CN114499864A - Quantum key scheduling method for cloud computing platform - Google Patents
Quantum key scheduling method for cloud computing platform Download PDFInfo
- Publication number
- CN114499864A CN114499864A CN202210401945.9A CN202210401945A CN114499864A CN 114499864 A CN114499864 A CN 114499864A CN 202210401945 A CN202210401945 A CN 202210401945A CN 114499864 A CN114499864 A CN 114499864A
- Authority
- CN
- China
- Prior art keywords
- key
- quantum
- application
- quantum key
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
A quantum key scheduling method facing a cloud computing platform comprises the step of establishing a running environment, wherein the running environment comprises a key pool KP, an application registration component AR, a key message processing component KM and a key distribution component KD. Compared with the prior art, the method solves the problem of matching the excessively low key generation rate of the quantum key distribution system under the condition of high key consumption of the security application of the cloud computing platform. By using the key pool, the continuous work of the quantum key distribution process is realized, and the problem of precious quantum key resource waste caused by non-timely use is solved. By using the hierarchical design of the security application, the problem that the low-level security application and the high-level security contend for the key when the quantum key is in short supply is solved. By using the Lyapunov optimization algorithm in the key distribution process, the quantum key is distributed fairly among the security applications at the same level, and the limited quantum key resources are guaranteed to be utilized to the maximum extent.
Description
Technical Field
The invention relates to the technical field of quantum communication and cloud computing, in particular to a quantum key scheduling method for a cloud computing platform.
Background
Quantum Key refers to a symmetric Key negotiated by a Quantum Key Distribution (QKD) technology, and the Quantum Key Distribution (QKD) technology is based on the principles of uncertainty, inseparability and unclonability in Quantum mechanics, and Key Distribution protocols such as BB84, B92 and EPR are used to ensure the Distribution safety of keys in a network.
However, in practical applications, the working efficiency of the quantum key distribution equipment is limited by the influence of many factors such as protocols, distances, temperatures, equipment processes and the like, which causes the problem of too low key rate, and according to public data, the whole-line key rate in the national quantum secret communication "jinghu main line" opened in 2017 is greater than 20 KPBs. In 2015, a subject group of Shanghai transportation university realizes 25km key rate of 1Mbps in an experimental environment, and then the maximum key generation rate in the actual link verification from Xujiahui school district to Fanhua school district in the Shanghai transportation university campus network in the second year is finally 20 KPBs.
Although in some implementations, for example, the centralized scheduling key relay scheme adopted by the CCSA ST7 working group can improve the key generation rate of the whole system to some extent, the system key generation rate is the sum of the key generation rates of the quantum key distribution links of the whole network without considering the classical network delay, taking a 10-node quantum key distribution network as an example, the key generation rate is only about 200KPBs by the link average key generation rate 20KPBs, if the key generation rate is further improved, only the redundant links can be further increased, however, because the QKD network deployment cost is higher, the increase of the links further increases the cost of the whole system, and the key generation rate of about 200KPBs is far from satisfying the key consumption for the cloud computing security class application with higher throughput requirement.
Another scheme is to establish a key pool, and the key pool avoids precious quantum key resource waste by caching the quantum key which is not consumed in time, so that the QKD network continuously negotiates the quantum key, and although the security risk caused by key storage is increased, the problem of low quantum key generation rate can be alleviated to a certain extent. However, this scheme has a problem in that it still faces the state of lack of quantum key supply as long as the key consumption speed of the system as a whole is higher than the key generation speed of the QKD network.
Therefore, how to ensure that the business requirements of the main security application of the cloud computing platform on the quantum key consumption are met as much as possible under the condition of limited quantum key resources is a main problem to be faced when the current quantum key distribution technology is applied to the cloud computing platform.
Disclosure of Invention
The invention provides a quantum key scheduling method facing a cloud computing platform aiming at the conflict between the excessively low key generation rate of the current quantum key distribution system and the high key consumption of the security application of the cloud computing platform, which comprises the following steps:
the technical scheme of the invention is realized as follows:
a quantum key scheduling method facing a cloud computing platform comprises the steps of establishing a running environment, wherein the running environment comprises:
the key pool KP is used for accumulating and storing the quantum keys distributed continuously and is divided into two storage areas, a key buffer area KPC and a key buffer area KPB;
the application registration component AR is used for registering the security application, and the registered security application has the authority to request to acquire the quantum key;
the key message processing component KM is used for managing quantum key acquisition requests sent from the security applications, extracting key construction responses from the key buffer KPB and sending the key construction responses to the security applications;
a key distribution component KD for quantum key scheduling from KPC to KPB, the key scheduling method comprising the steps of:
step 1, deploying a QKD network into an established operating environment, so that a cloud computing platform can acquire a negotiated quantum key from a QKD node in real time;
step 2, establishing a key pool buffer area KPC, and setting a storage upper limit S;
step 3, establishing a key pool buffer KPB, wherein an initial database is empty, and a corresponding List is independently established every time a security application is additionally registered;
step 4, deploying an application registration component AR, sending a registration application to the application registration component AR by using an application to the quantum key, setting a parameter quadruple which is an application identification identifier ID, a security level parameter L, a threshold parameter TH and a buffer capacity size W and can be represented as [ ID, L, TH, W ], and then establishing a List with the buffer capacity size W in a key pool buffer KPB for buffering the quantum key;
step 5, initializing data, and continuously storing quantum keys in a key pool cache region KPC;
step 6, deploying a key distribution component KD, updating the quantum key from the key pool buffer area KPC to the key pool buffer area KPB in the process of initializing the key distribution component KD, wherein the number of Lists corresponding to each application does not exceed a preset size W, and deleting the quantum key from the key pool buffer area KPC after each key is updated;
step 7, deploying a high-level request message queue KMQ and a low-level request message queue KMQ, wherein a quantum key request sent by an application with a high security level is sent to the high-level request message queue KMQH, and a quantum key request sent by an application with a low security level is sent to the low-level request message queue KMQL;
step 8, deploying request message processing KMP and starting two threads with different priorities;
and 9, collecting the execution data of the KMP by the key distribution component KD in the operation process, and establishing a Lyapunov model by combining the registration data in the application registration component AR to complete quantum key scheduling.
Preferably, in the step 2: and establishing a key cache region KPC by using the MySQL database, and caching the acquired quantum key into the MySQL database.
Preferably, the key buffer KPB is established in said step 3 using a Redis database.
Preferably, in step 8, the thread 1 has a higher priority and is configured to scan the high-level request message queue KMQH, the request managed in the queue includes an application identifier ID, a request time T, a request operation OP, and a request parameter P, which may be denoted as [ ID, T, OP, P ], perform a corresponding operation according to the request operation OP, detect the number of remaining keys in the key pool buffer KPB, if the number is lower than a threshold value TH, push an "key margin low" alarm message to the application, and the thread 2 has a lower priority and processes the low-level request message queue KMQL in the same manner as the thread 1.
Compared with the prior art, the invention has the following beneficial effects:
the quantum key scheduling method facing the cloud computing platform solves the problem of matching with the excessively low key generation rate of a quantum key distribution system under the condition of high key consumption of the security application of the cloud computing platform. By using the key pool, the continuous work of the quantum key distribution process is realized, and the problem of precious quantum key resource waste caused by non-timely use is solved. By using the hierarchical design of the security application, the problem that the low-level security application and the high-level security contend for the key when the quantum key is not supplied enough is solved. By using the Lyapunov optimization algorithm in the key distribution process, the quantum key is distributed fairly among the security applications at the same level, and the limited quantum key resources are guaranteed to be utilized to the maximum extent.
Drawings
FIG. 1 is a block diagram of the operating environment required for the quantum key scheduling method of the present invention;
FIG. 2 is a key pool structure diagram of the quantum key scheduling method for a cloud computing platform according to the present invention;
FIG. 3 is a flow chart of the present invention for establishing a Lyapunov model.
Detailed Description
The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown.
As shown in fig. 1 and fig. 2, a quantum key scheduling method for a cloud computing platform includes, as main components of an operating environment: a key pool KP, an application registration component AR, a key message processing component KM and a key distribution component KD. The key pool KP is used for accumulating and storing continuously distributed quantum keys and is divided into two storage areas, a key buffer area KPC and a key buffer area KPB. The application registration component AR is used for registering the security application, and the registered security application has the authority to request to acquire the quantum key. The key message processing component KM is configured to manage a quantum key acquisition request sent from a security class application, extract a key construction response from the KPB, and send the key construction response to each security application. The key distribution component KD is used for quantum key scheduling from KPC to KPB.
And a key cache region KPC under the key pool KP adopts a distributed database technology and is provided with a storage upper limit S, when the quantity of the stored quantum keys does not exceed the storage upper limit S, the quantum keys negotiated latest by the QKD network are continuously stored, and when the quantity of the stored quantum keys exceeds the storage upper limit S, the newly generated quantum keys cover the earliest generated quantum keys.
And a key pool key buffer area KPB under the key pool KP adopts a memory type database technology to respectively manage buffered keys for each registered application, the size of the buffer area corresponding to each application depends on the registration parameters of the application, and quantum key data in the KPB is derived from KPC.
The structure of the quantum key comprises two parts of key unique identification and key value.
The application registration component AR provides an application registration interface, the interface parameters at least include an application identification ID, a security level parameter L, a threshold parameter TH, and a buffer size W, and the security level parameter L at least includes two levels: and for the application of the low security level, when the stock of the quantum key is lower than the threshold value TH, the alarm information of low key stock is generated, and meanwhile, a new quantum key is not distributed for the application, but the key of the buffer area is reused until the quantum number of the key buffer area corresponding to the application exceeds the threshold value TH again.
The key message processing component KM comprises two components, namely a request message queue KMQ and a request message processing KMP, wherein the KMQ provides message queues with the same number as security level hierarchies, and at least comprises a high security level queue and a security level queue, messages in the queues comprise an application identification ID, a request time T, a request operation OP and a request parameter P, and the KMP executes a corresponding operation on a corresponding buffer area in the KPB and constructs a response to send the response to a corresponding security application for a request managed in the KMQ.
The request operation OP shall at least comprise: key acquisition operations and key destruction operations. The method comprises the steps that a request parameter P corresponding to key obtaining operation is a requested key quantity QC, the KMP extracts quantum keys in a corresponding quantity from a corresponding buffer area in the KPB and sends the quantum keys to corresponding security applications, the request parameter P corresponding to key destroying operation is a unique key identifier for destroying the keys, and the KMP deletes a specified quantum key from the buffer area corresponding to the applications in the KPB.
The key distribution component KD firstly preferentially guarantees the scheduling of quantum key requirements with high security level for the quantum key requirements of different applications at the same level; secondly, due to the fact that multiple security applications exist and the time and the number of quantum keys requested by the applications are not uniformly distributed, a Lyapunov optimization algorithm is adopted for modeling in the scheduling process from KPC to KPB of the quantum keys, data of scheduling bases are obtained from KM, and a quantum key scheduling strategy is dynamically generated by solving the minimum upper bound of a Lyapunov drift penalty function.
As shown in fig. 3, the embodiment of the present invention includes the following specific steps:
the invention discloses a quantum key scheduling method facing a cloud computing platform, which comprises the following specific implementation steps:
step 1, establishing an operating environment, and deploying a QKD network into a cloud computing platform, so that the cloud computing platform can acquire a negotiated quantum key from a QKD node in real time;
step 2, establishing a key pool cache region KPC, establishing the key pool cache region KPC by using a MySQL database, caching the obtained quantum key into the MySQL database, and setting a storage upper limit S, for example 100 ten thousand;
step 3, establishing a key pool buffer KPB, establishing the key pool buffer KPB by using a Redis database, wherein an initial database is empty, and a corresponding List is independently established every time a security application is additionally registered;
step 4, deploying an application registration component AR, sending a registration application to the application registration component AR by an application needing to use the quantum key in the cloud computing platform, setting a parameter quadruple which is an application identification identifier ID, a security level parameter L, a threshold value parameter TH and a buffer area capacity size W and can be represented as [ ID, L, TH, W ], and then establishing a List with the buffer area capacity size W in a key pool buffer area KPB for buffering the quantum key;
step 5, initializing data, and continuously storing quantum keys in a key pool cache region KPC;
step 6, deploying a key distribution component KD, updating the quantum key from the key pool buffer area KPC to the key pool buffer area KPB in the component initialization process, wherein the quantity of Lists corresponding to each application does not exceed a preset size W, and deleting the quantum key from the key pool buffer area KPC after each key is updated;
step 7, deploying a high-level request message queue KMQ and a low-level request message queue KMQ, wherein a quantum key request sent by an application with a high security level is sent to the high-level request message queue KMQH, and a quantum key request sent by an application with a low security level is sent to the low-level request message queue KMQL;
step 8, deploying a request message processing KMP and starting two threads, wherein the thread 1 has a higher priority and is used for scanning a high-level request message queue KMQH, acquiring a managed request in the queue, and the managed request comprises an application identification ID, a request time T, a request operation OP and a request parameter P, which can be represented as [ ID, T, OP, P ], executing corresponding operation according to the request operation OP, simultaneously detecting the number of residual keys in a key pool buffer KPB, and if the number is lower than a threshold value TH, pushing alarm information of 'key margin is low' to the application. Thread 2 has a lower priority, and processes the low-level request message queue KMQL in the same way as thread 1;
step 9, the key distribution component KD collects KMP execution data during the operation process, and establishes the Lyapunov model in combination with the registration data in the application registration component AR, the establishment method is as follows:
(1) constructing a time slot sequence t = {0, 1, 2. };
(2) setting ai (t), wherein i is more than or equal to 1 and less than or equal to n, the number of the request keys sent by the application in the time slot t is set as n, and the n is the number of the registered applications;
(3) setting Qi (t), wherein i is more than or equal to 1 and less than or equal to n, the number of the keys contained in the request cache of the application in the KMQ in the time slot t is set, and n is the number of the registered applications;
(4) setting Di (t), i is more than or equal to 1 and less than or equal to n, wherein the n is the number of KMP processing messages in the time slot t, and n is the number of registered applications;
(5) due to the limitation of the buffer size W of the key pool buffer KPB, di (t) needs to satisfy the condition: di (t) < Wi;
(6) the number of application request keys, the number of keys of queue cache requests and the number of keys of message processing responses satisfy the formula:
Q(t+1)=max[Q(t)-D(t),0]+A(t);
(7) the sufficient requirements for queue Q to reach steady state are:
(8) defining a vector phi (t) as a vector formed by the quantity of the cache request keys of each application queue:
(9) defining the Lyapunov function:
(10) then, a Lyapunov drift function is obtained:
(11) according to the formula of step (6), the following formula can be obtained: qn (t +1) is less than or equal to Qn (t) -Dn (t) + an (t), and after two sides of the unequal number are squared, derivation is carried out, so that an upper bound of a drift function can be obtained:
wherein both B and alpha are constants greater than 0, and since the derivation process is independent of patent content, the formula derivation process is omitted here,
(12) in order to construct the key scheduling strategy of KD, an objective function Yi (t) is designed, i is more than or equal to 1 and less than or equal to n, the number of keys for updating KD from a key pool buffer region KPC to a key pool buffer region KPB in a time slot t is marked as an optimal strategy,
(13) a drift-penalty function can be obtained and satisfies the inequality:
v is more than or equal to 0, is a balance adjusting parameter, is manually adjusted according to the actual environment,
(14) setting time slots to be 30s, then operating a key distribution component KD for a plurality of periods, uniformly supplementing quantum keys into each application buffer area of KPB, and recording ai (t), Qi (t) and Di (t) of each time slot;
(15) and when the margin of the applied buffer key is lower than a threshold value TH and the warning information of 'key margin low' is generated, KD increases the key distribution amount of the application and starts to calculate a drift-penalty function, when the calculation result meets an inequality, the quantum key distribution amount of the application is increased, and when the calculation result does not meet the inequality, the quantum key distribution amount of the application is reduced.
According to the structure and the specific process of the invention, the quantum key scheduling method facing the cloud computing platform solves the problem of matching with the excessively low key generation rate of a quantum key distribution system under the condition of high key consumption of the security application of the cloud computing platform. By using the key pool, the continuous work of the quantum key distribution process is realized, and the problem of precious quantum key resource waste caused by non-timely use is solved. By using the hierarchical design of the security application, the problem that the low-level security application and the high-level security contend for the key when the quantum key is not supplied enough is solved. By using the Lyapunov optimization algorithm in the key distribution process, the quantum key is distributed fairly among the security applications at the same level, and the limited quantum key resources are guaranteed to be utilized to the maximum extent.
Claims (4)
1. A quantum key scheduling method facing a cloud computing platform is characterized by comprising the steps of establishing an operating environment, wherein the operating environment comprises:
the key pool KP is used for accumulating and storing the quantum keys distributed continuously and is divided into two storage areas, a key buffer area KPC and a key buffer area KPB;
the application registration component AR is used for registering the security application, and the registered security application has the authority to request to acquire the quantum key;
the key message processing component KM is used for managing quantum key acquisition requests sent from the security applications, extracting key construction responses from the key buffer KPB and sending the key construction responses to the security applications;
a key distribution component KD for quantum key scheduling from KPC to KPB, the key scheduling method comprising the steps of:
step 1, deploying a QKD network into an established operating environment, so that a cloud computing platform can acquire a negotiated quantum key from a QKD node in real time;
step 2, establishing a key pool buffer area KPC, and setting a storage upper limit S;
step 3, establishing a key pool buffer KPB, wherein an initial database is empty, and a corresponding List is independently established every time a security application is additionally registered;
step 4, deploying an application registration component AR, sending a registration application to the application registration component AR by using an application to the quantum key, setting a parameter quadruple which is an application identification identifier ID, a security level parameter L, a threshold parameter TH and a buffer capacity size W and can be represented as [ ID, L, TH, W ], and then establishing a List with the buffer capacity size W in a key pool buffer KPB for buffering the quantum key;
step 5, initializing data, and continuously storing quantum keys in a key pool cache region KPC;
step 6, deploying a key distribution component KD, updating the quantum key from the key pool buffer area KPC to the key pool buffer area KPB in the process of initializing the key distribution component KD, wherein the number of Lists corresponding to each application does not exceed a preset size W, and deleting the quantum key from the key pool buffer area KPC after each key is updated;
step 7, deploying a high-level request message queue KMQ and a low-level request message queue KMQ, wherein a quantum key request sent by an application with a high security level is sent to the high-level request message queue KMQH, and a quantum key request sent by an application with a low security level is sent to the low-level request message queue KMQL;
step 8, deploying request message processing KMP and starting two threads with different priorities;
and 9, collecting the execution data of the KMP by the key distribution component KD in the operation process, and establishing a Lyapunov model by combining the registration data in the application registration component AR to complete quantum key scheduling.
2. The cloud computing platform-oriented quantum key scheduling method according to claim 1, wherein in the step 2: and establishing a key cache region KPC by using the MySQL database, and caching the acquired quantum key into the MySQL database.
3. The cloud computing platform-oriented quantum key scheduling method of claim 1, wherein in the step 3, a Redis database is used to establish a key buffer KPB.
4. The cloud computing platform-oriented quantum key scheduling method of claim 1, 2 or 3, wherein in step 8, thread 1 has a higher priority and is configured to scan the high-level request message queue KMQH, and the request managed in the queue includes an application identifier ID, a request time T, a request operation OP and a request parameter P, which may be denoted as [ ID, T, OP, P ], perform a corresponding operation according to the request operation OP, and simultaneously detect the number of keys remaining in the key pool buffer KPB, if the number is lower than a threshold value TH, push "key margin low" alarm information to the application, thread 2 has a lower priority, and process the low-level request message queue KMQL in the same manner as thread 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210401945.9A CN114499864B (en) | 2022-04-18 | 2022-04-18 | Quantum key scheduling method for cloud computing platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210401945.9A CN114499864B (en) | 2022-04-18 | 2022-04-18 | Quantum key scheduling method for cloud computing platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114499864A true CN114499864A (en) | 2022-05-13 |
CN114499864B CN114499864B (en) | 2022-07-12 |
Family
ID=81489441
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210401945.9A Active CN114499864B (en) | 2022-04-18 | 2022-04-18 | Quantum key scheduling method for cloud computing platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114499864B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115567204A (en) * | 2022-09-28 | 2023-01-03 | 江苏亨通问天量子信息研究院有限公司 | 5G module based on quantum key, communication system, communication method and application |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120071333A1 (en) * | 2010-07-26 | 2012-03-22 | Tampere University Of Technology | Uses of systems with degrees of freedom poised between fully quantum and fully classical states |
CN105357001A (en) * | 2015-12-10 | 2016-02-24 | 安徽问天量子科技股份有限公司 | Quantum secrete key dynamic distribution management method and system |
CN106850204A (en) * | 2017-02-27 | 2017-06-13 | 北京邮电大学 | Quantum key distribution method and system |
CN107086908A (en) * | 2016-02-15 | 2017-08-22 | 阿里巴巴集团控股有限公司 | A kind of quantum key delivering method and device |
CN109561047A (en) * | 2017-09-26 | 2019-04-02 | 安徽问天量子科技股份有限公司 | Encryption data storage system and method based on the storage of key strange land |
CN111711517A (en) * | 2020-07-23 | 2020-09-25 | 苏州大学 | Quantum key distribution protection method and system based on service security level |
CN112134695A (en) * | 2020-08-14 | 2020-12-25 | 江苏亨通问天量子信息研究院有限公司 | Cloud platform management method and system based on quantum key distribution technology |
CN112737776A (en) * | 2020-12-29 | 2021-04-30 | 中天通信技术有限公司 | Load balancing quantum key resource distribution method facing data center |
EP3955509A1 (en) * | 2020-08-14 | 2022-02-16 | Deutsche Telekom AG | Provision of quantum keys in a network |
CN114124384A (en) * | 2022-01-26 | 2022-03-01 | 浙江九州量子信息技术股份有限公司 | QKD network virtualization method and quantum key cloud platform |
-
2022
- 2022-04-18 CN CN202210401945.9A patent/CN114499864B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120071333A1 (en) * | 2010-07-26 | 2012-03-22 | Tampere University Of Technology | Uses of systems with degrees of freedom poised between fully quantum and fully classical states |
CN105357001A (en) * | 2015-12-10 | 2016-02-24 | 安徽问天量子科技股份有限公司 | Quantum secrete key dynamic distribution management method and system |
CN107086908A (en) * | 2016-02-15 | 2017-08-22 | 阿里巴巴集团控股有限公司 | A kind of quantum key delivering method and device |
CN106850204A (en) * | 2017-02-27 | 2017-06-13 | 北京邮电大学 | Quantum key distribution method and system |
CN109561047A (en) * | 2017-09-26 | 2019-04-02 | 安徽问天量子科技股份有限公司 | Encryption data storage system and method based on the storage of key strange land |
CN111711517A (en) * | 2020-07-23 | 2020-09-25 | 苏州大学 | Quantum key distribution protection method and system based on service security level |
WO2022016593A1 (en) * | 2020-07-23 | 2022-01-27 | 苏州大学 | Quantum key distribution protection method and system based on service security level |
CN112134695A (en) * | 2020-08-14 | 2020-12-25 | 江苏亨通问天量子信息研究院有限公司 | Cloud platform management method and system based on quantum key distribution technology |
EP3955509A1 (en) * | 2020-08-14 | 2022-02-16 | Deutsche Telekom AG | Provision of quantum keys in a network |
CN112737776A (en) * | 2020-12-29 | 2021-04-30 | 中天通信技术有限公司 | Load balancing quantum key resource distribution method facing data center |
CN114124384A (en) * | 2022-01-26 | 2022-03-01 | 浙江九州量子信息技术股份有限公司 | QKD network virtualization method and quantum key cloud platform |
Non-Patent Citations (1)
Title |
---|
李晓星等: "保障内容安全的量子密钥应用综述", 《计算机工程》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115567204A (en) * | 2022-09-28 | 2023-01-03 | 江苏亨通问天量子信息研究院有限公司 | 5G module based on quantum key, communication system, communication method and application |
Also Published As
Publication number | Publication date |
---|---|
CN114499864B (en) | 2022-07-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
der Boor et al. | Scalable load balancing in networked systems: A survey of recent advances | |
Cui et al. | A blockchain-based containerized edge computing platform for the internet of vehicles | |
CN109166037B (en) | Consensus method of block chains | |
Gunawan et al. | A mathematical model and metaheuristics for time dependent orienteering problem | |
CN114499864B (en) | Quantum key scheduling method for cloud computing platform | |
CN112769550B (en) | Load balancing quantum key resource distribution system facing data center | |
CN103366022B (en) | Information handling system and disposal route thereof | |
CN112737776B (en) | Data center-oriented quantum key resource allocation method for load balancing | |
CN105827678B (en) | Communication means and node under a kind of framework based on High Availabitity | |
Zhu et al. | A reactive method for real time dynamic vehicle routing problem | |
Safa'a et al. | iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing | |
CN111431955A (en) | Streaming data processing system and method | |
CN114499842A (en) | QKD network key resource pre-allocation method based on reinforcement learning | |
Fu et al. | Energy-efficient job-assignment policy with asymptotically guaranteed performance deviation | |
JP7432087B2 (en) | Data structures containing energy schedules and methods for providing data structures containing energy schedules | |
CN114548893A (en) | Multi-airport collaborative release method based on deep reinforcement learning | |
WO2024146193A1 (en) | Sdn-based routing path selection method and apparatus, and storage medium | |
CN109286573A (en) | Peak clipping system based on distributed token bucket | |
CN113032146A (en) | Robust service supply method for multi-access edge computing environment | |
Zaman et al. | Evolutionary algorithm for project scheduling under irregular resource changes | |
CN103023820A (en) | Admission control method available for fragmented reservation | |
CN115562812A (en) | Distributed virtual machine scheduling method, device and system for machine learning training | |
Hasan et al. | Internet of things task scheduling in cloud environment using particle swarm optimization | |
CN111147575B (en) | Data storage system based on block chain | |
Zhang et al. | Joint optimization of the partition and scheduling of dnn tasks in computing and network convergence |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |