public key PKB and one's own side's private key SKQB3 generates DH key K3, authenticates message encryption to described second using the DH key K3,
The second certification message of encryption is sent to passive side;
The passive side obtains the second certification message of the encryption from service station QB, obtains from one's own side's key card
Service station QB public key PKQB3 and one's own side private key SKB, and DH is generated using the service station QB public key PKQB3 and one's own side's private key SKB
Key K3, decrypts to obtain the second certification message using the DH key K3, sends the second certification message to masters;
The masters receive the second certification message from passive side, according to the second certification message and the first certification
Parameter X generates third and authenticates message, service station QA public key PKQA5 and one's own side private key SKA is obtained from one's own side's key card, and utilize
The service station QA public key PKQA5 and one's own side's private key SKA generates DH key K5, the third encrypted using the DH key K5
Message authentication code and the third of encryption certification message are sent to service station QA;
The service station QA receives the third message authentication code of the encryption from masters and the third of encryption authenticates message,
Masters public key PKA and one's own side private key SKQA5 are obtained from one's own side's key card, and utilize the masters public key PKA and one's own side
Private key SKQA5 generates DH key K5, decrypts to obtain third message authentication code using the DH key K5 and third authenticates message, right
Third message authentication code verifying trusts the third certification message after passing through, authenticate message according to the third and obtain the first certification
Parameter X and the second parameters for authentication Y, and to be signed using one's own side's private key to the first parameters for authentication X and the second parameters for authentication Y
Four signatures obtain the 4th certification message according to the 4th signature, masters public key PKA and one's own side are obtained from one's own side's key card
Private key SKQA6, and DH key K6 is generated using the masters public key PKA and one's own side's private key SKQA6, utilize the DH key K6
It encrypts the 4th certification message and is sent to masters;
The masters obtain the 4th certification message of the encryption from service station QA, are serviced from one's own side's key card
Stand QA public key PKQA6 and one's own side private key SKA, and generates DH key using the service station QA public key PKQA6 and one's own side's private key SKA
K6, decrypts to obtain the 4th certification message using the DH key K6, sends the 4th certification message to passive side;
The passive side obtains the 4th certification message from masters, carries out at encryption to the 4th certification message
Reason sends the 4th certification message of encryption to service station QB;
The service station QB receives the 4th certification message of the encryption from passive side, according to the 4th certification after decryption
Message obtains the 4th signature, and is sent to passive side to identity authentication result is obtained after the 4th signature progress sign test;
The passive side receives the identity authentication result from service station QB.
In the present embodiment, the DH key encipherment protection that the message transmitted when each side conversates is obtained by DH algorithm, due to
DH key can only be calculated by communicating pair, to improve the safety of the identifying procedure based on symmetric key algorithm.
In another embodiment, the masters and passive side are each configured with client key card, and the client is close
Service station public key pond and a pair of of client public and private key are stored in key card;The service station QA and service station QB are each configured with
Service station key card, be stored in the service station key card client public key pond, service station private key pond, service station public key pond,
Quantum communications service station public key pond and quantum communications service station private key.
Only stored respectively in the present embodiment, in the key card of masters and passive side a pair of of client public private key pair and its
The public key pond in corresponding quantum communications service station, it is right that this makes quantum communications service station only need to store its own public key pond institute
The client public key pond in the private key pond and this quantum communications service station answered, so that the key storage in quantum communications service station is not necessarily to picture
Pool of symmetric keys scheme equally stores multiple large capacity pool of symmetric keys of different clients, significantly reduces to quantum communications
Service station bring key storage pressure, reduces carrying cost.In another embodiment, the step of generating DH key Ki is wrapped
It includes:
If service station public key be PKQi, service station private key be SKQi, client public key PK, client private key SK, then
DH key Ki=PKQi^SK mod p is generated using the service station public key PKQi and client private key SK;Utilize client public affairs
Key PK and service station private key SKQi generates DH key Ki '=PK^SKQi mod p;
It can be obtained according to Diffie-Hellman agreement, PKQi^SK mod p=PK^SKQi mod p, i.e. Ki=Ki '.
In the present embodiment obtained by the symmetric key that DH algorithm obtains can only be calculated by communicating pair, in authentication authorization and accounting process
Data can only be decrypted by DH private key owner, all other men can not decrypt, therefore improve based on symmetric key algorithm
Identifying procedure safety.
In another embodiment, using DH key Ki to message Mi be calculated encryption the i-th message authentication code and
The message Mi of encryption, comprising:
It is split DH key Ki to obtain EKi and AKi using algorithm is split, i-th is calculated to message Mi using AKi
Message Mi and the i-th message authentication code MAC (Mi, AKi) is formed message Mi by message authentication code MAC (Mi, AKi) | | MAC (Mi,
AKi), EKi encryption message Mi is reused | | the message Mi of MAC (Mi, AKi) the i-th message authentication code encrypted and encryption, i.e.,
{Mi||MAC(Mi,AKi)}EKi。
In another embodiment, it decrypts to obtain the i-th message authentication code and message Mi using DH key Ki, disappear to described i-th
Breath authentication code verifying passes through rear trust messages Mi, comprising:
It is split DH key Ki to obtain EKi and AKi using algorithm is split, using EKi to the i-th message authentication of encryption
The message Mi of code and encryption, i.e. { Mi | | MAC (Mi, AKi) } EKi are decrypted to obtain Mi | | MAC (Mi, AKi) uses AKi pairs
The i-th message authentication code MAC (Mi, AKi) is calculated in message Mi, verifies the i-th message authentication code being calculated and decryption obtains
The i-th message authentication code it is whether identical, be then verified if they are the same and trust messages Mi;Otherwise authentication failed.
The DH key being calculated further is split in the present embodiment, and carries out message authentication using the parameter after splitting
Code calculates or encryption, increases the verifying link of message transmission, further promotes safety.In another embodiment, the clothes
Business station QB obtains the second certification message according to the first certification message, comprising:
Parsing obtains the first parameters for authentication X and the second parameters for authentication Y in the first certification message;
Obtain message M3_1 according to the first parameters for authentication X and the second parameters for authentication Y, generate true random number Rq, according to very with
Machine number Rq takes out QKD arranging key Kq from one's own side's quantum communications pool of keys, is calculated using QKD arranging key Kq message M3_1
The message M3_1 of the message authentication code encrypted and encryption;
The second certification message is obtained using the message M3_1 of true random number Rq, the message authentication code of encryption and encryption;
The service station QA authenticates message according to the third and obtains the first parameters for authentication X and the second parameters for authentication Y, wraps
It includes:
Parsing third certification message obtains the second certification message and the first parameters for authentication X;
The message M3_1 of true random number Rq, the message authentication code of encryption and encryption are obtained according to the second certification message, according to
True random number Rq takes out QKD arranging key Kq from one's own side's quantum communications pool of keys, is decrypted and is tested using QKD arranging key Kq
Message M3_1 is obtained after card, and is parsed message M3_1 and obtained the second parameters for authentication Y.
In the present embodiment, encrypted transmission message is carried out using QKD between service station QA and service station QB, so that message is transmitted
Safety greatly ensured.
The application scenarios of the application can be at one based on any two object under unsymmetrical key pond body system
A, B carries out mutual authentication.Each object has key card in the pool of keys system of the application, can store big data quantity
Key, also have processing information ability.In the application, all there is corresponding demand in the local system of object A and object B
Algorithm.
The description of key card is visible, and application No. is the patents of " 201610843210.6 ".When for mobile terminal, key card
Preferably key SD card;When for fixed terminal, key card is preferably key USBkey or host key board.
With application No. is compared with the patent of " 201610843210.6 ", key card to issue mechanism similar.This patent
The key card side of issuing be key card supervisor side, the generally administrative department of group, such as the pipe of certain enterprise or public institution
Reason department;The member's that the key card side of being awarded is managed by the supervisor side of key card, generally certain enterprise or public institution is each
Grade employee.Supervisor side's application that user terminal arrives key card first is opened an account.After user terminal carries out registering granted, it will obtain close
Key card (has unique key card ID).Key card stores client enrollment register information.Under same quantum communications service station
Public key pond in client key card is all downloaded from down the same Key Management server, and its each client key card for issuing
The public key pond of middle storage is completely the same.Preferably, the pool of keys size stored in key card can be 1G, 2G, 4G, 8G,
16G, 32G, 64G, 128G, 256G, 512G, 1024G, 2048G, 4096G etc..
Key card is developed from smart card techniques, is combined with real random number generator (preferably quantum random number
Generator), cryptological technique, the authentication of hardware security isolation technology and encryption and decryption product.The embedded chip of key card and
Operating system can provide the functions such as secure storage and the cryptographic algorithm of key.Due to it with independent data-handling capacity and
Good safety, key card become the safety barrier of private key and pool of keys.Each key card has the protection of hardware PIN code,
PIN code and hardware constitute two necessary factors that user uses key card.I.e. so-called " double factor authentication ", user is only simultaneously
The key card and user's PIN code for saving relevant authentication information are obtained, it just can be with login system.Even if the PIN code of user is let out
Dew, as long as the key card that user holds is not stolen, the identity of legitimate user would not be counterfeit;If the key card of user is lost
It loses, the person of picking up also cannot counterfeit the identity of legitimate user due to not knowing user's PIN code.
In the application, key card is divided into service station key card and client key card.As shown in figure 1, service station key card
Key zone be mainly stored with client public key pond, service station private key pond, service station public key pond, quantum communications service station public key pond and
Quantum communications service station private key;In Fig. 2, the key zone of client key card is mainly stored with service station public key pond and a pair of visitor
Family end public private key pair.The key card is issued by Key Management server.
Key Management server can select DH agreement before issuing key card and its algorithm parameter.Cipher key management services
Device generates respective numbers according to the quantity of client and meets the number of the algorithm specification as private key and public key.Cipher key management services
Device generates the ID of respective numbers, and chooses the public private key pair of respective numbers, and public key therein and ID is taken to be combined to obtain ID/ public affairs
Key is written to formation public key pond file, i.e., above-mentioned client public key pond in same file in the form of ID/ public key.Meanwhile key
Corresponding private key is also written to formation private key pond file, i.e. client private key in file by management server in an identical manner
Pond.The ID of each private key is identical as the ID of corresponding public key in client public key pond in client private key pond.Key Management server
The number for largely meeting the algorithm specification is generated again as private key and public key.Public and private key is respectively written by Key Management server
Service station public key pond and service station private key pond are formed in two files.Public key and service station private key pond in the public key pond of service station
The private key of middle same position is corresponding.The first key card issued is defined as service station key card by Key Management server, and will
The key zone of service station private key pond and client public key pond and related algorithm parameter write-in key card.After Key Management server
The continuous key card issued is client key card.Key Management server randomly selects a unappropriated ID and distributes to key
Card, and take the public and private key of identical ID that the close of key card is written with service station public key pond from client public key pond and client private key pond
Key area, relevant parameter are written in key card together.
Quantum communications service station management server is the cipher key authority in all quantum communications service stations, wherein including amount
Sub- communication key management server is responsible for issuing the private key in quantum communications service station public key pond and each quantum communications service station.?
A kind of algorithm for supporting signature can be selected to quantum communications Key Management server before quantum communications service station by issuing key.Amount
Sub- communication key management server generates respective numbers according to the quantity in quantum communications service station and meets the number of the algorithm specification
As private key and public key.Quantum communications Key Management server generates the ID of respective numbers, as the ID in quantum communications service station,
And the public private key pair of respective numbers is chosen, take public key therein and ID to be combined to obtain ID/ public key, in the form of ID/ public key
It is written to formation public key pond file, i.e., above-mentioned quantum communications service station public key pond in same file.Meanwhile quantum communications key pipe
Corresponding private key is also written to formation private key pond file, i.e. quantum communications service station in file by reason server in an identical manner
Private key pond.The ID of the ID of each private key and corresponding public key in the public key pond of quantum communications service station in the private key pond of quantum communications service station
It is identical.Quantum communications Key Management server randomly selects a unappropriated ID and distributes to some quantum communications service station, and
ID, quantum communications service station public key pond, the corresponding private key of the ID, relevant parameter are transferred to quantum communications using the mode of QKD
Service station.Quantum communications service station is joined by the ID received, quantum communications service station public key pond, the corresponding private key of the ID, correlation
The key zone of number write service station key card.
Random number described herein is true random number, preferably quantum random number.It should be noted that masters and by
It is dynamic square not as the limitation to client, but for the ease of distinguishing the different identity of the client in one-time identity authentication.
Each title in the case where not doing specified otherwise in the application is subject to letter and number and is combined, such as QB, clothes
QB, quantum communications service station QB hereinafter indicate same meaning, i.e. quantum communications service station QB at business station;For another example X, random number X,
First parameters for authentication X hereinafter indicates same meaning, i.e. random number X;For another example PKB, public key PKB, passive side's public key PKB is under
Same meaning, i.e. passive side's public key PKB are indicated in text;Remaining title is similarly.And the first parameters for authentication X, second parameters for authentication Y etc.
X, Y in statement are intended merely to facilitate differentiation and narration, do not have additional qualification, such as quantum communications service to parameter itself
Stand QB, QB, A in customer end A;For another example M3_0, Rq and K3 in information M3_0, true random number Rq and DH key K3;Other are same
Reason.
Embodiment 1
The scene of the present embodiment is as shown in figure 3, include customer end A (masters), customer end B (passive side), quantum communications
Service station QA and quantum communications service station QB (referred to as service station QA and service station QB).QA and QB is respectively provided with respective key
Management server.Customer end A and customer end B are equipped with client key card, quantum communications service station QA and quantum communications service
The QB that stands is furnished with service station key card.Customer end A belongs to quantum communications service station QA, and customer end B belongs to quantum communications service
Stand QB, i.e., the key card of A, B are issued by the Key Management server of QA, QB respectively.
According to Diffie-Hellman agreement, a Big prime p and a several g are defined, g is the primitive root of mould p, and g and p are
The parameter of Diffie-Hellman agreement.By taking customer end A and service station QA as an example, customer end A is generated according to matched key card
DH private key of the truly random big integer SKA as customer end A, it is power that DH public key PKA=g^SKA mod p, ^, which is obtained by calculation,
Oeprator.Service station QA generates truly random big integer SKQAi (i ∈ { 1,2 ... ..., m }) as clothes according to matched key card
The DH private key of business station QA, is obtained by calculation DH public key PKQAi=g^SKQAi mod p (i ∈ { 1,2 ... ..., m }).
According to Diffie-Hellman agreement, PKQAi^SKA mod p=PKA^SKQAi mod p.Therefore it can be by PKQAi^
SKA mod p and PKA^SKQAi mod p is as information exchange key.Hereinafter, the portion of mod p is omitted for ease of description
Point, PKQAi^SKA mod p is referred to using PKQAi^SKA, remaining is similarly.
The step of customer end A and customer end B authentication includes:
Step 1: customer end A initiates ID authentication request to customer end B.
Customer end A generates a random number X according to matched key card, i.e. the first parameters for authentication X, the ID with oneself is
IDA is sent to customer end B, i.e. M1=IDA together as M1 | | X.
Step 2: the solicited message of A is transmitted to QB requests verification by customer end B.
After the side B receives M1, a truly random Y, i.e. the second parameters for authentication Y, with oneself are generated according to matched key card
ID, that is, IDB and M1 form new information M2_0, i.e., the first certification message M2_0=M1 | | IDB | | Y.
B root generates a true random number R2 according to matched key card.B root is calculated according to R2 by key indicator function
Cipher key location pointer out takes out the public key PKQB2 of QB according to cipher key location pointer from the service station public key pond of one's own side's key zone,
The side B takes out own private key SKB simultaneously, obtains DH key K2, K2=PKQB2^SKB by special algorithm.
K2 is split into EK2 and AK2 by the side B, using AK2 to M2_0 be calculated first message authentication code MAC (M2_0,
AK2), wherein MAC (m, k) format is indicated using m as message, using k as the message authentication code of key.The side B by M2_0 and MAC (M2_0,
AK2) form message M2_0 | | MAC (M2_0, AK2) reuse EK2 encryption M2_0 | | MAC (M2_0, AK2) obtain M2_0 | | MAC
(M2_0,AK2)}EK2。
Key message is finally reassembled into information M2, i.e. M2=IDB by the side B | | R2 | | M2_0 | | MAC (M2_0, AK2) }
EK2, and information M2 is sent to service station QB.
Step 3: service station QB receives B information and processing forward returns B.
After service station QB receives the side B information M2, R2, IDB, { M2_0 | | MAC (M2_0, AK2) } inside M2 are extracted
EK2.Cipher key location pointer is calculated by key indicator function according to R2, service station QB is close from one's own side according to cipher key location pointer
The private key SKQB2 of QB is taken out in the service station private key pond in key area.Client of the service station QB according to IDB information in own key area
The public key PKB that the side B is taken out in public key pond, is calculated K2, i.e. K2=PKB^SKQB2 by special algorithm.
K2 is splitted into and is split EK2 and AK2 by service station QB, using obtain EK2 to { M2_0 | | MAC (M2_0, AK2) } EK2 into
Row decryption obtains M2_0, MAC (M2_0, AK2), reuses AK2 and is calculated message authentication code to M2_0, comparison MAC (M2_0,
AK2) verify whether it is identical, after being verified, propose M2_0 in X and Y, and by X, Y form information M3_0, i.e. M3_0=X | |
Y。
Service station QB signs M3_0 using private key SKQB to obtain SIGNB, i.e. SIGNB=SIGN (M3_0, SKQB).QB will
IDB, Y, SIGNB form information M3_1, i.e. M3_1=IDB | | Y | | SIGNB.
Between service station QA and QB, due to having built QKD key distribution network, in addition to in-time generatin QKD key
Outside function, two service stations also generate the QKD pool of symmetric keys for having caching, that is, are used for the quantum communications key of QA and QB secure communication
Pond.The QKD key that early stage generates periodically is replaced with the QKD key being newly generated by the quantum communications pool of keys.Service station QB is produced
A raw true random number Rq takes out the QKD arranging key Kq in itself quantum communications pool of keys according to Rq as cipher key index,
And Kq is split into EKq and AKq.Service station QB carries out M3_1 using obtained AKq message authentication code MAC (M3_ is calculated
1, AKq), and by M3_1 and MAC (M3_1, AKq) information M3_1 is formed | | MAC (M3_1, AKq), Ekq pairs recycled
M3_1 | | MAC (M3_1, AKq), which is encrypted, to be obtained M3_1 | | and MAC (M3_1, AKq) } EKq.Service station is again by key message weight
Form M3_2 and M3_3, i.e., the second certification message M3_2=IDQB | | IDQA | | Rq | | and M3_1 | | MAC (M3_1, AKq) } EKq,
And message M3_3=IDA | | IDB | | M3_2.
Service station QB generation one true random number R3, QB calculate cipher key location by key indicator function according to R3 and refer to
Needle, and private key SKQB3 in service station is obtained from the private key pond of service station according to cipher key location pointer, and from the client of QB key zone
The public key PKB that B is taken out in public key pond, is calculated K3, i.e. DH key K3=PKB^ by special algorithm in conjunction with own private key
SKQB3。
K3 is split into AK3 and EK3 by service station QB, using AK3 is obtained carries out that message authentication code MAC is calculated to M3_3
Message authentication and M3_3 recombination message are obtained M3_3 by (M3_3, AK3) | | MAC (M3_3, AK3), recycling obtain EK3 to M3_
3 | | MAC (M3_3, AK3), which is encrypted, to be obtained M3_3 | | and MAC (M3_3, AK3) } EK3.Key message is reassembled into message M3 by QB
It is sent to customer end B, i.e. M3=R3 | | and M3_3 | | MAC (M3_3, AK3) } EK3.
Step 4: customer end B receives QB information and processing forward returns A
The side B, which receives, is parsed to obtain R3, { M3_3 | | MAC (M3_3, AK3) } EK3 after the information M3 of service station QB.Root
Cipher key location pointer is calculated by key indicator function according to R3, B root is according to cipher key location pointer from the service of one's own side's key zone
It stands and takes out the public key PKQB3 of QB in public key pond, the side B takes out private key SKB, K3, i.e. K3=PKQB3 is calculated by special algorithm
^SKB。
K3 is split into EK3 and AK3 by the side B, and { M3_3 | | MAC (M3_3, AK3) } EK3 is decrypted using obtained EK3
It obtains M3_3, MAC (M3_3, AK3), AK3 is recycled be calculated message authentication code to M3_3, comparison MAC (M3_3,
AK3) verify whether identical, M3_3 and shuffling information parsed after being verified and obtains information M4, i.e. M4=IDB | | M3_2.The side B M4
It is sent to customer end A.
Step 5: customer end A receives the information of B and processing forward to QA
After the side A receives M4, according to the X of local cache, new information M5_0 is formed with oneself ID, that is, IDA and M4, i.e.,
Third authenticates message M5_0=M4 | | IDA | | X.
A root generates a true random number R5 according to matched key card.A root is calculated according to R5 by key indicator function
Cipher key location pointer out takes out the public key PKQA5 of QA according to cipher key location pointer from the service station public key pond of one's own side's key zone,
The side A takes out own private key SKA simultaneously, obtains DH key K5, i.e. K5=PKQA5^SKA by special algorithm.
K5 is split into EK5 and AK5 by the side A, using AK5 to M5_0 be calculated third message authentication code MAC (M5_0,
AK5).M5_0 and MAC (M5_0, AK5) is formed message M5_0 by the side A | | MAC (M5_0, AK5) reuses EK5 encryption M5_0 | |
MAC (M5_0, AK5) obtains { M5_0 | | MAC (M5_0, AK5) } EK5.
Key message is finally reassembled into information M5, i.e. M5=IDA by the side A | | R5 | | M5_0 | | MAC (M5_0, AK5) }
EK5, and information M5 is sent to service station QA.
Step 6:QA, which receives the information of A and handles, replys A.
After service station QA receives the side A information M5, R5, IDA, { M5_0 | | MAC (M5_0, AK5) } inside M5 are extracted
EK5.Cipher key location pointer is calculated by key indicator function according to R5, QA is according to cipher key location pointer from own key area
The private key SKQA5 of QA is taken out in the private key pond of service station.Service station QA according to IDA information own key area client public key pond
The middle public key PKA for taking out the side A, is calculated K5, i.e. K5=PKA^SKQA5 by special algorithm.
K5 is splitted into and is split EK5 and AK5 by service station QA, using obtain EK5 to { M5_0 | | MAC (M5_0, AK5) } EK5 into
Row decryption obtains M5_0, MAC (M5_0, AK5), reuses AK5 and is calculated message authentication code to M5_0, comparison MAC (M5_0,
AK5) verify whether it is identical, after being verified, extract M5_0 in M3_2=IDQB | | IDQA | | Rq | | M3_1 | | MAC (M3_
1, AKq) } EKq information and X.
Service station QA, as cipher key index, takes out the QKD arranging key Kq in itself quantum communications pool of keys according to Rq, and
Kq is split into EKq and AKq.Service station QA is decrypted { M3_1 | | MAC (M3_1, AKq) } Ekq using obtained EKq
To M3_1 | | MAC (M3_1, AKq) recycles AKq to carry out that message authentication code is calculated to M3_1, compares MAC (M3_1, AKq)
It verifies whether identical, the information of M3_1, i.e. IDB, Y, SIGNB is parsed after being verified.The public key pair of service station QA taking-up QB
SIGNB=SIGN (M3_0, SKQB) carries out verifying signature, carries out in next step after being verified.
Service station QA forms information M6_0, i.e. M6_0=X | | Y.QA signs M6_0 using own private key to obtain the 4th label
IDA, SIGNA are formed information M6_1, i.e. M6_1=IDA by name SIGNA=SIGN (M6_0, SKQA), QA | | SIGNA.
Service station QA be calculated message authentication code MAC (M6_1, AKq) to M6_1 using AKq, and by M6_1, MAC
(M6_1, AKq) form information M6_1 | | MAC (M6_1, AKq), the EKq recycled is to M6_1 | | MAC (M6_1, AKq) into
Row encryption obtains { M6_1 | | MAC (M6_1, AKq) } EKq.Key message is reassembled into M6_2 and M6_3, i.e., the 4th again by service station
Authenticate message M6_2=IDQA | | IDQB | | Rq | | { M6_1 | | MAC (M6_1, AKq) } EKq and message M6_3=IDA | | IDB
||M6_2。
Service station QA generation one true random number R6, QA calculate cipher key location by key indicator function according to R6 and refer to
Needle, and private key SKQA6 in service station is obtained from the private key pond of service station according to cipher key location pointer, and from the client of QA key zone
The public key PKA that A is taken out in public key pond, is calculated K6, i.e. DH key K6=PKA^ by special algorithm in conjunction with own private key
SKQA6。
K6 is split into AK6 and EK6 by service station QA, using AK6 is obtained carries out that message authentication code MAC is calculated to M6_3
Message authentication and M6_3 recombination message are obtained M6_3 by (M6_3, AK6) | | MAC (M6_3, AK6), recycling obtain EK6 to M6_
3 | | MAC (M6_3, AK6), which is encrypted, to be obtained M6_3 | | and MAC (M6_3, AK6) } EK6.Key message is reassembled into message M6 by QA
It is sent to customer end A, i.e. M6=R6 | | and M6_3 | | MAC (M6_3, AK6) } EK6.
Step 7:A receives the information of QA and processing forward to B
The side A, which receives, is parsed to obtain R6, { M6_3 | | MAC (M6_3, AK6) } EK6 after the information M6 of service station QA.Root
Cipher key location pointer is calculated by key indicator function according to R6, A root is according to cipher key location pointer from the service of one's own side's key zone
It stands and takes out the public key PKQA6 of QA in public key pond, the side A takes out private key SKA, K6, i.e. K6=PKQA6 is calculated by special algorithm
^SKA。
K6 is split into EK6 and AK6 by the side A, and { M6_3 | | MAC (M6_3, AK6) } EK6 is decrypted using obtained EK6
It obtains M6_3, MAC (M6_3, AK6), AK6 is recycled be calculated message authentication code to M6_3, comparison MAC (M6_3,
AK6) verify whether identical, M6_3 and shuffling information parsed after being verified and obtains information M7, i.e. M7=IDA | | M6_2.It the side B will
Information M7 is sent to customer end B.
Step 8: customer end B is sent to QB after receiving the information processing of the side A
After the side B receives the M7 that A is forwarded, takes oneself IDB information and M7 recombination generates M8_0 information, i.e. M8_0=
IDB||M7。
B root generates a true random number R8 according to matched key card.B root is calculated according to R8 by key indicator function
Cipher key location pointer out takes out the public key PKQB8 of QB according to cipher key location pointer from the service station public key pond of one's own side's key zone,
The side B takes out own private key SKB simultaneously, obtains K8, i.e. DH key K8=PKQB8^SKB by special algorithm.
K8 is split into EK8 and AK8 by the side B, and message authentication code MAC (M8_0, AK8) is calculated to M8_0 using AK8.B
M8_0, MAC (M8_0, AK8) is formed message M8_0 by side | | MAC (M8_0, AK8) reuses EK8 encryption M8_0 | | MAC (M8_
0, AK8) obtain M8_0 | | MAC (M8_0, AK8) } EK8.
Key message is finally reassembled into information M8, i.e. M8=IDB by the side B | | R8 | | M8_0 | | MAC (M8_0, AK8) }
EK8, and information M8 is sent to service station QB.
Step 9:QB, which receives the information that B is sent and handles, replys B result
After service station QB receives the side B information M8, R8, IDB, { M8_0 | | MAC (M8_0, AK8) } inside M8 are extracted
EK8.Cipher key location pointer is calculated by key indicator function according to R8, QB is according to cipher key location pointer from own key area
The private key SKQB8 of QB is taken out in the private key pond of service station.Service station QB according to IDB information own key area client public key pond
The middle public key PKB for taking out the side B, is calculated K8, i.e. K8=PKB^SKQB8 by special algorithm.
Service station QB by calculate by K8 split into split EK8 and AK8, using obtain EK8 to M8_0 | | MAC (M8_0,
AK8) } EK8 is decrypted to obtain M8_0, MAC (M8_0, AK8), reuses AK8 and message authentication code is calculated to M8_0, comparison
MAC (M8_0, AK8) verify whether it is identical, after being verified, extract M8_0 in M6_2=IDQA | | IDQB | | Rq | | M6_1 |
| MAC (M6_1, AKq) } EKq information.
Service station QB parses M6_2 information, is taken out in itself quantum communications pool of keys according to the random number R q in M6_2
QKD arranging key Kq, and Kq is split into EKq and AKq.Service station QB using obtained EKq to M6_1 | | MAC (M6_1,
AKq) } EKq is decrypted to obtain M6_1 | | MAC (M6_1, AKq) recycles AKq to carry out that message authentication is calculated to M6_1
Code, comparison MAC (M6_1, AKq) verifies whether identical, and the information of M6_1, i.e. IDA, SIGNA are parsed after being verified.
Service station QB takes out the public key PKQA of service station QA to SIGNA=from itself quantum communications service station public key pond
SIGN (M6_0, SKQA) carries out verifying signature.Service station QB recognizes the identity that sign test success or failure are generated after SIGNA sign test
Result information REP=OK/FAIL is demonstrate,proved, information REP, IDA, IDB are reassembled into information M9_0, i.e. M9_0=IDA | | IDB | | REP.
Service station QB generation one true random number R9, QB calculate cipher key location by key indicator function according to R9 and refer to
Needle, and private key SKQB9 in service station is obtained from the private key pond of service station according to cipher key location pointer, and from the client of QB key zone
The public key PKB that B is taken out in public key pond, is calculated K9, i.e. DH key K9=by special algorithm in conjunction with own private key SKQB9
PKB^SKQB9。
K9 is split into AK9 and EK9 by service station QB, using AK9 is obtained carries out that message authentication code MAC is calculated to M9_0
Message authentication and M9_0 recombination message are obtained M9_0 by (M9_0, AK9) | | MAC (M9_0, AK9), recycling obtain EK9 to M9_
0 | | MAC (M9_0, AK9), which is encrypted, to be obtained M9_0 | | and MAC (M9_0, AK9) } EK9.Key message is reassembled into message M9 by QB
It is sent to customer end B, i.e. M9=R9 | | and M9_0 | | MAC (M9_0, AK9) } EK9.
Step 10: customer end B receives the reply of service station QB and confirms certification
The side B, which receives, is parsed to obtain R9, { M9_0 | | MAC (M9_0, AK9) } EK9 after the information M9 of service station QB.Root
Cipher key location pointer is calculated by key indicator function according to R9, B root is according to cipher key location pointer from the service of one's own side's key zone
It stands and takes out the public key PKQB9 of QB in public key pond, the side B takes out one's own side's private key SKB, K9, i.e. K9=is calculated by special algorithm
PKQB9^SKB。
K9 is split into EK9 and AK9 by the side B, and { M9_0 | | MAC (M9_0, AK9) } EK9 is decrypted using obtained EK9
Obtain M9_0, M9_0 | | MAC (M9_0, AK9) recycles AK9 to carry out that message authentication code is calculated to M9_0, compares M9_0 | |
MAC (M9_0, AK9) verifies whether identical, and M9_0 is parsed after being verified and obtains IDA, IDB, REP, B root according to IDA, IDB,
REP information determines the identity and identity authentication result information of the side A and one's own side, i.e. authentication success or failure.
The present embodiment is can be considered for each step for aforementioned corresponding embodiment, also visual for all steps
For the combination of aforementioned corresponding embodiment.
In the application, the key card used is independent hardware isolated equipment.Public key, private key and other relevant parameters are deposited
A possibility that storing up the data safety area in key card, stealing key by Malware or malicious operation substantially reduces, will not
It is obtained and is cracked by quantum computer.It is non-since nothing is related to the transmitting of public and private key and algorithm parameter in classic network
The risk that symmetric key is cracked is very low, in addition, encrypted transmission message is carried out using QKD between service station and service station, so
The safety of message is greatly ensured.Key card has ensured communication security of the communicating pair in group, also greatly mentions
The high safety of authentication.Unsymmetrical key pond solves pool of symmetric keys and brings key to quantum communications service station simultaneously
Pressure is stored, carrying cost is reduced.For example, the pool of symmetric keys size of original users is 1G, user's number is N, then measures
Sub- communication service station needs to store the pool of keys of N G, and if storage unsymmetrical key pond, it is same that client stores pool of keys size
Sample is 1G, and quantum communications service station equally only needs to store the pool of keys of 1G size.
Meanwhile the application improves the identifying procedure based on symmetric key algorithm, so that the data in identifying procedure
It is safer, for example, random number and digital signature interactive between B and service station, the symmetric key encryption guarantor obtained by DH algorithm
Shield.Since the symmetric key that DH algorithm obtains can only calculate gained by communicating pair, the data in authentication authorization and accounting process can only be by DH
Private key owner decryption, all other men can not decrypt, therefore improve the peace of the identifying procedure based on symmetric key algorithm
Quan Xing.
In one embodiment, the application also provides a kind of computer equipment, the computer equipment can be active method, apparatus,
Passive method, apparatus, service station QA equipment or service station QB equipment.Computer equipment includes memory and processor, the memory
It is stored with computer program, the processor realizes the quantum communications service station authentication when executing the computer program
The step of method.
Specific restriction about computer equipment may refer to above to quantum communications service station identity identifying method
It limits, details are not described herein.Modules in above-mentioned computer equipment can be fully or partially through software, hardware and combinations thereof
To realize.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with soft
Part form is stored in the memory in computer equipment, executes the corresponding behaviour of the above modules in order to which processor calls
Make.
Computer equipment can be terminal, and internal structure may include the processor connected by system bus, storage
Device, network interface, display screen and input unit.Wherein, the processor of computer equipment is for providing calculating and control ability.Meter
The memory for calculating machine equipment includes non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operation system
System and computer program.The built-in storage provides for the operation of operating system and computer program in non-volatile memory medium
Environment.The network interface of computer equipment is used to communicate with external terminal by network connection.The computer program is processed
Device execute when with realize it is above-mentioned based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method.It calculates
The display screen of machine equipment can be liquid crystal display or electric ink display screen, and the input unit of computer equipment can be aobvious
The touch layer covered in display screen is also possible to the key being arranged on computer equipment shell, trace ball or Trackpad, can also be
External keyboard, Trackpad or mouse etc..
In another embodiment, provide it is a kind of based on unsymmetrical key pond to and DH agreement quantum communications service station body
Part Verification System, including masters, passive side, service station QA, service station QB and communication network;The masters and passive side
It is each configured with client key card, service station public key pond is stored in the client key card and a pair of of client is public, private
Key;The service station QA and service station QB is each configured with service station key card, is stored with client in the service station key card
Hold public key pond, service station private key pond, service station public key pond, quantum communications service station public key pond and quantum communications service station private key;
The masters, passive side, service station QA and service station QB realize that the quantum is logical by the communication network
The step of telecommunications services station identity identifying method.
About based on unsymmetrical key pond to and DH agreement quantum communications service station identity authorization system specific restriction
May refer to above for based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method limit
Fixed, details are not described herein.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality
It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not present
Contradiction all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (9)
1. based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, implement in masters,
It is characterized in that, the quantum communications service station identity identifying method, comprising:
It generates the first parameters for authentication X and is sent to passive side;The first parameters for authentication X is used to combine one's own side to generate for passive side
Second parameters for authentication Y obtains the first certification message, and the first certification message after passive side is forwarded to service station QB for supplying
Service station QB obtains the second certification message;
The second certification message from passive side is received, third is generated according to the second certification message and the first parameters for authentication X
Message is authenticated, service station QA public key PKQA5 and one's own side private key SKA are obtained from one's own side's key card, and utilize the service station QA
Public key PKQA5 and one's own side's private key SKA generate DH key K5, using the DH key K5 third message authentication code encrypted and
The third of encryption authenticates message;
The third message authentication code of encryption and the third certification message of encryption are sent to service station QA;The third message authentication code
For trusting the third certification message after being verified for service station QA, the third certification message for service station QA for obtaining
To the 4th certification message, the 4th certification message includes using one's own side's private key by service station QA to the first parameters for authentication X and the
The 4th signature that two parameters for authentication Y sign;
The 4th certification message for obtaining the encryption from service station QA, obtains service station QA public key PKQA6 from one's own side's key card
With one's own side private key SKA, and DH key K6 is generated using the service station QA public key PKQA6 and one's own side's private key SKA, utilizes the DH
Key K6 decrypts to obtain the 4th certification message;
The 4th certification message is sent to passive side;The 4th certification message is after passive side is forwarded to service station QB for clothes
Business station QB parses to obtain the 4th signature, the 4th signature for for obtaining identity authentication result after the QB sign test of service station,
The identity authentication result for passive side for being received and confirmed by.
2. based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, implement in passive side,
It is characterized in that, the quantum communications service station identity identifying method, comprising:
The first parameters for authentication X from masters is obtained, generates the second parameters for authentication Y in one's own side, and according to first certification
Parameter X and the second parameters for authentication Y obtain the first certification message, and service station QB public key PKQB2 and oneself are obtained from one's own side's key card
Square private key SKB, and DH key K2 is generated using the service station QB public key PKQB2 and one's own side's private key SKB, utilize the DH key
First certification message of the first message authentication code that K2 is encrypted and encryption;The first parameters for authentication X is generated by masters;
The first message authentication code of encryption and the first certification message of encryption are sent to service station QB;The first message authentication code
For trusting the first certification message after being verified for service station QB, the first certification message for service station QB for obtaining
To the second certification message;
The the second certification message for obtaining the encryption from service station QB, obtains service station QB public key from one's own side's key card
PKQB3 and one's own side private key SKB, and DH key K3 is generated using the service station QB public key PKQB3 and one's own side's private key SKB, it utilizes
The DH key K3 decrypts to obtain the second certification message;
The second certification message is sent to masters;The second certification message is used to combine the first parameters for authentication for masters
X generates third and authenticates message, and the third certification message is used to obtain the 4th certification message, the 4th certification for service station QA
Message includes the 4th label signed using one's own side's private key to the first parameters for authentication X and the second parameters for authentication Y by service station QA
Name;
The 4th certification message from masters is obtained, the 4th certification message is encrypted;
The 4th certification message of encryption is sent to service station QB;The 4th certification message for service station QB for parsing to obtain institute
The 4th signature is stated, the 4th signature is for for obtaining identity authentication result after the QB sign test of service station;
Receive the identity authentication result from service station QB.
3. based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, implement in service station QB,
It is characterized in that, the quantum communications service station identity identifying method, comprising:
Obtain the first message authentication code of the encryption from passive side and the first certification message of encryption;
Obtain passive side's public key PKB and one's own side private key SKQB2 from one's own side's key card, and using passive side's public key PKB and
One's own side's private key SKQB2 generates DH key K2, decrypts to obtain the first message authentication code and first using the DH key K2 and recognize
Message is demonstrate,proved, the first certification message is trusted after passing through to the first message authentication code verifying;
The second certification message is obtained according to the first certification message, passive side's public key PKB and oneself are obtained from one's own side's key card
Square private key SKQB3, and DH key K3 is generated using passive side's public key PKB and one's own side's private key SKQB3, utilize the DH key
K3 is to the second certification message encryption;
The second certification message of encryption is sent to passive side;The second certification message is after passive side is forwarded to masters
It combines the first parameters for authentication X to generate third for masters and authenticates message, the third certification message for service station QA for obtaining
4th certification message, the 4th certification message includes using one's own side's private key by service station QA to the first parameters for authentication X and second
The 4th signature that parameters for authentication Y signs;
The 4th certification message for receiving the encryption from passive side, obtains the described 4th according to the 4th certification message after decryption
Signature, and identity authentication result is obtained after carrying out sign test to the 4th signature;The 4th certification message is forwarded by masters
To passive side;
The identity authentication result is sent to passive side.
4. based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, implement in service station QA,
It is characterized in that, the quantum communications service station identity identifying method, comprising:
The third of the third message authentication code and encryption that receive the encryption from masters authenticates message;
Obtain masters public key PKA and one's own side private key SKQA5 from one's own side's key card, and using the masters public key PKA and
One's own side's private key SKQA5 generates DH key K5, decrypts to obtain third message authentication code using the DH key K5 and third certification disappears
Breath trusts the third certification message after passing through to third message authentication code verifying;
Message is authenticated according to the third and obtains the first parameters for authentication X and the second parameters for authentication Y, and using one's own side's private key to first
The 4th signature that parameters for authentication X and the second parameters for authentication Y sign obtains the 4th certification message according to the 4th signature,
Masters public key PKA and one's own side private key SKQA6 are obtained from one's own side's key card, and utilize the masters public key PKA and one's own side
Private key SKQA6 generates DH key K6, encrypts the 4th certification message using the DH key K6;
The 4th certification message of encryption is sent to masters;The 4th certification message is forwarded to passive side through masters, described
4th certification message parses to obtain the 4th signature, the 4th label for service station QB after passive side is forwarded to service station QB
For for obtaining identity authentication result after the QB sign test of service station, the identity authentication result is used to receive for passive side and true name
Recognize.
5. based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method, which is characterized in that it is described
Quantum communications service station identity identifying method, comprising:
The masters generate the first parameters for authentication X and are sent to passive side;
The passive side obtains the first parameters for authentication X from masters, generates the second parameters for authentication Y in one's own side, and according to institute
It states the first parameters for authentication X and the second parameters for authentication Y obtains the first certification message, service station QB public key is obtained from one's own side's key card
PKQB2 and one's own side private key SKB, and DH key K2 is generated using the service station QB public key PKQB2 and one's own side's private key SKB, it utilizes
The first message authentication code that the DH key K2 is encrypted and the first certification message of encryption are sent to service station QB;
The service station QB obtains the first message authentication code of the encryption from passive side and the first certification message of encryption, from oneself
Passive side's public key PKB and one's own side private key SKQB2 are obtained in square key card, and utilize passive side's public key PKB and one's own side's private key
SKQB2 generates DH key K2, decrypts to obtain the first message authentication code and the first certification message using the DH key K2, right
The first message authentication code verifying trusts the first certification message after passing through, obtain second according to the first certification message
Message is authenticated, passive side's public key PKB and one's own side private key SKQB3 are obtained from one's own side's key card, and utilize passive side's public key
PKB and one's own side's private key SKQB3 generate DH key K3, using the DH key K3 to the second certification message encryption, to passive
Side sends the second certification message of encryption;
The passive side obtains the second certification message of the encryption from service station QB, is serviced from one's own side's key card
Stand QB public key PKQB3 and one's own side private key SKB, and generates DH key using the service station QB public key PKQB3 and one's own side's private key SKB
K3, decrypts to obtain the second certification message using the DH key K3, sends the second certification message to masters;
The masters receive the second certification message from passive side, according to the second certification message and the first parameters for authentication
X generates third and authenticates message, service station QA public key PKQA5 and one's own side private key SKA is obtained from one's own side's key card, and described in utilization
Service station QA public key PKQA5 and one's own side's private key SKA generate DH key K5, the third message encrypted using the DH key K5
Authentication code and the third of encryption certification message are sent to service station QA;
The service station QA receives the third message authentication code of the encryption from masters and the third of encryption authenticates message, from oneself
Masters public key PKA and one's own side private key SKQA5 are obtained in square key card, and utilize the masters public key PKA and one's own side's private key
SKQA5 generates DH key K5, decrypts to obtain third message authentication code using the DH key K5 and third authenticates message, to third
Message authentication code verifying trusts the third certification message after passing through, authenticate message according to the third and obtain the first parameters for authentication
X and the second parameters for authentication Y, and the 4th label signed using one's own side's private key to the first parameters for authentication X and the second parameters for authentication Y
Name obtains the 4th certification message according to the 4th signature, masters public key PKA and one's own side's private key is obtained from one's own side's key card
SKQA6, and DH key K6 is generated using the masters public key PKA and one's own side's private key SKQA6, it is encrypted using the DH key K6
The 4th certification message is sent to masters;
The masters obtain the 4th certification message of the encryption from service station QA, and service station QA is obtained from one's own side's key card
Public key PKQA6 and one's own side private key SKA, and DH key K6 is generated using the service station QA public key PKQA6 and one's own side's private key SKA,
It decrypts to obtain the 4th certification message using the DH key K6, sends the 4th certification message to passive side;
The passive side obtains the 4th certification message from masters, and the 4th certification message is encrypted, to
Service station QB sends the 4th certification message of encryption;
The service station QB receives the 4th certification message of the encryption from passive side, according to the 4th certification message after decryption
The 4th signature is obtained, and is sent to passive side to identity authentication result is obtained after the 4th signature progress sign test;
The passive side receives the identity authentication result from service station QB.
6. as it is according to any one of claims 1 to 5 based on unsymmetrical key pond to and DH agreement quantum communications service station
Identity identifying method, which is characterized in that the masters and passive side are each configured with client key card, and the client is close
Service station public key pond and a pair of of client public and private key are stored in key card;The service station QA and service station QB are each configured with
Service station key card, be stored in the service station key card client public key pond, service station private key pond, service station public key pond,
Quantum communications service station public key pond and quantum communications service station private key.
7. as it is according to any one of claims 1 to 5 based on unsymmetrical key pond to and DH agreement quantum communications service station
Identity identifying method, which is characterized in that generate DH key Ki the step of include:
If service station public key is PKQi, service station private key is SKQi, and client public key PK, client private key SK are then utilized
The service station public key PKQi and client private key SK generates DH key Ki=PKQi^SK mod p;Utilize client public key PK
DH key Ki '=PK^SKQi mod p is generated with service station private key SKQi;
It can be obtained according to Diffie-Hellman agreement, PKQi^SK mod p=PK^SKQi mod p, i.e. Ki=Ki '.
8. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the processor realizes quantum communications service station body described in any one of Claims 1 to 4 when executing the computer program
The step of identity authentication method.
9. based on unsymmetrical key pond to and DH agreement quantum communications service station identity authorization system, which is characterized in that including
Masters, passive side, service station QA, service station QB and communication network;The masters and passive side are each configured with client
Key card is held, service station public key pond and a pair of of client public and private key are stored in the client key card;The service station QA
It is each configured with service station key card with service station QB, is stored with client public key pond, service station in the service station key card
Private key pond, service station public key pond, quantum communications service station public key pond and quantum communications service station private key;
The masters, passive side, service station QA and service station QB are realized described in claim 5 by the communication network
The step of quantum communications service station identity identifying method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910464740.3A CN110380859B (en) | 2019-05-30 | 2019-05-30 | Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910464740.3A CN110380859B (en) | 2019-05-30 | 2019-05-30 | Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110380859A true CN110380859A (en) | 2019-10-25 |
CN110380859B CN110380859B (en) | 2022-10-14 |
Family
ID=68248818
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910464740.3A Active CN110380859B (en) | 2019-05-30 | 2019-05-30 | Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110380859B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111416706A (en) * | 2020-03-03 | 2020-07-14 | 南京如般量子科技有限公司 | Quantum secret communication system based on secret sharing and communication method thereof |
CN113452687A (en) * | 2021-06-24 | 2021-09-28 | 中电信量子科技有限公司 | Method and system for encrypting sent mail based on quantum security key |
CN114978518A (en) * | 2021-02-20 | 2022-08-30 | 南京如般量子科技有限公司 | Quantum-computation-resistant digital signature method and system based on quantum communication service station |
CN115001723A (en) * | 2021-02-20 | 2022-09-02 | 南京如般量子科技有限公司 | Group communication method and system based on tree structure and asymmetric key pool |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
US20170338951A1 (en) * | 2016-05-19 | 2017-11-23 | Alibaba Group Holding Limited | Method and system for secure data transmission |
CN108173649A (en) * | 2018-01-10 | 2018-06-15 | 如般量子科技有限公司 | A kind of message authentication method and system based on quantum key card |
CN108599925A (en) * | 2018-03-20 | 2018-09-28 | 如般量子科技有限公司 | A kind of modified AKA identity authorization systems and method based on quantum communication network |
CN108768653A (en) * | 2018-03-01 | 2018-11-06 | 如般量子科技有限公司 | Identity authorization system based on quantum key card |
CN108809636A (en) * | 2018-04-26 | 2018-11-13 | 如般量子科技有限公司 | The communication system and communication means of message authentication between member are realized based on group's type quantum key card |
CN109450623A (en) * | 2018-10-16 | 2019-03-08 | 如般量子科技有限公司 | Anti- quantum calculation cryptographic key negotiation method based on unsymmetrical key pond |
CN109756500A (en) * | 2019-01-11 | 2019-05-14 | 如般量子科技有限公司 | Anti- quantum calculation https traffic method and system based on multiple unsymmetrical key ponds |
-
2019
- 2019-05-30 CN CN201910464740.3A patent/CN110380859B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170338951A1 (en) * | 2016-05-19 | 2017-11-23 | Alibaba Group Holding Limited | Method and system for secure data transmission |
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
CN108173649A (en) * | 2018-01-10 | 2018-06-15 | 如般量子科技有限公司 | A kind of message authentication method and system based on quantum key card |
CN108768653A (en) * | 2018-03-01 | 2018-11-06 | 如般量子科技有限公司 | Identity authorization system based on quantum key card |
CN108599925A (en) * | 2018-03-20 | 2018-09-28 | 如般量子科技有限公司 | A kind of modified AKA identity authorization systems and method based on quantum communication network |
CN108809636A (en) * | 2018-04-26 | 2018-11-13 | 如般量子科技有限公司 | The communication system and communication means of message authentication between member are realized based on group's type quantum key card |
CN109450623A (en) * | 2018-10-16 | 2019-03-08 | 如般量子科技有限公司 | Anti- quantum calculation cryptographic key negotiation method based on unsymmetrical key pond |
CN109756500A (en) * | 2019-01-11 | 2019-05-14 | 如般量子科技有限公司 | Anti- quantum calculation https traffic method and system based on multiple unsymmetrical key ponds |
Non-Patent Citations (2)
Title |
---|
M. THANGAPANDIYAN: ""Quantum Key Distribution and Cryptography Mechanisms for Cloud Data Security"", 《2018 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP)》 * |
陈立佳等: "基于量子的数据通信安全应用研究", 《财经界(学术版)》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111416706A (en) * | 2020-03-03 | 2020-07-14 | 南京如般量子科技有限公司 | Quantum secret communication system based on secret sharing and communication method thereof |
CN111416706B (en) * | 2020-03-03 | 2022-12-30 | 南京如般量子科技有限公司 | Quantum secret communication system based on secret sharing and communication method thereof |
CN114978518A (en) * | 2021-02-20 | 2022-08-30 | 南京如般量子科技有限公司 | Quantum-computation-resistant digital signature method and system based on quantum communication service station |
CN115001723A (en) * | 2021-02-20 | 2022-09-02 | 南京如般量子科技有限公司 | Group communication method and system based on tree structure and asymmetric key pool |
CN113452687A (en) * | 2021-06-24 | 2021-09-28 | 中电信量子科技有限公司 | Method and system for encrypting sent mail based on quantum security key |
Also Published As
Publication number | Publication date |
---|---|
CN110380859B (en) | 2022-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9760721B2 (en) | Secure transaction method from a non-secure terminal | |
CN110519046A (en) | Quantum communications service station cryptographic key negotiation method and system based on disposable asymmetric key pair and QKD | |
US9118661B1 (en) | Methods and apparatus for authenticating a user using multi-server one-time passcode verification | |
CN110380859A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system | |
US20160294553A1 (en) | Information delivery system | |
Rezaeighaleh et al. | New secure approach to backup cryptocurrency wallets | |
CN101815091A (en) | Cipher providing equipment, cipher authentication system and cipher authentication method | |
CN110417750A (en) | File based on block chain technology is read and method, terminal device and the storage medium of storage | |
CN109194523A (en) | The multi-party diagnostic model fusion method and system, cloud server of secret protection | |
CN110086626A (en) | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair | |
CN1921395B (en) | Method for improving security of network software | |
CN109728906A (en) | Anti- quantum calculation asymmet-ric encryption method and system based on unsymmetrical key pond | |
CN107171796A (en) | A kind of many KMC key recovery methods | |
CN110138548A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station cryptographic key negotiation method and system | |
CN110505055A (en) | Based on unsymmetrical key pond to and key card outer net access identity authentication method and system | |
CN109921905A (en) | Anti- quantum calculation cryptographic key negotiation method and system based on private key pond | |
CN109936456A (en) | Anti- quantum calculation digital signature method and system based on private key pond | |
CN108769029A (en) | It is a kind of to application system authentication device, method and system | |
CN110380845A (en) | Quantum secret communication alliance chain method of commerce based on group's pool of symmetric keys, system, equipment | |
CN109728905A (en) | Anti- quantum calculation MQV cryptographic key negotiation method and system based on unsymmetrical key pond | |
CN109905229A (en) | Anti- quantum calculation Elgamal encryption and decryption method and system based on group's unsymmetrical key pond | |
CN110176989A (en) | Quantum communications service station identity identifying method and system based on unsymmetrical key pond | |
CN110365472A (en) | Quantum communications service station digital signature method based on unsymmetrical key pond pair, system | |
CN110098925A (en) | Based on unsymmetrical key pond to and random number quantum communications service station cryptographic key negotiation method and system | |
CN110855667A (en) | Block chain encryption method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |