CN114499864A - Quantum key scheduling method for cloud computing platform - Google Patents

Quantum key scheduling method for cloud computing platform Download PDF

Info

Publication number
CN114499864A
CN114499864A CN202210401945.9A CN202210401945A CN114499864A CN 114499864 A CN114499864 A CN 114499864A CN 202210401945 A CN202210401945 A CN 202210401945A CN 114499864 A CN114499864 A CN 114499864A
Authority
CN
China
Prior art keywords
key
quantum
application
quantum key
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210401945.9A
Other languages
Chinese (zh)
Other versions
CN114499864B (en
Inventor
董智超
郑韶辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Quantum Technologies Co ltd
Original Assignee
Zhejiang Quantum Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Quantum Technologies Co ltd filed Critical Zhejiang Quantum Technologies Co ltd
Priority to CN202210401945.9A priority Critical patent/CN114499864B/en
Publication of CN114499864A publication Critical patent/CN114499864A/en
Application granted granted Critical
Publication of CN114499864B publication Critical patent/CN114499864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A quantum key scheduling method facing a cloud computing platform comprises the step of establishing a running environment, wherein the running environment comprises a key pool KP, an application registration component AR, a key message processing component KM and a key distribution component KD. Compared with the prior art, the method solves the problem of matching the excessively low key generation rate of the quantum key distribution system under the condition of high key consumption of the security application of the cloud computing platform. By using the key pool, the continuous work of the quantum key distribution process is realized, and the problem of precious quantum key resource waste caused by non-timely use is solved. By using the hierarchical design of the security application, the problem that the low-level security application and the high-level security contend for the key when the quantum key is in short supply is solved. By using the Lyapunov optimization algorithm in the key distribution process, the quantum key is distributed fairly among the security applications at the same level, and the limited quantum key resources are guaranteed to be utilized to the maximum extent.

Description

Quantum key scheduling method for cloud computing platform
Technical Field
The invention relates to the technical field of quantum communication and cloud computing, in particular to a quantum key scheduling method for a cloud computing platform.
Background
Quantum Key refers to a symmetric Key negotiated by a Quantum Key Distribution (QKD) technology, and the Quantum Key Distribution (QKD) technology is based on the principles of uncertainty, inseparability and unclonability in Quantum mechanics, and Key Distribution protocols such as BB84, B92 and EPR are used to ensure the Distribution safety of keys in a network.
However, in practical applications, the working efficiency of the quantum key distribution equipment is limited by the influence of many factors such as protocols, distances, temperatures, equipment processes and the like, which causes the problem of too low key rate, and according to public data, the whole-line key rate in the national quantum secret communication "jinghu main line" opened in 2017 is greater than 20 KPBs. In 2015, a subject group of Shanghai transportation university realizes 25km key rate of 1Mbps in an experimental environment, and then the maximum key generation rate in the actual link verification from Xujiahui school district to Fanhua school district in the Shanghai transportation university campus network in the second year is finally 20 KPBs.
Although in some implementations, for example, the centralized scheduling key relay scheme adopted by the CCSA ST7 working group can improve the key generation rate of the whole system to some extent, the system key generation rate is the sum of the key generation rates of the quantum key distribution links of the whole network without considering the classical network delay, taking a 10-node quantum key distribution network as an example, the key generation rate is only about 200KPBs by the link average key generation rate 20KPBs, if the key generation rate is further improved, only the redundant links can be further increased, however, because the QKD network deployment cost is higher, the increase of the links further increases the cost of the whole system, and the key generation rate of about 200KPBs is far from satisfying the key consumption for the cloud computing security class application with higher throughput requirement.
Another scheme is to establish a key pool, and the key pool avoids precious quantum key resource waste by caching the quantum key which is not consumed in time, so that the QKD network continuously negotiates the quantum key, and although the security risk caused by key storage is increased, the problem of low quantum key generation rate can be alleviated to a certain extent. However, this scheme has a problem in that it still faces the state of lack of quantum key supply as long as the key consumption speed of the system as a whole is higher than the key generation speed of the QKD network.
Therefore, how to ensure that the business requirements of the main security application of the cloud computing platform on the quantum key consumption are met as much as possible under the condition of limited quantum key resources is a main problem to be faced when the current quantum key distribution technology is applied to the cloud computing platform.
Disclosure of Invention
The invention provides a quantum key scheduling method facing a cloud computing platform aiming at the conflict between the excessively low key generation rate of the current quantum key distribution system and the high key consumption of the security application of the cloud computing platform, which comprises the following steps:
the technical scheme of the invention is realized as follows:
a quantum key scheduling method facing a cloud computing platform comprises the steps of establishing a running environment, wherein the running environment comprises:
the key pool KP is used for accumulating and storing the quantum keys distributed continuously and is divided into two storage areas, a key buffer area KPC and a key buffer area KPB;
the application registration component AR is used for registering the security application, and the registered security application has the authority to request to acquire the quantum key;
the key message processing component KM is used for managing quantum key acquisition requests sent from the security applications, extracting key construction responses from the key buffer KPB and sending the key construction responses to the security applications;
a key distribution component KD for quantum key scheduling from KPC to KPB, the key scheduling method comprising the steps of:
step 1, deploying a QKD network into an established operating environment, so that a cloud computing platform can acquire a negotiated quantum key from a QKD node in real time;
step 2, establishing a key pool buffer area KPC, and setting a storage upper limit S;
step 3, establishing a key pool buffer KPB, wherein an initial database is empty, and a corresponding List is independently established every time a security application is additionally registered;
step 4, deploying an application registration component AR, sending a registration application to the application registration component AR by using an application to the quantum key, setting a parameter quadruple which is an application identification identifier ID, a security level parameter L, a threshold parameter TH and a buffer capacity size W and can be represented as [ ID, L, TH, W ], and then establishing a List with the buffer capacity size W in a key pool buffer KPB for buffering the quantum key;
step 5, initializing data, and continuously storing quantum keys in a key pool cache region KPC;
step 6, deploying a key distribution component KD, updating the quantum key from the key pool buffer area KPC to the key pool buffer area KPB in the process of initializing the key distribution component KD, wherein the number of Lists corresponding to each application does not exceed a preset size W, and deleting the quantum key from the key pool buffer area KPC after each key is updated;
step 7, deploying a high-level request message queue KMQ and a low-level request message queue KMQ, wherein a quantum key request sent by an application with a high security level is sent to the high-level request message queue KMQH, and a quantum key request sent by an application with a low security level is sent to the low-level request message queue KMQL;
step 8, deploying request message processing KMP and starting two threads with different priorities;
and 9, collecting the execution data of the KMP by the key distribution component KD in the operation process, and establishing a Lyapunov model by combining the registration data in the application registration component AR to complete quantum key scheduling.
Preferably, in the step 2: and establishing a key cache region KPC by using the MySQL database, and caching the acquired quantum key into the MySQL database.
Preferably, the key buffer KPB is established in said step 3 using a Redis database.
Preferably, in step 8, the thread 1 has a higher priority and is configured to scan the high-level request message queue KMQH, the request managed in the queue includes an application identifier ID, a request time T, a request operation OP, and a request parameter P, which may be denoted as [ ID, T, OP, P ], perform a corresponding operation according to the request operation OP, detect the number of remaining keys in the key pool buffer KPB, if the number is lower than a threshold value TH, push an "key margin low" alarm message to the application, and the thread 2 has a lower priority and processes the low-level request message queue KMQL in the same manner as the thread 1.
Compared with the prior art, the invention has the following beneficial effects:
the quantum key scheduling method facing the cloud computing platform solves the problem of matching with the excessively low key generation rate of a quantum key distribution system under the condition of high key consumption of the security application of the cloud computing platform. By using the key pool, the continuous work of the quantum key distribution process is realized, and the problem of precious quantum key resource waste caused by non-timely use is solved. By using the hierarchical design of the security application, the problem that the low-level security application and the high-level security contend for the key when the quantum key is not supplied enough is solved. By using the Lyapunov optimization algorithm in the key distribution process, the quantum key is distributed fairly among the security applications at the same level, and the limited quantum key resources are guaranteed to be utilized to the maximum extent.
Drawings
FIG. 1 is a block diagram of the operating environment required for the quantum key scheduling method of the present invention;
FIG. 2 is a key pool structure diagram of the quantum key scheduling method for a cloud computing platform according to the present invention;
FIG. 3 is a flow chart of the present invention for establishing a Lyapunov model.
Detailed Description
The present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which embodiments of the invention are shown.
As shown in fig. 1 and fig. 2, a quantum key scheduling method for a cloud computing platform includes, as main components of an operating environment: a key pool KP, an application registration component AR, a key message processing component KM and a key distribution component KD. The key pool KP is used for accumulating and storing continuously distributed quantum keys and is divided into two storage areas, a key buffer area KPC and a key buffer area KPB. The application registration component AR is used for registering the security application, and the registered security application has the authority to request to acquire the quantum key. The key message processing component KM is configured to manage a quantum key acquisition request sent from a security class application, extract a key construction response from the KPB, and send the key construction response to each security application. The key distribution component KD is used for quantum key scheduling from KPC to KPB.
And a key cache region KPC under the key pool KP adopts a distributed database technology and is provided with a storage upper limit S, when the quantity of the stored quantum keys does not exceed the storage upper limit S, the quantum keys negotiated latest by the QKD network are continuously stored, and when the quantity of the stored quantum keys exceeds the storage upper limit S, the newly generated quantum keys cover the earliest generated quantum keys.
And a key pool key buffer area KPB under the key pool KP adopts a memory type database technology to respectively manage buffered keys for each registered application, the size of the buffer area corresponding to each application depends on the registration parameters of the application, and quantum key data in the KPB is derived from KPC.
The structure of the quantum key comprises two parts of key unique identification and key value.
The application registration component AR provides an application registration interface, the interface parameters at least include an application identification ID, a security level parameter L, a threshold parameter TH, and a buffer size W, and the security level parameter L at least includes two levels: and for the application of the low security level, when the stock of the quantum key is lower than the threshold value TH, the alarm information of low key stock is generated, and meanwhile, a new quantum key is not distributed for the application, but the key of the buffer area is reused until the quantum number of the key buffer area corresponding to the application exceeds the threshold value TH again.
The key message processing component KM comprises two components, namely a request message queue KMQ and a request message processing KMP, wherein the KMQ provides message queues with the same number as security level hierarchies, and at least comprises a high security level queue and a security level queue, messages in the queues comprise an application identification ID, a request time T, a request operation OP and a request parameter P, and the KMP executes a corresponding operation on a corresponding buffer area in the KPB and constructs a response to send the response to a corresponding security application for a request managed in the KMQ.
The request operation OP shall at least comprise: key acquisition operations and key destruction operations. The method comprises the steps that a request parameter P corresponding to key obtaining operation is a requested key quantity QC, the KMP extracts quantum keys in a corresponding quantity from a corresponding buffer area in the KPB and sends the quantum keys to corresponding security applications, the request parameter P corresponding to key destroying operation is a unique key identifier for destroying the keys, and the KMP deletes a specified quantum key from the buffer area corresponding to the applications in the KPB.
The key distribution component KD firstly preferentially guarantees the scheduling of quantum key requirements with high security level for the quantum key requirements of different applications at the same level; secondly, due to the fact that multiple security applications exist and the time and the number of quantum keys requested by the applications are not uniformly distributed, a Lyapunov optimization algorithm is adopted for modeling in the scheduling process from KPC to KPB of the quantum keys, data of scheduling bases are obtained from KM, and a quantum key scheduling strategy is dynamically generated by solving the minimum upper bound of a Lyapunov drift penalty function.
As shown in fig. 3, the embodiment of the present invention includes the following specific steps:
the invention discloses a quantum key scheduling method facing a cloud computing platform, which comprises the following specific implementation steps:
step 1, establishing an operating environment, and deploying a QKD network into a cloud computing platform, so that the cloud computing platform can acquire a negotiated quantum key from a QKD node in real time;
step 2, establishing a key pool cache region KPC, establishing the key pool cache region KPC by using a MySQL database, caching the obtained quantum key into the MySQL database, and setting a storage upper limit S, for example 100 ten thousand;
step 3, establishing a key pool buffer KPB, establishing the key pool buffer KPB by using a Redis database, wherein an initial database is empty, and a corresponding List is independently established every time a security application is additionally registered;
step 4, deploying an application registration component AR, sending a registration application to the application registration component AR by an application needing to use the quantum key in the cloud computing platform, setting a parameter quadruple which is an application identification identifier ID, a security level parameter L, a threshold value parameter TH and a buffer area capacity size W and can be represented as [ ID, L, TH, W ], and then establishing a List with the buffer area capacity size W in a key pool buffer area KPB for buffering the quantum key;
step 5, initializing data, and continuously storing quantum keys in a key pool cache region KPC;
step 6, deploying a key distribution component KD, updating the quantum key from the key pool buffer area KPC to the key pool buffer area KPB in the component initialization process, wherein the quantity of Lists corresponding to each application does not exceed a preset size W, and deleting the quantum key from the key pool buffer area KPC after each key is updated;
step 7, deploying a high-level request message queue KMQ and a low-level request message queue KMQ, wherein a quantum key request sent by an application with a high security level is sent to the high-level request message queue KMQH, and a quantum key request sent by an application with a low security level is sent to the low-level request message queue KMQL;
step 8, deploying a request message processing KMP and starting two threads, wherein the thread 1 has a higher priority and is used for scanning a high-level request message queue KMQH, acquiring a managed request in the queue, and the managed request comprises an application identification ID, a request time T, a request operation OP and a request parameter P, which can be represented as [ ID, T, OP, P ], executing corresponding operation according to the request operation OP, simultaneously detecting the number of residual keys in a key pool buffer KPB, and if the number is lower than a threshold value TH, pushing alarm information of 'key margin is low' to the application. Thread 2 has a lower priority, and processes the low-level request message queue KMQL in the same way as thread 1;
step 9, the key distribution component KD collects KMP execution data during the operation process, and establishes the Lyapunov model in combination with the registration data in the application registration component AR, the establishment method is as follows:
(1) constructing a time slot sequence t = {0, 1, 2. };
(2) setting ai (t), wherein i is more than or equal to 1 and less than or equal to n, the number of the request keys sent by the application in the time slot t is set as n, and the n is the number of the registered applications;
(3) setting Qi (t), wherein i is more than or equal to 1 and less than or equal to n, the number of the keys contained in the request cache of the application in the KMQ in the time slot t is set, and n is the number of the registered applications;
(4) setting Di (t), i is more than or equal to 1 and less than or equal to n, wherein the n is the number of KMP processing messages in the time slot t, and n is the number of registered applications;
(5) due to the limitation of the buffer size W of the key pool buffer KPB, di (t) needs to satisfy the condition: di (t) < Wi;
(6) the number of application request keys, the number of keys of queue cache requests and the number of keys of message processing responses satisfy the formula:
Q(t+1)=max[Q(t)-D(t),0]+A(t);
(7) the sufficient requirements for queue Q to reach steady state are:
Figure 229121DEST_PATH_IMAGE001
(8) defining a vector phi (t) as a vector formed by the quantity of the cache request keys of each application queue:
Figure 568966DEST_PATH_IMAGE002
(9) defining the Lyapunov function:
Figure 817939DEST_PATH_IMAGE003
(10) then, a Lyapunov drift function is obtained:
Figure 404778DEST_PATH_IMAGE004
(11) according to the formula of step (6), the following formula can be obtained: qn (t +1) is less than or equal to Qn (t) -Dn (t) + an (t), and after two sides of the unequal number are squared, derivation is carried out, so that an upper bound of a drift function can be obtained:
Figure 503315DEST_PATH_IMAGE005
wherein both B and alpha are constants greater than 0, and since the derivation process is independent of patent content, the formula derivation process is omitted here,
(12) in order to construct the key scheduling strategy of KD, an objective function Yi (t) is designed, i is more than or equal to 1 and less than or equal to n, the number of keys for updating KD from a key pool buffer region KPC to a key pool buffer region KPB in a time slot t is marked as an optimal strategy,
(13) a drift-penalty function can be obtained and satisfies the inequality:
Figure 879807DEST_PATH_IMAGE006
v is more than or equal to 0, is a balance adjusting parameter, is manually adjusted according to the actual environment,
(14) setting time slots to be 30s, then operating a key distribution component KD for a plurality of periods, uniformly supplementing quantum keys into each application buffer area of KPB, and recording ai (t), Qi (t) and Di (t) of each time slot;
(15) and when the margin of the applied buffer key is lower than a threshold value TH and the warning information of 'key margin low' is generated, KD increases the key distribution amount of the application and starts to calculate a drift-penalty function, when the calculation result meets an inequality, the quantum key distribution amount of the application is increased, and when the calculation result does not meet the inequality, the quantum key distribution amount of the application is reduced.
According to the structure and the specific process of the invention, the quantum key scheduling method facing the cloud computing platform solves the problem of matching with the excessively low key generation rate of a quantum key distribution system under the condition of high key consumption of the security application of the cloud computing platform. By using the key pool, the continuous work of the quantum key distribution process is realized, and the problem of precious quantum key resource waste caused by non-timely use is solved. By using the hierarchical design of the security application, the problem that the low-level security application and the high-level security contend for the key when the quantum key is not supplied enough is solved. By using the Lyapunov optimization algorithm in the key distribution process, the quantum key is distributed fairly among the security applications at the same level, and the limited quantum key resources are guaranteed to be utilized to the maximum extent.

Claims (4)

1. A quantum key scheduling method facing a cloud computing platform is characterized by comprising the steps of establishing an operating environment, wherein the operating environment comprises:
the key pool KP is used for accumulating and storing the quantum keys distributed continuously and is divided into two storage areas, a key buffer area KPC and a key buffer area KPB;
the application registration component AR is used for registering the security application, and the registered security application has the authority to request to acquire the quantum key;
the key message processing component KM is used for managing quantum key acquisition requests sent from the security applications, extracting key construction responses from the key buffer KPB and sending the key construction responses to the security applications;
a key distribution component KD for quantum key scheduling from KPC to KPB, the key scheduling method comprising the steps of:
step 1, deploying a QKD network into an established operating environment, so that a cloud computing platform can acquire a negotiated quantum key from a QKD node in real time;
step 2, establishing a key pool buffer area KPC, and setting a storage upper limit S;
step 3, establishing a key pool buffer KPB, wherein an initial database is empty, and a corresponding List is independently established every time a security application is additionally registered;
step 4, deploying an application registration component AR, sending a registration application to the application registration component AR by using an application to the quantum key, setting a parameter quadruple which is an application identification identifier ID, a security level parameter L, a threshold parameter TH and a buffer capacity size W and can be represented as [ ID, L, TH, W ], and then establishing a List with the buffer capacity size W in a key pool buffer KPB for buffering the quantum key;
step 5, initializing data, and continuously storing quantum keys in a key pool cache region KPC;
step 6, deploying a key distribution component KD, updating the quantum key from the key pool buffer area KPC to the key pool buffer area KPB in the process of initializing the key distribution component KD, wherein the number of Lists corresponding to each application does not exceed a preset size W, and deleting the quantum key from the key pool buffer area KPC after each key is updated;
step 7, deploying a high-level request message queue KMQ and a low-level request message queue KMQ, wherein a quantum key request sent by an application with a high security level is sent to the high-level request message queue KMQH, and a quantum key request sent by an application with a low security level is sent to the low-level request message queue KMQL;
step 8, deploying request message processing KMP and starting two threads with different priorities;
and 9, collecting the execution data of the KMP by the key distribution component KD in the operation process, and establishing a Lyapunov model by combining the registration data in the application registration component AR to complete quantum key scheduling.
2. The cloud computing platform-oriented quantum key scheduling method according to claim 1, wherein in the step 2: and establishing a key cache region KPC by using the MySQL database, and caching the acquired quantum key into the MySQL database.
3. The cloud computing platform-oriented quantum key scheduling method of claim 1, wherein in the step 3, a Redis database is used to establish a key buffer KPB.
4. The cloud computing platform-oriented quantum key scheduling method of claim 1, 2 or 3, wherein in step 8, thread 1 has a higher priority and is configured to scan the high-level request message queue KMQH, and the request managed in the queue includes an application identifier ID, a request time T, a request operation OP and a request parameter P, which may be denoted as [ ID, T, OP, P ], perform a corresponding operation according to the request operation OP, and simultaneously detect the number of keys remaining in the key pool buffer KPB, if the number is lower than a threshold value TH, push "key margin low" alarm information to the application, thread 2 has a lower priority, and process the low-level request message queue KMQL in the same manner as thread 1.
CN202210401945.9A 2022-04-18 2022-04-18 Quantum key scheduling method for cloud computing platform Active CN114499864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210401945.9A CN114499864B (en) 2022-04-18 2022-04-18 Quantum key scheduling method for cloud computing platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210401945.9A CN114499864B (en) 2022-04-18 2022-04-18 Quantum key scheduling method for cloud computing platform

Publications (2)

Publication Number Publication Date
CN114499864A true CN114499864A (en) 2022-05-13
CN114499864B CN114499864B (en) 2022-07-12

Family

ID=81489441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210401945.9A Active CN114499864B (en) 2022-04-18 2022-04-18 Quantum key scheduling method for cloud computing platform

Country Status (1)

Country Link
CN (1) CN114499864B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115567204A (en) * 2022-09-28 2023-01-03 江苏亨通问天量子信息研究院有限公司 5G module based on quantum key, communication system, communication method and application

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120071333A1 (en) * 2010-07-26 2012-03-22 Tampere University Of Technology Uses of systems with degrees of freedom poised between fully quantum and fully classical states
CN105357001A (en) * 2015-12-10 2016-02-24 安徽问天量子科技股份有限公司 Quantum secrete key dynamic distribution management method and system
CN106850204A (en) * 2017-02-27 2017-06-13 北京邮电大学 Quantum key distribution method and system
CN107086908A (en) * 2016-02-15 2017-08-22 阿里巴巴集团控股有限公司 A kind of quantum key delivering method and device
CN109561047A (en) * 2017-09-26 2019-04-02 安徽问天量子科技股份有限公司 Encryption data storage system and method based on the storage of key strange land
CN111711517A (en) * 2020-07-23 2020-09-25 苏州大学 Quantum key distribution protection method and system based on service security level
CN112134695A (en) * 2020-08-14 2020-12-25 江苏亨通问天量子信息研究院有限公司 Cloud platform management method and system based on quantum key distribution technology
CN112737776A (en) * 2020-12-29 2021-04-30 中天通信技术有限公司 Load balancing quantum key resource distribution method facing data center
EP3955509A1 (en) * 2020-08-14 2022-02-16 Deutsche Telekom AG Provision of quantum keys in a network
CN114124384A (en) * 2022-01-26 2022-03-01 浙江九州量子信息技术股份有限公司 QKD network virtualization method and quantum key cloud platform

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120071333A1 (en) * 2010-07-26 2012-03-22 Tampere University Of Technology Uses of systems with degrees of freedom poised between fully quantum and fully classical states
CN105357001A (en) * 2015-12-10 2016-02-24 安徽问天量子科技股份有限公司 Quantum secrete key dynamic distribution management method and system
CN107086908A (en) * 2016-02-15 2017-08-22 阿里巴巴集团控股有限公司 A kind of quantum key delivering method and device
CN106850204A (en) * 2017-02-27 2017-06-13 北京邮电大学 Quantum key distribution method and system
CN109561047A (en) * 2017-09-26 2019-04-02 安徽问天量子科技股份有限公司 Encryption data storage system and method based on the storage of key strange land
CN111711517A (en) * 2020-07-23 2020-09-25 苏州大学 Quantum key distribution protection method and system based on service security level
WO2022016593A1 (en) * 2020-07-23 2022-01-27 苏州大学 Quantum key distribution protection method and system based on service security level
CN112134695A (en) * 2020-08-14 2020-12-25 江苏亨通问天量子信息研究院有限公司 Cloud platform management method and system based on quantum key distribution technology
EP3955509A1 (en) * 2020-08-14 2022-02-16 Deutsche Telekom AG Provision of quantum keys in a network
CN112737776A (en) * 2020-12-29 2021-04-30 中天通信技术有限公司 Load balancing quantum key resource distribution method facing data center
CN114124384A (en) * 2022-01-26 2022-03-01 浙江九州量子信息技术股份有限公司 QKD network virtualization method and quantum key cloud platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李晓星等: "保障内容安全的量子密钥应用综述", 《计算机工程》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115567204A (en) * 2022-09-28 2023-01-03 江苏亨通问天量子信息研究院有限公司 5G module based on quantum key, communication system, communication method and application

Also Published As

Publication number Publication date
CN114499864B (en) 2022-07-12

Similar Documents

Publication Publication Date Title
der Boor et al. Scalable load balancing in networked systems: A survey of recent advances
Cui et al. A blockchain-based containerized edge computing platform for the internet of vehicles
CN109166037B (en) Consensus method of block chains
Gunawan et al. A mathematical model and metaheuristics for time dependent orienteering problem
CN114499864B (en) Quantum key scheduling method for cloud computing platform
CN112769550B (en) Load balancing quantum key resource distribution system facing data center
CN103366022B (en) Information handling system and disposal route thereof
CN112737776B (en) Data center-oriented quantum key resource allocation method for load balancing
CN105827678B (en) Communication means and node under a kind of framework based on High Availabitity
Zhu et al. A reactive method for real time dynamic vehicle routing problem
Safa'a et al. iFogRep: An intelligent consistent approach for replication and placement of IoT based on fog computing
CN111431955A (en) Streaming data processing system and method
CN114499842A (en) QKD network key resource pre-allocation method based on reinforcement learning
Fu et al. Energy-efficient job-assignment policy with asymptotically guaranteed performance deviation
JP7432087B2 (en) Data structures containing energy schedules and methods for providing data structures containing energy schedules
CN114548893A (en) Multi-airport collaborative release method based on deep reinforcement learning
WO2024146193A1 (en) Sdn-based routing path selection method and apparatus, and storage medium
CN109286573A (en) Peak clipping system based on distributed token bucket
CN113032146A (en) Robust service supply method for multi-access edge computing environment
Zaman et al. Evolutionary algorithm for project scheduling under irregular resource changes
CN103023820A (en) Admission control method available for fragmented reservation
CN115562812A (en) Distributed virtual machine scheduling method, device and system for machine learning training
Hasan et al. Internet of things task scheduling in cloud environment using particle swarm optimization
CN111147575B (en) Data storage system based on block chain
Zhang et al. Joint optimization of the partition and scheduling of dnn tasks in computing and network convergence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant