CN112019331B - Encryption and decryption method and system for quantum secret communication - Google Patents

Encryption and decryption method and system for quantum secret communication Download PDF

Info

Publication number
CN112019331B
CN112019331B CN202010800104.6A CN202010800104A CN112019331B CN 112019331 B CN112019331 B CN 112019331B CN 202010800104 A CN202010800104 A CN 202010800104A CN 112019331 B CN112019331 B CN 112019331B
Authority
CN
China
Prior art keywords
node
key
quantum
relay
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010800104.6A
Other languages
Chinese (zh)
Other versions
CN112019331A (en
Inventor
富尧
钟一民
王泽军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruban Quantum Technology Co Ltd
Nanjing Ruban Quantum Technology Co Ltd
Original Assignee
Ruban Quantum Technology Co Ltd
Nanjing Ruban Quantum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruban Quantum Technology Co Ltd, Nanjing Ruban Quantum Technology Co Ltd filed Critical Ruban Quantum Technology Co Ltd
Priority to CN202010800104.6A priority Critical patent/CN112019331B/en
Publication of CN112019331A publication Critical patent/CN112019331A/en
Application granted granted Critical
Publication of CN112019331B publication Critical patent/CN112019331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0855Quantum cryptography involving additional nodes, e.g. quantum relays, repeaters, intermediate nodes or remote nodes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides an encryption and decryption method and system for quantum secret communication, in the invention, a relay node directly connected with a target node is used as an odd node, an adjacent relay node of the relay node is used as an even node, and the like; when the starting node and the target node carry out data transmission, each odd node carries out exclusive OR on the quantum key between the node and the adjacent two nodes and then transmits the quantum key to the starting node, and each even node carries out exclusive OR on the quantum key between the node and the adjacent two nodes and then transmits the quantum key to the target node. The initial node uses the own key to exclusive-or with the received key to obtain the encryption key, and the target node uses the own key to exclusive-or with the received key data to obtain the decryption key. The invention does not transmit the specific relay key in the relay node, so that the requirement that the relay key needs to pass through all the relay nodes hop by hop does not exist, the credibility requirement of the relay node is reduced, and the safety of secret information transmission can be fully ensured.

Description

Encryption and decryption method and system for quantum secret communication
Technical Field
The invention relates to the field of quantum secret communication, in particular to an encryption and decryption method and system for quantum secret communication.
Background
The encryption and decryption of the existing quantum secret communication are mainly based on hop-by-hop transmission of a key based on a trusted relay, and the flow is shown in fig. 1, for example, an initial node needs to send data to a target node, the initial node firstly negotiates with an adjacent node (set as a first hop node) for quantum secret communication to obtain a quantum key K, and the initial node utilizes the quantum key K to encrypt data (generally, exclusive or operation) and then sends encrypted information to the target node through classical communication; the first hop node negotiates quantum secret communication with adjacent nodes (a second hop node, a third hop node, a fourth hop node …, an Nth hop node and a target node in turn) to obtain a quantum key K1, and then the first hop node encrypts the quantum key K by using the K1 and transmits the encrypted quantum key K to the second hop node through classical communication; the second hop node and the third hop node carry out quantum secret communication to negotiate a quantum key K2, so that the second hop node can encrypt the quantum key K by using the K2 and then transmit the encrypted quantum key K to the third node through classical communication; in this way, the quantum key K can ultimately be delivered to the destination node in an encrypted manner. It can be seen that such a key relay method requires that the quantum key K hop-by-hop through each intermediate node, and the security requirements for the intermediate nodes are high.
To overcome this drawback, in the prior art, patent 2017114705711 presents a quantum key relay method, and specifically discloses the following: as shown in fig. 2, a is a start node, B is a target node, C1C2C3, and the like are relay nodes. The starting nodes A and C1 negotiate the quantum secret key K1, C1 and C2 through the quantum secret communication mode, the quantum key K2, C2 and C3 through the quantum secret communication mode, the quantum key K3, C3 and the target node B through the quantum secret communication mode, the quantum key K4. When A needs to send data to a target node B, A firstly encrypts the data to be sent by using a quantum key K1 and then sends the encrypted data to the target node B through classical communication; and then the relay node C1 exclusive-or the quantum key K1 and the quantum key K2 and then transmits the exclusive-or to the target node B through a classical channel, the relay node C2 exclusive-or the quantum key K2 and the quantum key K3 and then transmits the exclusive-or of the quantum key K3 and the quantum key K4 to the target node B through the classical channel, and finally the target node B can decrypt the quantum key K1 by utilizing the information.
The technical scheme is equivalent to taking K1 as a relay key, then directly sending the relay key to a target node after the subsequent relay node exclusive-ors the negotiation key of the adjacent node, respectively solving the negotiation keys of all the relay nodes in the opposite direction of the target node, and finally reversely pushing out the relay key K1, wherein the relay key K1 used for encryption in the scheme is generated at the initial node A and the first relay node C1, and still has a certain leakage risk. In addition, in the scheme, the communication pressure at the target node B is high, and the target node needs to calculate the relay key K1 according to the received adjacent exclusive OR values of all the nodes, so that the calculation pressure is also high.
Disclosure of Invention
The invention aims to: in order to overcome the defects of the prior art, the invention provides an encryption and decryption method and system for quantum secret communication. The invention overcomes the inertia thinking of the prior art, and does not transmit the specific relay key in the relay nodes, so that the requirement that the relay key needs to pass through all the relay nodes hop by hop does not exist, and the credibility requirement of the relay nodes is reduced. In the invention, the key used for encrypting data by the starting node and the key used for decrypting by the target node are obtained by quantum key calculation of each relay node in the link, so that the security of secret information transmission can be fully ensured.
The invention comprises the following steps: in order to achieve the above objective, an aspect of the present invention provides an encryption and decryption method for quantum secret communication, including the steps of:
(1) A quantum channel is established between an initial node and a target node;
(2) Dividing each relay node between the initial node and the target node into an odd node and an even node: taking a relay node directly connected with the target node as an odd node, taking the adjacent relay node of the relay node as an even node, and analogizing the even node until all the relay nodes are divided;
(3) Configuring a quantum key of each relay node and adjacent nodes for each relay node;
(4) Before the starting node sends data T to the target node, each odd node exclusive-or transmits the quantum key between itself and two adjacent nodes to the starting node, and at the same time, each even node exclusive-or transmits the quantum key between itself and two adjacent nodes to the target node;
after receiving key data transmitted by all odd nodes, the initial node firstly uses the quantum key of the initial node to exclusive-or the data T to be transmitted, then exclusive-or the calculation result and all the received key data to obtain encrypted data, and finally the encrypted data is transmitted to the target node through classical communication;
after receiving the key data transmitted by all even nodes, the target node uses the quantum key of the target node to exclusive-or all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
The following provides several alternatives, but not as additional limitations to the above-described overall scheme, and only further additions or preferences, each of which may be individually combined for the above-described overall scheme, or may be combined among multiple alternatives, without technical or logical contradictions.
Optionally, in the step (3), the method for configuring the quantum key for each relay node includes:
storing a quantum key between each relay node and an adjacent node in advance; or alternatively, the first and second heat exchangers may be,
a quantum key negotiation method between adjacent nodes in a link is pre-configured, and each relay node negotiates a quantum key with the adjacent nodes according to the quantum key negotiation method when communicating with the adjacent nodes.
Optionally, the quantum key negotiation method is a quantum key negotiation method specified by the BB84 protocol.
Optionally, the quantum key negotiation method is a quantum key negotiation method specified by a decoy-state-based BB84 protocol.
On the other hand, the invention also provides an encryption and decryption system for quantum secret communication, which comprises a communication link consisting of an initial node, a target node and a plurality of relay nodes arranged between the initial node and the target node;
a quantum channel is established between the initial node and the target node;
in a communication link, quantum communication is carried out between adjacent nodes through a quantum key; all relay nodes fall into two categories: the system comprises an odd node and an even node, wherein a relay node directly connected with a target node is the odd node, an adjacent relay node of the relay node is the even node, and the like;
before the starting node sends data T to the target node, each odd node exclusive-or transmits the quantum key between itself and two adjacent nodes to the starting node, and at the same time, each even node exclusive-or transmits the quantum key between itself and two adjacent nodes to the target node;
after receiving key data transmitted by all odd nodes, the initial node firstly uses the quantum key of the initial node to exclusive-or the data T to be transmitted, then exclusive-or the calculation result and all the received key data to obtain encrypted data, and finally the encrypted data is transmitted to the target node through classical communication;
after receiving the key data transmitted by all even nodes, the target node uses the quantum key of the target node to exclusive-or all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
For the system, the invention also provides the following optional modes, and each optional mode can be independently combined for the overall scheme or can be combined among a plurality of optional modes without technical or logic contradiction.
Optionally, in the encryption and decryption system, the quantum key between the adjacent nodes is pre-stored in each node, or is obtained by key negotiation before each node communicates with the adjacent node.
Optionally, in the encryption and decryption system, the quantum key between adjacent nodes is obtained by negotiation based on the BB84 protocol.
Optionally, in the encryption and decryption system, the quantum key between the adjacent nodes is obtained by adopting a BB84 protocol negotiation based on a decoy state.
The beneficial effects are that:
1. the invention does not transmit the specific relay key in the relay node, so that the requirement that the relay key needs to pass through all the relay nodes hop by hop does not exist, and the credibility requirement of the relay node is reduced.
2. In the invention, the key used for encrypting data by the starting node and the key used for decrypting by the target node are obtained by quantum key calculation of each relay node in the link, so that the security of secret information transmission can be fully ensured.
3. In the invention, the initial node calculates the key data transmitted by the odd node, the target node calculates the key data transmitted by the even node, and the calculation amount can be distributed to the initial node and the target node.
Drawings
FIG. 1 is a schematic diagram of a key relay in the prior art;
FIG. 2 is a schematic flow diagram of another key relay in the prior art;
FIG. 3 is a block diagram of an encryption and decryption system for quantum secret communication according to embodiment 1;
FIG. 4 is a flowchart of an encryption and decryption method according to embodiment 2;
fig. 5 is a flowchart of an encryption and decryption method according to embodiment 3.
Detailed Description
The invention will be further described with reference to the drawings and the specific examples. It is to be understood that the invention may be embodied in various forms and that the exemplary and non-limiting embodiments shown in the drawings and described below are not intended to limit the invention to the specific embodiments described.
It is to be understood that the technical features listed above for the different embodiments may be combined with each other where technically feasible to form further embodiments within the scope of the invention. Furthermore, the particular examples and embodiments described herein are not limiting and corresponding modifications may be made to the structures, steps, and sequences set forth above without departing from the scope of the invention.
The invention aims to overcome the inertia thinking of the prior art and proposes a scheme which does not transmit a specific relay key in a relay node and can also realize quantum secret communication between an initial node and a target node.
In view of the above, the present invention provides an encryption and decryption method and system for quantum secret communication. The following detailed description will proceed with reference being made to the drawings and detailed description of embodiments.
Example 1:
the embodiment provides an encryption and decryption method for quantum secret communication, which is implemented in an encryption and decryption system for quantum secret communication shown in fig. 3, and in the system, the number of relay nodes is n.
The whole method comprises the following steps:
(1) A quantum channel is established between the originating node and the destination node.
(2) Dividing n relay nodes between a starting node and a target node into an odd node and an even node, wherein the dividing rule is as follows: taking a relay node directly connected with the target node as an odd node, taking the adjacent relay node of the relay node as an even node, and analogizing the even node until all the relay nodes are divided; as shown in fig. 3, among the n relay nodes, the relay node directly connected to the target node is numbered B1, then sequentially numbered in the direction of the start node, the next relay node connected to the relay node B1 is numbered B2, the next relay node connected to the relay node B2 is numbered B3 … …, the relay node directly connected to the start node is numbered Bn, and then B1, B3, B5 … … are odd nodes, and the rest are even nodes.
(3) Each relay node is configured with its quantum key with its neighboring nodes. The quantum keys between the adjacent nodes can be pre-stored in each node, or can be obtained by each node through real-time negotiation before communicating with the adjacent nodes according to a preset key negotiation method, and the negotiation method can comprise various methods, for example, the quantum keys between the adjacent nodes are obtained through negotiation based on BB84 protocol, or the quantum keys between the adjacent nodes are obtained through negotiation based on the decoy BB84 protocol.
It should be noted that, in the present invention, the configuration (negotiation) of the quantum key between the neighboring nodes is not limited, and all possible key generation methods should be included in the protection scope of the present invention.
(4) Before the starting node sends data T to the target node, each odd node exclusive-or transmits the quantum key between itself and two adjacent nodes to the starting node, and at the same time, each even node exclusive-or transmits the quantum key between itself and two adjacent nodes to the target node;
after receiving key data transmitted by all odd nodes, the initial node firstly uses the quantum key of the initial node to exclusive-or the data T to be transmitted, then exclusive-or the calculation result and all the received key data to obtain encrypted data, and finally the encrypted data is transmitted to the target node through classical communication;
after receiving the key data transmitted by all even nodes, the target node uses the quantum key of the target node to exclusive-or all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
In the present invention, the number of relay nodes is not limited, that is, n may be an odd number or an even number, and the case where n is an odd number or an even number will be described below with reference to embodiment 2 and embodiment 3, respectively.
Example 2:
the flow of this embodiment is shown in fig. 4, where the starting node is a, the target node is E, and there are 3 relay nodes, which are B, C, D respectively, in the whole communication link.
When A initiates a communication demand, a quantum communication link is firstly established between A and E, then a quantum key is negotiated between adjacent nodes in a quantum secret communication mode, the shared quantum key between A node and B node is K1, the shared quantum key between B and C is K2, the shared quantum key between C and D is K3, and the shared quantum key between D and E is K4. When the quantum communication link is established, the odd number and the even number of the intermediate nodes are identified, and the specific rules are as follows: starting from the target node, the relay nodes directly adjacent to the target node are odd nodes, and then the relay nodes are coded according to odd and even numbers in sequence, for example, D is the odd node, C is the even node and B is the odd node in fig. 4. After parity identification of each relay node, the odd node transmits two quantum keys negotiated with the adjacent nodes to the starting node after exclusive-or encryption, the starting node uses the quantum keys known per se to carry out exclusive-or encryption on data, then carries out exclusive-or operation on the data and the received quantum keys, and the starting node transmits the encrypted data to the target node through a classical channel after the exclusive-or encryption is completed. Similarly, the even relay nodes in the quantum communication link transfer two quantum keys negotiated by the even relay nodes and the adjacent nodes to the target node through classical channels after performing exclusive OR operation, and the target node can decrypt the encrypted information sent by the starting node by utilizing the quantum keys known by the even relay nodes and the quantum keys transferred by the even relay nodes. As shown in fig. 3, the quantum key of the initial node a is K1, the quantum key of the received odd node is K3 exclusive or K4 of the D node, and K1 exclusive or K2 of the B node, so the encryption key of the initial node is k1+ (k3+ (k4)) (k1+ (k2)); the quantum key of the target node E is K4, the quantum key of the received even node is K2 exclusive OR K3 of the C node, so the decryption key of the target node is K4 (K2 exclusive OR K3).
Example 3:
the flow of this embodiment is shown in fig. 5, where the starting node is a, the destination node is D, and there are 2 relay nodes, which are B, C respectively, in the whole communication link. According to the identification of the parity of the relay node, C is an odd node, B is an even node, the quantum key of the initial node A is K1, the quantum key of the received odd node is K2 exclusive OR K3 of the C node, so the encryption key of the initial node is K1 exclusive OR (K2, K3); the quantum key of the target node D is K3, the quantum key of the received even node is K1 exclusive OR K2 of the node B, so the decryption key of the target node is K3 (K1 4) U.K 2.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (8)

1. An encryption and decryption method for quantum secret communication is characterized by comprising the following steps:
(1) A quantum channel is established between an initial node and a target node;
(2) Dividing each relay node between the initial node and the target node into an odd node and an even node: taking a relay node directly connected with the target node as an odd node, taking the adjacent relay node of the relay node as an even node, and analogizing the even node until all the relay nodes are divided;
(3) Configuring a quantum key of each relay node and adjacent nodes for each relay node;
(4) Before the starting node sends data T to the target node, each odd node exclusive-or transmits the quantum key between itself and two adjacent nodes to the starting node, and at the same time, each even node exclusive-or transmits the quantum key between itself and two adjacent nodes to the target node;
after receiving key data transmitted by all odd nodes, the initial node firstly uses the quantum key of the initial node to exclusive-or the data T to be transmitted, then exclusive-or the calculation result and all the received key data to obtain encrypted data, and finally the encrypted data is transmitted to the target node through classical communication;
after receiving the key data transmitted by all even nodes, the target node uses the quantum key of the target node to exclusive-or all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
2. The encryption and decryption method for quantum secret communication according to claim 1, wherein in the step (3), the method for configuring the quantum key for each relay node is as follows:
storing a quantum key between each relay node and an adjacent node in advance; or alternatively, the first and second heat exchangers may be,
a quantum key negotiation method between adjacent nodes in a link is pre-configured, and each relay node negotiates a quantum key with the adjacent nodes according to the quantum key negotiation method when communicating with the adjacent nodes.
3. The encryption and decryption method for quantum secret communication according to claim 2, wherein the quantum key agreement method is a quantum key agreement method specified by BB84 protocol.
4. The encryption and decryption method for quantum secret communication according to claim 2, wherein the quantum key agreement method is a quantum key agreement method prescribed by a decoy-state-based BB84 protocol.
5. An encryption and decryption system for quantum secret communication comprises a communication link composed of an initial node, a target node and a plurality of relay nodes arranged between the initial node and the target node, and is characterized in that,
a quantum channel is established between the initial node and the target node;
in a communication link, quantum communication is carried out between adjacent nodes through a quantum key; all relay nodes fall into two categories: the system comprises an odd node and an even node, wherein a relay node directly connected with a target node is the odd node, an adjacent relay node of the relay node is the even node, and the like;
before the starting node sends data T to the target node, each odd node exclusive-or transmits the quantum key between itself and two adjacent nodes to the starting node, and at the same time, each even node exclusive-or transmits the quantum key between itself and two adjacent nodes to the target node;
after receiving key data transmitted by all odd nodes, the initial node firstly uses the quantum key of the initial node to exclusive-or the data T to be transmitted, then exclusive-or the calculation result and all the received key data to obtain encrypted data, and finally the encrypted data is transmitted to the target node through classical communication;
after receiving the key data transmitted by all even nodes, the target node uses the quantum key of the target node to exclusive-or all the received key data to obtain a decryption key, and uses the decryption key to decrypt the encrypted data from the initial node.
6. An encryption and decryption system according to claim 5, wherein the quantum key between adjacent nodes is stored in each node in advance or is obtained by key agreement before each node communicates with the adjacent node.
7. The encryption and decryption system according to claim 6, wherein the quantum key between the neighboring nodes is negotiated based on BB84 protocol.
8. The encryption and decryption system according to claim 6, wherein the quantum key between the neighboring nodes is obtained by negotiation using a decoy-based BB84 protocol.
CN202010800104.6A 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication Active CN112019331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010800104.6A CN112019331B (en) 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010800104.6A CN112019331B (en) 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication

Publications (2)

Publication Number Publication Date
CN112019331A CN112019331A (en) 2020-12-01
CN112019331B true CN112019331B (en) 2023-09-26

Family

ID=73504173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010800104.6A Active CN112019331B (en) 2020-08-11 2020-08-11 Encryption and decryption method and system for quantum secret communication

Country Status (1)

Country Link
CN (1) CN112019331B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114362936A (en) * 2020-12-30 2022-04-15 广东国腾量子科技有限公司 Secret key relay method in communication network based on quantum secrecy
CN113079008B (en) * 2021-04-26 2021-11-16 北京玻色量子科技有限公司 Data communication method, device and system
CN117579276B (en) * 2024-01-16 2024-03-29 浙江国盾量子电力科技有限公司 Quantum encryption method for feeder terminal and quantum board card module

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995511A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of mobile secret communication method based on quantum key distribution network
CN109995515A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of quantum key trunking method
CN110808837A (en) * 2019-11-21 2020-02-18 国网福建省电力有限公司 Quantum key distribution method and system based on tree-shaped QKD network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0801395D0 (en) * 2008-01-25 2008-03-05 Qinetiq Ltd Network having quantum key distribution
GB201020424D0 (en) * 2010-12-02 2011-01-19 Qinetiq Ltd Quantum key distribution

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109995511A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of mobile secret communication method based on quantum key distribution network
CN109995515A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of quantum key trunking method
CN110808837A (en) * 2019-11-21 2020-02-18 国网福建省电力有限公司 Quantum key distribution method and system based on tree-shaped QKD network

Also Published As

Publication number Publication date
CN112019331A (en) 2020-12-01

Similar Documents

Publication Publication Date Title
CN112019331B (en) Encryption and decryption method and system for quantum secret communication
CN110581763B (en) Quantum key service block chain network system
CN104104510B (en) For identification to the method for the manipulation of the sensing data of sensor and/or sensor
US11595196B2 (en) Quantum key distribution method and device, and storage medium
RU2421922C2 (en) METHOD AND DEVICE TO ESTABLISH SAFETY ASSOCIATIONS BETWEEN UNITS OF WIRELESS SELF-ORGANISING SINGLE-RANGE (ad-hoc) NETWORK
US8681982B2 (en) Method of establishing a quantum key for use between network nodes
US20100042841A1 (en) Updating and Distributing Encryption Keys
WO2021133204A1 (en) System for the secure transfer of data within a digital network
EP3987711B1 (en) Authenticated lattice-based key agreement or key encapsulation
CN1938980A (en) Method and apparatus for cryptographically processing data
CN113765664B (en) Block chain network secure communication method based on quantum key
JP2022519688A (en) End-to-end double ratchet encryption with epoch key exchange
CN108768632B (en) AKA identity authentication system and method based on symmetric key pool and relay communication
CN108964888B (en) Improved AKA identity authentication system and method based on symmetric key pool and relay communication
CN101127597A (en) Data transmission encryption method of MANET network
Oliveira et al. Dh-aes-p4: on-premise encryption and in-band key-exchange in p4 fully programmable data planes
CN114331423A (en) Digital currency exchange method and system based on quantum communication
CN114362928A (en) Quantum key distribution and reconstruction method for multi-node encryption
GB2604666A (en) Key exchange protocol chaining
CN114401085A (en) Network architecture of quantum secret communication network and key storage method
EP2047631B1 (en) Method for establishing a secret key between two nodes in a communication network
CN114285550A (en) Quantum security key service network, system and node device
CN112422286B (en) Quantum key distribution method based on trust center
CN114079877B (en) Group communication method and system based on hierarchical symmetric key pool
US20090147956A1 (en) Sharing a Secret Element

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant