CN113472534A - Block chain data encryption method, equipment and storage medium - Google Patents
Block chain data encryption method, equipment and storage medium Download PDFInfo
- Publication number
- CN113472534A CN113472534A CN202110837980.0A CN202110837980A CN113472534A CN 113472534 A CN113472534 A CN 113472534A CN 202110837980 A CN202110837980 A CN 202110837980A CN 113472534 A CN113472534 A CN 113472534A
- Authority
- CN
- China
- Prior art keywords
- block chain
- quantum
- encrypting
- node
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a block chain data encryption method, equipment and a storage medium, and belongs to the technical field of block chain data encryption. The method comprises the following steps: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; wherein at least one node in the block chain is a quantum computer. The block chain data storage safety problem can be completely solved, and meanwhile, the throughput can be improved.
Description
Technical Field
The present invention relates to the field of block chain data encryption technologies, and in particular, to a block chain data encryption method, device, and storage medium.
Background
Existing cloud service providers may offer a basic cryptographic key scheme to protect cloud-based application development and services, or they may decide to give these protective measures to the cloud user. When a cloud service provider provides a scheme for supporting robust key management to develop, more work needs to be done to overcome the obstacle of adopting a key management technology; the protection key store must be protected just as well for other sensitive data. Protection is necessary in storage, transmission and backup. Improper key storage may compromise all encrypted data; access to the key store, which must be restricted to only certain entities that need a separate key, and associated policies to manage the key store, use role separation to facilitate access control: the entity using a given key cannot be the entity storing the key; finally, it is key backup and recovery, and losing keys undoubtedly means that the data protected by these keys is lost. Although this is an effective process of destroying data, accidental loss of keys protecting mission-critical data destroys a business, and so must implement secure backup and recovery solutions, which are security problems and solutions in cloud environments, there is no "fully secure" solution in the market today.
When data encryption, private key encryption and other conditions are involved in the block chain technology, the block chain technology is realized by adopting a technical means of combining symmetric encryption and asymmetric encryption, particularly, a Hash algorithm is used for solving the problem, which is one of core technologies for ensuring that block chain data cannot be tampered, but the Hash encryption algorithm has the great problems of low encryption and decryption speed and long time; in addition, due to the different choices of the consensus algorithm, if the POW algorithm is selected, the calculation power is high, and the consensus process takes long time, which finally results in that a block takes longer time to form, and particularly, when the uplink data is larger and the application occasion has a requirement on throughput, the problem is more prominent; this is also one of the factors limiting the spread of the block chain technology.
Disclosure of Invention
1. Technical problem to be solved by the invention
In order to overcome the technical problems, the invention provides a block chain data encryption method, a block chain data encryption device and a block chain data encryption storage medium, which can completely solve the problem of block chain data storage safety and can improve the throughput.
2. Technical scheme
In order to solve the problems, the technical scheme provided by the invention is as follows:
a method of blockchain data encryption, comprising: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; wherein at least one node in the block chain is a quantum computer.
Optionally, the block chain data is an API interface address.
Optionally, the block chain node further includes any one or more of a satellite, a 5G base station, a fog computing node, a cloud computing center node, and an edge computing node.
Optionally, the two or more parties participating in the blockchain data communication include: any one or more of a quantum computer, a satellite, a 5G base station, a fog computing node, a cloud computing center node, an edge computing node and a terminal.
Optionally, the API interface address is a gateway interface address.
Optionally, the API interface address is a fragmented network interface address.
Optionally, the block chain data is encrypted by using a quantum encryption protocol to generate a quantum key; further comprises the following steps: and encrypting the block chain data and the time stamp of the time service center by using a quantum encryption protocol to generate a quantum key.
Optionally, the broadcast relay in the block chain includes a satellite or a 5G base station.
Furthermore, the present invention provides an apparatus comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Accordingly, the present invention provides a storage medium storing a computer program which, when executed by a processor, implements a method as claimed in any one of the above.
3. Advantageous effects
Compared with the prior art, the technical scheme provided by the invention has the following beneficial effects:
when at least one node in the block chain is an optical quantum switch, namely a quantum computer is used as one of the nodes of the block chain, the ultra-low access loss of the quantum computer can be utilized to realize that the quantum computer is used as one of the nodes, and the block chain is formed by networking, wherein the networking mode can refer to the networking mode of the existing block chain system, and the block chain system applied by the Chinese invention patent with the application number of 202010392197.3 can also be adopted for networking; compared with the traditional encryption method, the block chain data is encrypted by using the quantum encryption protocol, and the method has the following advantages: 1. compared with Hash encryption, the encryption process is high in speed, and time spent on block chain data encryption is greatly reduced; 2. compared with the traditional algorithm such as RSA public key cryptography, the probability of being cracked is very low; 3. due to the characteristics of the quantum secret communication network, when the quantum key is distributed to two parties or multiple parties participating in the block chain data communication by using a quantum key distribution protocol, if an eavesdropper exists, the quantum state changes, so that the error rate of the quantum key received by the two parties or the multiple parties participating in the block chain data communication is improved, and the eavesdropping behavior of the eavesdropper is easy to detect, so that the safety of the encrypted block chain data can be improved; 4. because the quantum key is distributed between two parties or multiple parties participating in block chain data communication, if any party accidentally loses the key, the block chain data can be retrieved by other communication parties, and the condition of destroying one service cannot occur; 5. after the quantum computer is added into the block chain as a node, due to the super-strong computing power, the super-fast data transmission performance and the efficient time division multiplexing function, the defects of slow block data chaining, slow consensus, low throughput and the like can be overcome, and the application occasion and the range of the block chain are expanded; in the case of occasions with huge data volume, high safety requirement and high throughput requirement, such as live broadcasting and the like, no pressure is applied at all.
Drawings
FIG. 1 is a schematic diagram of an apparatus according to the present invention.
Fig. 2 is a flowchart of a block chain data encryption method according to an embodiment of the present invention.
Detailed Description
For a further understanding of the present invention, reference will now be made in detail to the embodiments illustrated in the drawings.
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. The terms first, second, and the like in the present invention are provided for convenience of describing the technical solution of the present invention, and have no specific limiting effect, but are all generic terms, and do not limit the technical solution of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings. The technical scheme of the embodiment of the application is that the Chinese patent application numbers are as follows: 202010551115.5, 202010392197.3 and 202010737059.4, the partial names and concepts are the same as, similar to or similar to those of the above patent application, and the meanings are the same.
Example 1
The present embodiment provides a method for encrypting blockchain data, as shown in fig. 2, including: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; wherein at least one node in the block chain is a quantum computer.
The quantum computer is an important component device of a quantum secret communication network, realizes physical switching of optical signal transmission links, completes optical fiber quantum channel link cross connection, and realizes networking and efficient time-sharing multiplexing functions of quantum key generation equipment. The optical quantum switch is one of quantum computers, has ultralow access loss, and ensures that the rate of key generation is not interfered; the switching speed is high, the system link establishment time is reduced, and the user experience is improved; high integration software, stiffness and structural design.
The block chain is composed of a plurality of nodes, at least one node in the block chain is an optical quantum switch, namely when a quantum computer is used as one of the nodes of the block chain, the quantum computer can be used as one of the nodes by utilizing the ultra-low access loss of the quantum computer, and the block chain is formed by networking; compared with the traditional encryption method, the block chain data is encrypted by using the quantum encryption protocol, and the method has the following advantages: 1. compared with Hash encryption, the encryption process is high in speed, and time spent on block chain data encryption is greatly reduced; 2. compared with the traditional algorithm such as RSA public key cryptography, the probability of being cracked is very low; 3. due to the characteristics of the quantum secret communication network, when the quantum key is distributed to two parties or multiple parties participating in the block chain data communication by using a quantum key distribution protocol, if an eavesdropper exists, the quantum state changes, so that the error rate of the quantum key received by the two parties or the multiple parties participating in the block chain data communication is improved, and the eavesdropping behavior of the eavesdropper is easy to detect, so that the safety of the encrypted block chain data can be improved; 4. because the quantum key is distributed between two parties or multiple parties participating in block chain data communication, if any party accidentally loses the key, the block chain data can be retrieved by other communication parties, and the condition of destroying one service cannot occur; 5. after the quantum computer is added into the block chain as a node, due to the super-strong computing power, the super-fast data transmission performance and the high-efficiency time division multiplexing function, the defects of slow block data chaining, slow consensus, low throughput and the like can be overcome, and the application occasion and the range of the block chain are expanded; in the case of large data volume, high safety requirement and high throughput requirement, no pressure is applied at all.
The blockchain data refers to various data transmitted, exchanged and stored in the blockchain, and includes but is not limited to blockchain account addresses, transactions, blocks, intelligent contracts and various messages; the blockchain data format is not limited and includes, but is not limited to, voice, text, picture, video, audio, and the like. The block chain data belongs to classical bit data in the existing network, and before the block chain data is encrypted by using a quantum encryption protocol, the classical bit data needs to be converted into quantum bit data so as to carry out quantum encryption, so that the block chain data is convenient to transmit in a quantum communication network; accordingly, after decryption, the qubit data needs to be converted into classical bit data in order to transmit the blockchain data content corresponding to the decrypted classical bit data in the existing network.
The quantum encryption protocol comprises: quantum key distribution protocol SARG04, Ekert91 protocol, MDI-QKD protocol, BB84 protocol, BBM92 protocol, measurement device independent quantum key distribution, or twin dual field quantum key distribution protocol (TF-QKD).
The quantum key distribution protocol SARG04 has a short transmission distance, has a very low influence on photon transmission due to environmental conditions such as noise, can encrypt a wireless channel, and is more adaptive to the IEEE802 standard protocol of the conventional network when passing through a conversion unit.
Three groups of basis vectors are used for measurement in the Ekert91 protocol, and two groups of non-orthogonal bases are used for measurement in the BBM92 protocol, so that the key generation efficiency is improved in comparison. In addition, unlike the Ekert91 protocol which uses the bell inequality to check for the presence of Eve eavesdropping, the BBM92 protocol uses a data post-processing method similar to the BB84 protocol to remove errors in the original key and information that may be revealed to Eve, resulting in a consistent security key string. The security of the BBM92 protocol is also independent of the entanglement source, since the operation of Eve on the entanglement source can be equivalently regarded as the interference on the channel caused by Eve in the entanglement source distribution process, and such a disturbance can be eliminated through the detection of error code discovery and the privacy amplification process. Furthermore, if the entanglement source and Alice's detector are put together to be the light source of Alice, then different measurements at different measurement basis vectors produce different BB84 states, and conversely any BB84 state can be produced by the above process. Thus, it appears to the outside that the light source is not different from Alice's single-photon source in the BB84 protocol. And the basis vector alignment process and the data post-processing process are the same as the BB84 protocol. Thus the BBM92 protocol is essentially equivalent to the BB84 protocol, and BBM92 can be considered an entangled version of the BB84 protocol.
As an optional implementation manner of this embodiment, the blockchain data is an API interface address. The API interface address is used as an interface address and exists between block chain subnets, between intelligent contracts, between a main network and a subnet, between side chains, between the main chain and the side chains and various storage spaces, between various virtual or physical devices and the like. When executing a transaction, there may be another program invoked through the API interface address, including but not limited to a smart contract, side chain, backbone, main network, subnet, etc. Especially, in some cases with high requirements on data confidentiality and large data volume, the possibility of uplink data leakage, monitoring and stealing can be prevented.
As an optional implementation manner of this embodiment, the block chain node further includes any one or any several of a satellite, a 5G base station, a fog computing node, a cloud computing center node, and an edge computing node. The satellite can be a black satellite, a quantum satellite and the like, the satellite is used as one of the nodes of the block chain, the satellite-ground integrated network is fused with the block chain, the block chain is formed by networking together, and the problems that the block chain and the existing network architecture cannot cover relatively far areas and data transmission is slow are solved.
The 5G base station is used as one of the nodes of the block chain, and the problem of too high loss in the quantum transmission process can be solved by utilizing the advantages of lossless transmission and high speed of a 5G transmission network.
The cloud computing center node and the edge computing nodes can play respective advantages, so that the coverage area of the block chain is large, the data storage capacity is large, and the throughput is high.
As an optional implementation manner of this embodiment, the two or more parties participating in the blockchain data communication include: any one or more of a quantum computer, a satellite, a 5G base station, a fog computing node, a cloud computing center node, an edge computing node and a terminal.
The terminal can be various devices such as a computer, a personal computer, a mobile phone, a PAD and the like, so that the application range and the application area are expanded, and the terminal is more popular.
As an optional implementation manner of this embodiment, the API interface address is a gateway interface address. Encrypting the gateway interface address by using a quantum encryption protocol to generate a quantum key, and distributing the quantum key to two parties or multiple parties accessing the gateway interface address by using a quantum key distribution protocol; the safety isolation of a main network and a side network, the safety isolation of a public chain and a private chain and the safety isolation between the main chain and the side chain as well as between the main chain and the parallel chain can be realized.
As an optional implementation manner of this embodiment, the API interface address is a fragmented network interface address. Encrypting the address of the fragmentation network interface by using a quantum encryption protocol to generate a quantum key, and distributing the quantum key to two parties or multiple parties accessing the address of the fragmentation network interface by using a quantum key distribution protocol; the safety isolation between the fragmentation networks of the ad hoc network and the safety isolation between the fragmentation networks and other networks can be realized.
As an optional implementation manner of this embodiment, the block chain data is encrypted by using a quantum encryption protocol to generate a quantum key; further comprises the following steps: and encrypting the block chain data and the time stamp of the time service center by using a quantum encryption protocol to generate a quantum key. And the uniqueness of the timestamp of the time service center is utilized to further improve the data security of the block chain.
As an optional implementation manner of this embodiment, the broadcast relay in the block chain includes a satellite or a 5G base station. The technical problem of large transmission loss of quantum communication is solved by utilizing the broadcasting capability and the transmission performance of a satellite or a 5G base station.
The method for encrypting blockchain data provided by any technical scheme in this embodiment can be applied to the networking described in the chinese patent application with application number 202010392197.3. In an embodiment, the blockchain encryption may be applied to a blockchain system in the chinese patent application with application number 202010392197.3, where a root chain layer in a three-layer network architecture is applied, and the blockchain data encryption is faster by using advantages of strong capacity expansion, large throughput, small delay, fast transmission speed, and the like.
Hardware, namely a quantum computer and the like, required in quantum computing is taken as one of nodes in the networking described in the Chinese patent application with the application number of 202010392197.3, the advantages of hardware conditions such as edge computing, fog computing and the like are carried, conditions of virtual network resources are utilized, unified architecture, unified interfaces and unified management can be adopted to the maximum extent with cloud computing, and all software and hardware resources are taken as unified resources to be managed, scheduled and purchased and sold. The requirement of large bandwidth, large connection and low time delay at the terminal side cannot be met by changing centralized cloud deployment. By combining the concept of edge computing, cloud computing is inevitably developed to the next technical stage, namely the capability of cloud computing is expanded to an edge side closer to a terminal, the sinking of cloud computing service is realized through the unified management and control of cloud edge ends, and end-to-end cloud service is provided; therefore, the networking policy described in the chinese patent application with application number 202010392197.3 provides a basis for the block chain data encryption method in any of the schemes in the embodiments of the present application.
Example 2
This embodiment provides a block chain data encryption device, the device includes: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform a method as described above.
Furthermore, the present embodiment provides a storage medium storing a computer program that, when executed by a processor, implements the method as described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 1, as another aspect, the present application also provides an apparatus including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to embodiments disclosed herein, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (10)
1. A method for encrypting blockchain data, comprising: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; at least one node in the block chain is a quantum computer.
2. A method for encrypting blockchain data according to claim 1, wherein: the block chain data is an API interface address.
3. A method for encrypting blockchain data according to claim 1, wherein: the block chain node further comprises any one or more of a satellite, a 5G base station, a fog computing node, a cloud computing center node and an edge computing node.
4. A method for encrypting blockchain data according to claim 1, wherein: the two or more parties participating in the blockchain data communication include: any one or more of a quantum computer, a satellite, a 5G base station, a fog computing node, a cloud computing center node, an edge computing node and a terminal.
5. A method for encrypting blockchain data according to claim 2, wherein: the API interface address is a gateway interface address.
6. A method for encrypting blockchain data according to claim 2, wherein: the API interface address is a fragment network interface address.
7. A method for encrypting blockchain data according to any one of claims 1 to 6, wherein: encrypting the block chain data by using a quantum encryption protocol to generate a quantum key; further comprises the following steps:
and encrypting the block chain data and the time stamp of the time service center by using a quantum encryption protocol to generate a quantum key.
8. A method for encrypting blockchain data according to claim 7, wherein: the broadcast relays in the blockchain include satellites or 5G base stations.
9. A blockchain data encryption device, the device comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-8.
10. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110837980.0A CN113472534A (en) | 2021-07-23 | 2021-07-23 | Block chain data encryption method, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110837980.0A CN113472534A (en) | 2021-07-23 | 2021-07-23 | Block chain data encryption method, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113472534A true CN113472534A (en) | 2021-10-01 |
Family
ID=77882195
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110837980.0A Pending CN113472534A (en) | 2021-07-23 | 2021-07-23 | Block chain data encryption method, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113472534A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114499857A (en) * | 2022-03-03 | 2022-05-13 | 矩阵时光数字科技有限公司 | Method for realizing data correctness and consistency in big data quantum encryption and decryption |
CN117113199A (en) * | 2023-10-23 | 2023-11-24 | 浙江星汉信息技术股份有限公司 | File security management system and method based on artificial intelligence |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3477527A1 (en) * | 2017-10-31 | 2019-05-01 | Twinpeek | Privacy management |
CN110086626A (en) * | 2019-04-22 | 2019-08-02 | 如般量子科技有限公司 | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair |
CN111339116A (en) * | 2020-02-29 | 2020-06-26 | 中央财经大学 | Block chain-based method for sharing open bank data |
CN111612466A (en) * | 2020-01-17 | 2020-09-01 | 厦门潭宏信息科技有限公司 | Consensus and resource transmission method, device and storage medium |
CN112822251A (en) * | 2020-12-31 | 2021-05-18 | 中电科新型智慧城市研究院有限公司 | City group perception system |
CN112822010A (en) * | 2021-01-28 | 2021-05-18 | 成都信息工程大学 | Removable storage medium management method based on quantum key and block chain |
CN113132094A (en) * | 2019-12-31 | 2021-07-16 | 科大国盾量子技术股份有限公司 | Decentralized digital authentication method and system |
-
2021
- 2021-07-23 CN CN202110837980.0A patent/CN113472534A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3477527A1 (en) * | 2017-10-31 | 2019-05-01 | Twinpeek | Privacy management |
CN110086626A (en) * | 2019-04-22 | 2019-08-02 | 如般量子科技有限公司 | Quantum secret communication alliance chain method of commerce and system based on unsymmetrical key pond pair |
CN113132094A (en) * | 2019-12-31 | 2021-07-16 | 科大国盾量子技术股份有限公司 | Decentralized digital authentication method and system |
CN111612466A (en) * | 2020-01-17 | 2020-09-01 | 厦门潭宏信息科技有限公司 | Consensus and resource transmission method, device and storage medium |
CN111339116A (en) * | 2020-02-29 | 2020-06-26 | 中央财经大学 | Block chain-based method for sharing open bank data |
CN112822251A (en) * | 2020-12-31 | 2021-05-18 | 中电科新型智慧城市研究院有限公司 | City group perception system |
CN112822010A (en) * | 2021-01-28 | 2021-05-18 | 成都信息工程大学 | Removable storage medium management method based on quantum key and block chain |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114499857A (en) * | 2022-03-03 | 2022-05-13 | 矩阵时光数字科技有限公司 | Method for realizing data correctness and consistency in big data quantum encryption and decryption |
CN114499857B (en) * | 2022-03-03 | 2023-09-01 | 矩阵时光数字科技有限公司 | Method for realizing data correctness and consistency in encryption and decryption of large data quanta |
CN117113199A (en) * | 2023-10-23 | 2023-11-24 | 浙江星汉信息技术股份有限公司 | File security management system and method based on artificial intelligence |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113596135B (en) | Block chain system, data processing method and equipment thereof and storage medium | |
Cao et al. | KaaS: Key as a service over quantum key distribution integrated optical networks | |
Sasaki et al. | Quantum photonic network: concept, basic tools, and future issues | |
WO2008143652A1 (en) | Distributed encryption authentication methods and systems | |
KR20090067221A (en) | Group-wise secret key generation | |
WO2008127318A2 (en) | Distributed encryption methods and systems | |
CN113472534A (en) | Block chain data encryption method, equipment and storage medium | |
CN102164125A (en) | System and method for safety communication based on ASGK A protocol | |
CN107666491B (en) | Data transmission method of air-ground integrated network based on symmetric encryption | |
EP2186252A2 (en) | Method for distributing cryptographic keys in a communication network | |
Savva et al. | Network coding-based routing and spectrum allocation in elastic optical networks for enhanced physical layer security | |
JP2023546427A (en) | Quantum cryptographic key distribution method and device | |
Mehic et al. | Modern trends in quantum key distribution networks | |
Zia-Ul-Mustafa et al. | Quantum key distribution for visible light communications: A review | |
Bhatt et al. | Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks | |
CN117375862A (en) | Message forwarding method, system, network device, storage medium and program product | |
Nosouhi et al. | Towards quantum‐secure software defined networks | |
Zhang et al. | Security-aware device-to-device communications underlaying cellular networks | |
CN114362939A (en) | Trusted relay quantum secret communication network-based dynamic routing forwarding method, storage device and intelligent terminal | |
Tayade et al. | Quantum based flexible secure authentication protocol (SAP) for device to device (D2D) communication | |
Divya et al. | A survery on platform of Secured Routing Algorithm | |
Ye et al. | Improving wireless security through network diversity | |
Peev | Why do I believe that quantum key distribution (QKD) is finally about to reach telecom markets and grow out of its present exotic standing? | |
Jain et al. | Quantum key distribution for data center security--a feasibility study | |
US20240283780A1 (en) | Method and apparatus for dynamic data encryption in a communication system with forward secrecy |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |