CN114584288B - Key distribution method based on linear quantum key distribution network - Google Patents

Key distribution method based on linear quantum key distribution network Download PDF

Info

Publication number
CN114584288B
CN114584288B CN202011370428.7A CN202011370428A CN114584288B CN 114584288 B CN114584288 B CN 114584288B CN 202011370428 A CN202011370428 A CN 202011370428A CN 114584288 B CN114584288 B CN 114584288B
Authority
CN
China
Prior art keywords
key
quantum
pair
node
key distribution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011370428.7A
Other languages
Chinese (zh)
Other versions
CN114584288A (en
Inventor
富尧
钟一民
邱雅剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruban Quantum Technology Co Ltd
Nanjing Ruban Quantum Technology Co Ltd
Original Assignee
Ruban Quantum Technology Co Ltd
Nanjing Ruban Quantum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruban Quantum Technology Co Ltd, Nanjing Ruban Quantum Technology Co Ltd filed Critical Ruban Quantum Technology Co Ltd
Priority to CN202011370428.7A priority Critical patent/CN114584288B/en
Publication of CN114584288A publication Critical patent/CN114584288A/en
Application granted granted Critical
Publication of CN114584288B publication Critical patent/CN114584288B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Optical Communication System (AREA)

Abstract

The invention discloses a linear-based systemA key distribution method for a quantum key distribution network, when used in a system in which two parties of a key requirement are separated by an odd number of trusted nodes, the method comprising the steps of: using historical relay key K M Acquiring a first pair of shared keys; using historical relay key K M‑1 And the M-th to M-1-th pairs of quantum key distribution devices acquire a second pair of shared keys; using historical relay key K M‑2 And the M-th to M-2-th pairs of quantum key distribution devices acquire a third pair of shared keys; and so on, using the historical relay key K 1 And the mth to 1 st pair of quantum key distribution devices acquire the mth pair of shared keys. The beneficial effects are that: the invention reduces the waste of key resources, reduces the key generation difficulty and the consumption of computing resources, in particular reduces the waste of key resources and the consumption of computing resources of backbone networks such as quantum secret communication satellite networks, quantum secret communication trunks and the like, thereby improving the efficiency of the whole quantum key distribution network.

Description

Key distribution method based on linear quantum key distribution network
Technical Field
The invention relates to the technical field of key distribution, in particular to a key distribution method based on a linear quantum key distribution network.
Background
In the current internet communications era, techniques for encrypting information by means of keys have been developed with the need for a degree of confidentiality of communications. The key is used for encrypting the transmitted information, and the encryption processing of the communication data is a basic means for ensuring the information security in the public network. With the rapid development of quantum computers, how to ensure information security in an open network has become an important research topic.
Quantum key distribution, also known as QKD, exploits quantum mechanical properties to ensure the security of communications. It is based on the fundamental principles and characteristics of quantum mechanics (e.g., quantum unclonability, quantum uncertainty, etc.) to ensure that any attempt to steal a key in transit will be discovered by a legitimate user, which is a unique advantage of QKD over traditional key distribution.
The process of quantum key distribution is generally as follows: a single photon, typically as a qubit of polarization or phase freedom, can encode a 0,1 random number to be transferred onto this quantum superposition. For example, it is agreed in advance that the circular polarization of a photon represents 1 and the linear polarization represents 0. The light source emits a photon, each photon is randomly prepared into a circular polarization state or a linear polarization state by the first party, and then the circular polarization state or the linear polarization state is sent to the second party of a legal user, the second party receives the photon, and in order to confirm the polarization state (namely 0 or 1) of the photon, the circular polarization or the linear polarization analyzer is randomly adopted for measurement. If the type of analyzer is exactly the same as the polarization state of the photon being measured, the measured random number must be the same as the random number encoded by the a, otherwise the measured random number may be different from the one emitted by the a. And B, measuring photons emitted by the A one by one, and recording the measurement result. Party b then tells party a via the public channel the type of analyzer he employs. At this time, the A-side can conveniently know which analyzers are consistent with the B-side in detection, namely photons can be accurately detected; which analyzers are inconsistent with the host side, resulting in photons that are not properly detected, may be erroneous. He then tells the b party that only the result of the correct detection is left as a key so that both parties have a completely identical 0,1 random number sequence.
If an eavesdropper tries to fool this key in the process, he has two strategies: firstly, cloning the qubit sent by the first party and then sending the qubit to the second party. However, quantum unclonability ensures that an eavesdropper cannot clone the correct qubit sequence and thus cannot obtain the final key; the other is that an eavesdropper randomly selects an analyzer, measures a random number encoded by each qubit, and then sends the measured qubit masquerading as a qubit of a first party to a second party. According to the assumption of quantum mechanics, measurement will necessarily interfere with the quantum state, so that the "masquerading" quantum bit is likely to be different from the original quantum bit, which will cause errors in the random number sequence finally formed by the two parties, and they will know that an eavesdropper exists as long as the error rate is found to be abnormally high through random comparison, and such a key is unsafe and is abandoned. Its key is secure only if they confirm that no eavesdropper is present. This secure key can then be used for "one-time-pad" classical secure communications.
Trusted relay nodes are often employed in the prior art to address remote quantum key distribution. As shown in fig. 7, assume that remote key distribution is performed between two trusted nodes a and B, 2 trusted relay nodes 1 and 2 need to be added between a and B for distance reasons, and three pairs of keys KA1, K12 and K2B are obtained by performing key distribution between adjacent trusted nodes, where KA1 is a negotiation key with the trusted relay node 1, K12 is a negotiation key with the trusted relay node 1 and the trusted relay node 2, and K2B is a negotiation key with the trusted relay node 2 and B. When the key K is at the node A, the node A carries out exclusive-or operation on the key K and the negotiation key KA1 to form a ciphertext 1, then carries out exclusive-or operation on the negotiation key KA1 and the ciphertext 1 to decrypt the key K when the key K is transmitted to the trusted relay node 1 through a network, carries out exclusive-or operation on the key K and the key 12 to form a ciphertext 2, and transmits the ciphertext 2 to the trusted relay node 2, and the key is repeatedly transmitted until the key is distributed to a target node, and finally the target node decrypts the key K, so that remote key distribution between the A and the B is realized. The existing key distribution network is low in key generation and use efficiency, and only 1 pair of shared keys can be generated through more relay keys.
In summary, the following problems exist based on existing key distribution networks:
1. current quantum key distribution networks have evolved into large-scale complex networks including, for example, quantum secure communications satellite networks, quantum secure communications trunks, quantum secure communications metropolitan area networks, quantum secure communications subscriber networks, and the like. The larger the geographical span of the quantum key distribution network, the more costly two remote QKD terminals have to obtain a pair of quantum keys, because of the need to consume a large number of relay quantum keys of the quantum secret communication trusted relay nodes. The key waste of the current quantum key distribution network is serious, the key generation difficulty is high, and the consumption of computing resources is high.
Disclosure of Invention
Aiming at the problems in the related art, the invention provides a key distribution method based on a linear quantum key distribution network, so as to overcome the technical problems in the prior related art.
For this purpose, the invention adopts the following specific technical scheme:
according to one aspect of the present invention, there is provided a key distribution method based on a linear quantum key distribution network for an odd number of trusted nodes between two parties of a key requirement, the method comprising the steps of:
Setting n=2m+1 as odd number of nodes, taking the intermediate node to sequentially distribute keys to the left and right sides, taking a pair of quantum key distribution devices closest to the intermediate node as a first pair of quantum key distribution devices, and the like, wherein the pair farthest from the intermediate node is set as an Mth pair of quantum key distribution devices, namely a source node and a target node, 2 nodes in each pair of nodes are mutually called peer nodes, after one-time key relay distribution is carried out by the intermediate node, each pair of quantum key distribution devices shares to obtain a pair of keys, called an mth pair of historical relay keys, wherein the mth pair of historical relay keys and the mth+1th pair of historical relay keys are respectively K m And K m+1 And the keys have the following relationship: k (K) m+1 =H(K m ) I.e. the m-th pair of quantum key distribution devices acquires the relay key K m Then, K is calculated first m+1 =H(K m ) Then carry out key K to the m+1th pair quantum key distribution device m+1 Is a relay distribution of (a);
first key agreement, both parties use historic relay key K M Acquiring a first pair of shared keys;
second key agreement, both parties use historic relay key K M-1 And the M-th to M-1-th pairs of quantum key distribution devices acquire a second pair of shared keys;
third key agreement, both parties use historic relay key K M-2 And the M-th to M-2-th pairs of quantum key distribution devices acquire a third pair of shared keys;
similarly, the Mth key agreement, both parties utilize the historical relay key K 1 Mth to 1 st pair of measuresThe sub-key distribution device acquires the mth pair of shared keys.
Further, the first key negotiation specifically includes the following steps:
when initializing, the quantum key distribution equipment in the source node is utilized to transmit a request signal step by step to the last hop in the linear quantum key distribution network;
the quantum key distribution device in the middle trusted node generates a first quantum random number, and sequentially generates two groups of negotiation keys with the first pair of nodes, and meanwhile, the quantum key distribution device in the middle trusted node encrypts the first quantum random number and sequentially sends the first quantum random number to the quantum key distribution device in the first pair of nodes;
the quantum key distribution equipment in the first pair of nodes respectively decrypts to obtain a first quantum random number, marks the first quantum random number as an initial negotiation key and stores the initial negotiation key locally and temporarily, the quantum key distribution equipment in the first pair of nodes carries out hash calculation on the initial negotiation key to obtain a first key value, two groups of negotiation keys between the first pair of nodes and the intermediate node are generated until two groups of negotiation keys between the M-2 pair of nodes and the M-1 pair of nodes are generated, and simultaneously, the corresponding key values are respectively encrypted and sent to the quantum key distribution equipment in the second pair to the M-1 pair of nodes, and the sent key value is a new key value obtained by carrying out hash calculation on the locally obtained key value;
The M-1 pair node quantum key distribution equipment decrypts the corresponding key value to obtain local storage, hashes the key value to obtain new key value, generates two groups of negotiation keys between the M-1 pair node and the source node and the target node, and encrypts and sends the new key value to the source node quantum key distribution equipment and the target node quantum key distribution equipment respectively;
the quantum key distribution equipment in the source node and the target node respectively decrypts to obtain new key values and stores the new key values locally and temporarily;
the quantum key distribution equipment in the source node and the quantum key distribution equipment in the target node both obtain corresponding new key values during initialization, the quantum key distribution equipment in the source node or the target node generates a second quantum random number, the second quantum random number is encrypted by using the new key values and is sent to the opposite party, the opposite party decrypts the second quantum random number to obtain a second quantum random number, and the second quantum random number is recorded as a first negotiation key between the two parties;
after initialization, each intermediate node forms a key pool entry for storing a historical relay key, and the entry comprises a source node, a target node, a peer node corresponding to the node and a historical relay key value.
Further, the second key negotiation specifically includes the following steps:
After initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the method comprises the steps that an active quantum key distribution device in an M-1 pair node takes out a first key value, generates a third quantum random number, encrypts the third quantum random number by using the first key value, sends the encrypted third quantum random number to a shared quantum key distribution device, simultaneously generates a new first negotiation key between an active node and a source node in the M-1 pair node, and sends the encrypted third quantum random number to the quantum key distribution device in the source node;
the quantum key distribution equipment in the source node decrypts to obtain a third quantum random number, namely a second negotiation key between the source node and the target node;
the sharing quantum key distribution equipment in the M-1 node receives the message and decrypts the message to obtain a third quantum random number, a new first negotiation key between the sharing node and the target node in the M-1 node is generated, and the encrypted third quantum random number is sent to the quantum key distribution equipment in the target node;
and decrypting by the quantum key distribution equipment in the target node to obtain a third quantum random number, namely a second negotiation key between the source node and the target node.
Further, the mth key negotiation specifically includes the following steps:
after initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the method comprises the steps that an active quantum key distribution device in a first pair of nodes takes out an initial negotiation key, generates an Mth+1st quantum random number, encrypts the Mth+1st quantum random number by using the initial negotiation key, sends the encrypted Mth+1st quantum random number to a shared quantum key distribution device in the first pair of nodes, simultaneously generates a new negotiation key between an active node in the first pair of nodes and an active node in a second pair of nodes, and sends the encrypted Mth+1st quantum random number to the active quantum key distribution device in the second pair of nodes;
the active quantum key distribution equipment in the second pair of nodes decrypts to obtain an Mth+1st quantum random number, the Mth+1st quantum random number is sent to the previous hop node step by step until the quantum key distribution equipment in the source node, and a new negotiation key between adjacent nodes is adopted between two adjacent nodes to encrypt and decrypt;
the quantum key distribution equipment in the source node decrypts to obtain an Mth+1st quantum random number, namely an Mth negotiation key between the source node and the target node;
The shared quantum key distribution equipment in the first pair of nodes receives the message and decrypts the message to obtain an Mth+1st quantum random number, the Mth+1st quantum random number is sent to the next hop node step by step until the quantum key distribution equipment in the target node, and a new negotiation key between adjacent nodes is adopted between the adjacent two nodes for encryption and decryption;
and decrypting by the quantum key distribution equipment in the target node to obtain an Mth+1th quantum random number, namely an Mth negotiation key between the source node and the target node.
Further, after the historical relay key is used, the corresponding key pool entry is deleted and is not used any more.
According to another aspect of the present invention, there is provided a key distribution method based on a linear quantum key distribution network for an even number of trusted nodes separated by two parties of a key requirement, the method comprising the steps of:
setting n=2m as an even number of nodes, taking the middle two nodes to sequentially distribute keys to the left and right sides, and taking the middle two nodes as a first pairQuantum key distribution equipment and the like, wherein the pair farthest from the two middle nodes is set as an Mth pair of quantum key distribution equipment, namely a source node and a target node, 2 nodes in each pair of nodes are mutually called peer nodes, after key relay distribution is carried out once by the middle node, each pair of quantum key distribution equipment shares to obtain a pair of keys, namely an mth pair of historical relay keys, wherein the mth pair of historical relay keys and the mth+1th pair of historical relay keys are respectively K m And K m+1 And the keys have the following relationship: k (K) m+1 =H(K m ) I.e. the m-th pair of quantum key distribution devices acquires the relay key K m Then, K is calculated first m+1 =H(K m ) Then carry out key K to the m+1th pair quantum key distribution device m+1 Is a relay distribution of (a);
first key agreement, both parties use historic relay key K M Acquiring a first pair of shared keys;
second key agreement, both parties use historic relay key K M-1 And the M-th to M-1-th pairs of quantum key distribution devices acquire a second pair of shared keys;
third key agreement, both parties use historic relay key K M-2 And the M-th to M-2-th pairs of quantum key distribution devices acquire a third pair of shared keys;
similarly, the Mth key agreement, both parties utilize the historical relay key K 1 And the mth to 1 st pair of quantum key distribution devices acquire the mth pair of shared keys.
Further, the first key negotiation specifically includes the following steps:
when initializing, the quantum key distribution equipment in the source node is utilized to transmit a request signal step by step to the last hop in the linear quantum key distribution network;
the key sharing quantum key distribution equipment in the first pair of nodes generates a first quantum random number, locally stores the first quantum random number temporarily, generates a negotiation key between the key sharing node in the first pair of nodes and the active node in the first pair of nodes, encrypts the first quantum random number and sends the first quantum random number to the active quantum key distribution equipment in the first pair of nodes;
The method comprises the steps that an active quantum key distribution device in a first pair of nodes decrypts to obtain a first quantum random number, the first quantum random number is recorded as an initial negotiation key and is stored locally and temporarily, the active quantum key distribution device in the first pair of nodes hashes the initial negotiation key to obtain a first key value, and generates the negotiation key with an active node in a second pair of nodes until a negotiation key between an active node in an M-2 pair of nodes and an active node in an M-1 pair of nodes is generated, and meanwhile, the corresponding key values are respectively encrypted and sent to the active quantum key distribution device in the second pair to the M-1 pair of nodes, and the sent key value is a new key value obtained by hashing the locally obtained key value;
the M-1 st pair of nodes is used for decrypting the active quantum key distribution equipment to obtain a corresponding key value, locally storing the key value, carrying out hash calculation on the key value to obtain a new key value, generating a negotiation key between the active node and the source node in the M-1 st pair of nodes, and encrypting and sending the new key value to the quantum key distribution equipment in the source node;
the quantum key distribution equipment in the source node decrypts to obtain a new key value and stores the new key value locally and temporarily;
the key sharing quantum key distribution device in the first pair of nodes performs hash computation on the first quantum random number to obtain a first key value, generates a negotiation key with the key sharing node in the second pair of nodes until generating a negotiation key between the key sharing quantum key distribution device in the M-2 pair of nodes and the key sharing quantum key distribution device in the M-1 pair of nodes, and simultaneously respectively encrypts and transmits the corresponding key value to the key sharing quantum key distribution devices in the second pair to the M-1 pair of nodes, wherein the transmitted key value is a new key value obtained by performing hash computation on the locally obtained key value
The M-1 secret key sharing quantum key distribution equipment in the node decrypts to obtain a corresponding secret key value, locally stores the secret key value, performs hash calculation on the secret key value to obtain a new secret key value, simultaneously generates a negotiation secret key between the secret key sharing node in the M-1 node and the target node, and encrypts and sends the new secret key value to the quantum key distribution equipment in the target node;
the quantum key distribution equipment in the target node decrypts to obtain a new key value and stores the new key value locally and temporarily;
the quantum key distribution equipment in the source node and the quantum key distribution equipment in the target node both obtain corresponding new key values during initialization, the quantum key distribution equipment in the source node or the target node generates a second quantum random number, the second quantum random number is encrypted by using the new key values and is sent to the opposite party, the opposite party decrypts the second quantum random number to obtain a second quantum random number, and the second quantum random number is recorded as a first negotiation key between the two parties;
after initialization, each intermediate node forms a key pool entry for storing a historical relay key, and the entry comprises a source node, a target node, a peer node corresponding to the node and a historical relay key value.
Further, the second key negotiation specifically includes the following steps:
After initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the active quantum key distribution equipment in the M-1 pair node takes out the first key value, generates a third quantum random number, encrypts the third quantum random number by using the first key value, sends the third quantum random number to the key sharing quantum key distribution equipment in the M-1 pair node, simultaneously generates a new negotiation key between the active node and the source node in the M-1 pair node, and simultaneously encrypts and sends the third quantum random number to the quantum key distribution equipment in the source node;
the quantum key distribution equipment in the source node decrypts to obtain a third quantum random number, namely a second negotiation key between the source node and the target node;
the secret key sharing quantum key distribution equipment in the M-1 pair node receives the message and decrypts the message to obtain a third quantum random number, and meanwhile generates a negotiation secret key between the secret key sharing node in the M-1 pair node and the target node, and encrypts and sends the third quantum random number to the quantum key distribution equipment in the target node;
and decrypting by the quantum key distribution equipment in the target node to obtain a third quantum random number, namely a second negotiation key between the source node and the target node.
Further, the mth key negotiation specifically includes the following steps:
after initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the method comprises the steps that an active quantum key distribution device in a first pair of nodes takes out an initial negotiation key, generates an Mth+1st quantum random number, encrypts the Mth+1st quantum random number by using the initial negotiation key, sends the encrypted Mth+1st quantum random number to a key sharing quantum key distribution device in the first pair of nodes, simultaneously generates a new negotiation key between an active node in the first pair of nodes and an active node in a second pair of nodes, and sends the encrypted Mth+1st quantum random number to the active quantum key distribution device in the second pair of nodes;
the active quantum key distribution equipment in the second pair of nodes decrypts to obtain an Mth+1st quantum random number, the Mth+1st quantum random number is sent to the previous hop node step by step until the quantum key distribution equipment in the source node, and a new negotiation key between adjacent nodes is adopted between two adjacent nodes to encrypt and decrypt;
the quantum key distribution equipment in the source node decrypts to obtain an Mth+1st quantum random number, namely an Mth negotiation key between the source node and the target node;
The key sharing quantum key distribution equipment in the first pair of nodes receives the message and decrypts the message to obtain the M+1th quantum random number, a new negotiation key between the first pair of nodes and the key sharing node in the second pair of nodes is generated, and the encrypted M+1th quantum random number is sent to the key sharing quantum key distribution equipment in the second pair of nodes;
decrypting the key sharing quantum key distribution equipment in the second pair of nodes to obtain an Mth+1st quantum random number, progressively sending the Mth+1st quantum random number to the next hop node until the quantum key distribution equipment in the target node, and encrypting and decrypting the two adjacent nodes by adopting a new negotiation key between the adjacent nodes;
and decrypting by the quantum key distribution equipment in the target node to obtain an Mth+1th quantum random number, namely an Mth negotiation key between the source node and the target node.
Further, after the historical relay key is used, the corresponding key pool entry is deleted and is not used any more.
The beneficial effects of the invention are as follows: the invention improves the key distribution method of the traditional quantum key distribution network, reduces the waste of key resources, reduces the key generation difficulty and the consumption of computing resources, and particularly reduces the waste of key resources and the consumption of computing resources of backbone networks such as quantum secret communication satellite networks, quantum secret communication trunks and the like, thereby improving the efficiency of the whole quantum key distribution network.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a key agreement method at the time of initialization in a key distribution method based on a linear quantum key distribution network according to an embodiment of the present invention;
fig. 2 is one of schematic diagrams of a key agreement method after initialization in a key distribution method based on a linear quantum key distribution network according to an embodiment of the present invention;
FIG. 3 is a second schematic diagram of a key agreement method after initializing a key distribution method based on a linear quantum key distribution network according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a key agreement method at the time of initialization in a key distribution method based on a linear quantum key distribution network according to another embodiment of the present invention;
fig. 5 is a schematic diagram of an initialized key negotiation method in a key distribution method based on a linear quantum key distribution network according to another embodiment of the present invention;
Fig. 6 is a second schematic diagram of a key agreement method after a key distribution method based on a linear quantum key distribution network is initialized according to another embodiment of the present invention;
fig. 7 is a schematic diagram of a quantum key distribution network in the prior art.
Detailed Description
For the purpose of further illustrating the various embodiments, the present invention provides the accompanying drawings, which are a part of the disclosure of the present invention, and which are mainly used to illustrate the embodiments and, together with the description, serve to explain the principles of the embodiments, and with reference to these descriptions, one skilled in the art will recognize other possible implementations and advantages of the present invention, wherein elements are not drawn to scale, and like reference numerals are generally used to designate like elements.
According to an embodiment of the present invention, there is provided a key distribution method based on a linear quantum key distribution network, and the method includes: quantum key distribution network communication from a source node to a target node. The invention provides a key distribution method based on a linear quantum key distribution network, which is carried out under the scene that a large number of trusted nodes (namely a network of relay or route of quantum key distribution equipment) coexist, wherein the whole network can comprise the following types of quantum key distribution networks: a quantum secure communications satellite network, a quantum secure communications trunk, a quantum secure communications metropolitan area network, a quantum secure communications subscriber network, and the like. The trusted node comprises at least: a quantum key distribution device containing a quantum random number generator; the algorithm module of the method is disclosed by the invention.
Embodiment one: the two key requirement sides are separated by an odd number of trusted nodes
Setting up that 5 trusted nodes, namely a trusted node B, a trusted node C, a trusted node D, a trusted node E and a trusted node F, exist between a source node A and a target node G in a trunk line of the linear quantum network. The linear quantum network trunk shares an odd number of trusted nodes. And the intermediate trusted node D in the linear quantum network trunk serves as a network point to distribute keys to the source node A and the target node G respectively. In the linear quantum network trunk, taking the intermediate trusted node D as a midpoint, there are a third pair of nodes, namely A and G, a second pair of nodes, namely an active node B and a symmetric key sharing node F, and a first pair of nodes, namely an active node C and a symmetric key sharing node E (in actual implementation, the active node and the shared key node, namely the passive node, are opposite, the active node is a node closer to the source node, and the passive node is a node closer to the target node). In practical implementation, the active node may negotiate a key with the symmetric key sharing node preferentially after initialization.
The invention will now be further described with reference to the accompanying drawings and detailed description, as shown in fig. 1-3, according to one embodiment of the invention, there is provided a key distribution method based on a linear quantum key distribution network, the method comprising the steps of:
S1, negotiation method during initialization
Wherein, the step S1 comprises the following steps:
and S101, during initialization, a quantum key distribution device A (quantum key distribution device in a source node) in the node wants to negotiate a key with a quantum key distribution device G (quantum key distribution device in a target node), and the quantum key distribution device A transmits a request signal step by step to the last hop in the linear quantum key sub-network. Preferably, the key is distributed by an intermediate trusted node D in the linear quantum key distribution network to the source node and the destination node, as shown in figure 1.
S102, a quantum key distribution device D (quantum key distribution device in an intermediate trusted node) generates a quantum random number K, and generates a negotiation key K with a quantum key distribution device C (active quantum key distribution device in a first pair of nodes) in a quantum key negotiation mode (for example, a BB84 protocol is adopted, and a key generated in the negotiation mode is called a negotiation key in the following) in a negotiation mode DC . The quantum key distribution device D utilizes the negotiation key K DC Encrypting the quantum random number K to obtain { K } K DC And will { K } K DC To the trusted node C.
S103, quantum key distribution device C uses negotiation key K DC Decrypting message { K } K DC A quantum random number K (first quantum random number) is obtained, noted as an initial negotiation key, and K is temporarily stored locally. The quantum key distribution device C performs hash computation on the initial negotiation key K to obtain H (K) (first key value). The quantum key distribution device C and the quantum key distribution device B (active quantum key distribution device in the second pair of nodes) generate a negotiation key K through a quantum key negotiation mode CB Quantum key distribution device C utilizes negotiation key K CB Encrypting H (K) to obtain { H (K) } K CB And sent to the trusted node B.
S104, quantum key distribution equipment B uses negotiation key K CB Decrypting message { H (K) } K CB A first key value H (K) is obtained and H (K) is temporarily stored locally. The quantum key distribution apparatus B hashes the first key value H (K) to obtain H (K)) (second key value). The quantum key distribution device B and the quantum key distribution device A generate a negotiation key K in a quantum key negotiation mode BA Quantum key distribution device B utilizes negotiation key K BA H (H (K)) is encrypted to obtain { H (H (K)) } K BA And transmits to the source node a.
S105, quantum key distribution device A utilizes negotiation key K BA Decrypting the message { H (H (K)) } K BA The negotiation key H (K)) is obtained and temporarily stored locally.
S106, the quantum key distribution device D and the quantum key distribution device E generate a negotiation key K in a quantum key negotiation mode DE . The quantum key distribution device D utilizes the negotiation key K DE Encrypting the quantum random number K to obtain { K } K DE And will { K } K DE To trusted node E (the key sharing quantum key distribution device in the first pair of nodes).
S107, the quantum key distribution device E utilizes the negotiation key K DE Decrypting message { K } K DE The quantum random number K is obtained and recorded as an initial negotiation key, and the K is temporarily stored locally. The quantum key distribution device E initially negotiatesAnd carrying out hash calculation on the key K to obtain H (K). The quantum key distribution device E and the quantum key distribution device F (the key sharing quantum key distribution device in the second pair of nodes) generate a negotiation key K through a quantum key negotiation mode EF Quantum key distribution device E utilizes negotiation key K EF Encrypting H (K) to obtain { H (K) } K EF And sent to trusted node F.
S108, quantum key distribution device F utilizes negotiation key K EF Decrypting message { H (K) } K EF Obtain the negotiation key H (K), and temporarily store H (K) locally. The quantum key distribution device F negotiates a key H (K) and performs hash computation to obtain H (K)). The quantum key distribution device F and the quantum key distribution device G generate a negotiation key K in a quantum key negotiation mode FG Quantum key distribution device F utilizes negotiation key K FG H (H (K)) is encrypted to obtain { H (H (K)) } K FG And sent to the target node G.
S109, quantum Key distribution device G utilizes negotiation Key K FG Decrypting the message { H (H (K)) } K FG The negotiation key H (K)) is obtained and temporarily stored locally.
S110, H (H (K)) obtained by the source node A and the target node G during initialization is the negotiation key of A and G. Then, the source node a or the target node G generates a quantum random number R1 (second quantum random number), the quantum random number R1 is encrypted by using H (K)) and sent to the other party, and the other party decrypts by using H (K)) to obtain R1, so as to obtain a first negotiation key in which R1 is both parties.
After initialization, each intermediate node forms a key pool entry for storing a historical relay key, and the entry comprises a source node, a target node, a peer node corresponding to the node and a historical relay key value. At this point each intermediate node stores a key pool entry as follows:
if there are more intermediate nodes, the stored key value may be hashed all the time to obtain H (K)), H (K)), and so on.
S2, negotiation method I after initialization
Wherein, the step S2 comprises the following steps:
and S201, after initialization, the quantum key distribution equipment A in the node wants to negotiate a key with the opposite quantum key distribution equipment G, and the quantum key distribution equipment A sends a request signal step by step to the last hop in the linear quantum key sub-network, as shown in figure 2.
S202, preferentially, the quantum key distribution device B indexes the self key cache area according to the request information of the quantum key distribution device A and takes out the last key H (K). The quantum key distribution device B generates a quantum random number R2 (third quantum random number), encrypts R2 with the key H (K) to obtain a message { R2} H (K), and sends { R2} H (K) to the key sharing node F. After H (K) is used, its corresponding key pool entry is deleted and is no longer used. The quantum key distribution device B and the quantum key distribution device A generate a negotiation key K in a quantum key negotiation mode BA ' and utilize K BA ' R2 is encrypted to obtain { R2} K BA ' send to source node a.
S203, quantum key distribution device A utilizes negotiation key K BA ' decryption message { R2} K BA ' get the second negotiated key for the quantum random number R2, i.e. R2 is a and G.
S204, after receiving the message { R2} H (K), the quantum key distribution device F takes out the key H (K) of the last time to decrypt { R2} H (K) to obtain the quantum random number R2. After H (K) is used, its corresponding key pool entry is deleted and is no longer used. The quantum key distribution device F and the quantum key distribution device G generate a negotiation key K in a quantum key negotiation mode FG ' and utilize K FG ' R2 is encrypted to obtain { R2} K FG ' to the target node G.
S205, quantum key distribution device G utilizes negotiation key K FG ' decryption message { R2} K FG ' get the second negotiated key for the quantum random number R2, i.e. R2 is a and G.
S3, negotiating method II after initialization
Wherein, the step S3 comprises the following steps:
and S301, after initialization, the quantum key distribution equipment A in the node wants to negotiate a key with the opposite quantum key distribution equipment G, and the quantum key distribution equipment A sends a request signal step by step to the last hop in the linear quantum key sub-network, as shown in figure 3.
S302, preferentially, the quantum key distribution device C indexes the self key cache area according to the request information of the quantum key distribution device A and takes out the last initial negotiation key K. The quantum key distribution device C generates a quantum random number R3 (m+1th quantum random number), encrypts R3 by using the key K to obtain a message { R3} K, and transmits { R3} K to the key sharing node E. After K is used, its corresponding key pool entry is deleted and no longer used. The quantum key distribution device C and the quantum key distribution device B generate a negotiation key K in a quantum key negotiation mode CB ' and utilize K CB ' R3 is encrypted to obtain { R3} K CB ' to the quantum key distribution device B.
S303, quantum key distribution device B uses negotiation key K CB ' decryption message { R3} K CB ' quantum random number R3 is obtained. The quantum key distribution device B and the quantum key distribution device A generate a negotiation key K in a quantum key negotiation mode BA "Quantum key distribution device B utilizes negotiation key K BA "R3 is encrypted to obtain { R3} K BA "send to source node a.
S304, the quantum key distribution device A utilizes the negotiation key K BA "pair { R3} K BA And decrypting to obtain a quantum random number R3, namely a third negotiation key with R3 being A and G.
S305, after receiving the { R3} K, the quantum key distribution equipment E takes out the key K from the previous time to decrypt the { R3} K to obtain the quantum random number R3. After K is used, its corresponding key pool entry is deleted and no longer used. The quantum key distribution equipment E and the quantum key distribution equipment F generate a negotiation key K in a quantum key negotiation mode EF '. Quantum key distribution device E utilizes negotiation key K EF ' R3 is encrypted to obtain { R3} K EF ' send to trusted node F.
S306, quantum key distribution device F uses negotiation key K EF ' pair { R3} K EF ' decrypting to obtain the quantum random number R3. The quantum key distribution device F and the quantum key distribution device G generate a negotiation key K in a quantum key negotiation mode FG ", and utilize K FG "R3 is encrypted to obtain { R3} K FG "send to target node G".
S307, quantum key distribution device G utilizes negotiation key K FG "decrypt message { R3} K FG "get the third negotiation key of quantum random number R3, i.e. R3 is a and G.
Embodiment two: the two key requirement parties are separated by an even number of trusted nodes
Setting up that 4 trusted nodes, namely a trusted node B, a trusted node C, a trusted node D and a trusted node E, exist between a source node A and a target node F in a trunk line of the linear quantum network. The linear quantum network trunks share an even number of trusted nodes. The intermediate trusted nodes C and D in the linear quantum network backbone are both network points where the D distributes keys to the source node a and the destination node F, respectively. In the linear quantum network trunk, taking C and D as network points, there are a third pair of nodes, namely A and F, a second pair of nodes, namely an active node B and a symmetric key sharing node E, and a first pair of nodes, namely an active node C and a symmetric key sharing node D (in actual implementation, the active node and the shared key node, namely the passive node, are opposite, the active node is a node closer to the source node, and the passive node is a node closer to the target node). In practical implementation, the active node may negotiate a key with the symmetric key sharing node preferentially after initialization.
The invention will now be further described with reference to the accompanying drawings and detailed description, as shown in fig. 4-6, according to one embodiment of the invention, there is provided a key distribution method based on a linear quantum key distribution network, the method comprising the steps of:
s1', negotiation method during initialization
Wherein, the step S1' comprises the following steps:
and S101', when in initialization, the quantum key distribution equipment A in the node wants to negotiate a key with the opposite quantum key distribution equipment F, and the quantum key distribution equipment A transmits a request signal step by step to the last hop in the linear quantum key sub-network. Preferably, the secret key is distributed to the source node and the destination node by an intermediate trusted node D in the linear quantum key distribution network, as shown in fig. 4.
S102', the quantum key distribution device D generates a quantum random number K and temporarily stores K locally. The quantum key distribution device D and the quantum key distribution device C generate a negotiation key K in a quantum key negotiation mode DC . The quantum key distribution device D utilizes the negotiation key K DC Encrypting the quantum random number K to obtain { K } K DC And will { K } K DC To the trusted node C.
S103', quantum Key distribution device C utilizes negotiation Key K DC Decrypting message { K } K DC The quantum random number K is obtained and recorded as an initial negotiation key, and the K is temporarily stored locally. The quantum key distribution device C performs hash calculation on the negotiation key K to obtain H (K). The quantum key distribution device C and the quantum key distribution device B generate a negotiation key K in a quantum key negotiation mode CB Quantum key distribution device C utilizes negotiation key K CB Encrypting H (K) to obtain { H (K) } K CB And sent to the trusted node B.
S104', quantum Key distribution device B utilizes negotiation Key K CB Decrypting message { H (K) } K CB Obtain the negotiation key H (K), and temporarily store H (K) locally. The quantum key distribution device B performs hash computation on the negotiation key H (K) to obtain H (K)). The quantum key distribution device B and the quantum key distribution device A generate a negotiation key K in a quantum key negotiation mode BA Quantum key distribution device B utilizes negotiation key K BA H (H (K)) is encrypted to obtain { H (H (K)) } K BA And transmits to the source node a.
S105', quantum key distribution device a uses negotiation key K BA Decryption message { H (H)(K))}K BA The negotiation key H (K)) is obtained and temporarily stored locally.
S106', the quantum key distribution device D performs hash calculation on the quantum random number K to obtain H (K). The quantum key distribution device D and the quantum key distribution device E generate a negotiation key K in a quantum key negotiation mode DE . The quantum key distribution device D utilizes the negotiation key K DE Encrypting H (K) to obtain { H (K) } K DE To the trusted node E.
S107', quantum key distribution device E utilizes negotiation key K DE Decrypting message { H (K) } K DE H (K) is obtained and temporarily stored locally. The quantum key distribution device E performs hash computation on H (K) to obtain H (K). The quantum key distribution equipment E and the quantum key distribution equipment F generate a negotiation key K in a quantum key negotiation mode EF Quantum key distribution device E utilizes negotiation key K EF H (H (K)) is encrypted to obtain { H (H (K)) } K EF And sent to the target node F.
S108' quantum key distribution device F uses negotiation key K EF Decrypting the message { H (H (K)) } K EF A negotiation key H (K)) is obtained, and H (K)) is temporarily stored locally.
S109', H (H (K)) obtained by the source node A and the target node F during initialization is the negotiation key of A and G. Then, the source node a or the destination node F generates a quantum random number R1, encrypts the quantum random number using H (K)) and transmits the quantum random number to the other party, and the other party decrypts the quantum random number R1 using H (K)) to obtain a first negotiation key in which R1 is both parties.
After initialization, each intermediate node forms a key pool entry for storing a historical relay key, and the entry comprises a source node, a target node, a peer node corresponding to the node and a historical relay key value. At this point each intermediate node stores a key pool entry as follows:
If there are more intermediate nodes, the stored key value may be hashed all the time to obtain H (K)), H (K)), and so on.
S2', negotiation method I after initialization
Wherein, the step S2' comprises the following steps:
after S201' is initialized, the quantum key distribution device a in the node wants to negotiate a key with the pair quantum key distribution device F, and the quantum key distribution device a sends a request signal step by step to the last hop in the linear quantum key sub-network, as shown in fig. 5.
S202', preferentially, the quantum key distribution device B indexes the own key buffer according to the request information of the quantum key distribution device a, and takes out the last key H (K). The quantum key distribution device B generates a quantum random number R2, encrypts the R2 by using the key H (K) to obtain a message { R2} H (K), and sends the { R2} H (K) to the key sharing node E. After H (K) is used, its corresponding key pool entry is deleted and is no longer used. The quantum key distribution device B and the quantum key distribution device A generate a negotiation key K in a quantum key negotiation mode BA ' and utilize K BA ' R2 is encrypted to obtain { R2} K BA ' send to source node a.
S203', quantum key distribution device a uses negotiation key K BA ' decryption message { R2} K BA ' get the second negotiated key for the quantum random number R2, i.e. R2 is a and G.
S204', after receiving the message { R2} H (K), the quantum key distribution device E takes out the key H (K) of the last time and decrypts the { R2} H (K) to obtain the quantum random number R2. After H (K) is used, its corresponding key pool entry is deleted and is no longer used. Quantum key distribution device E and quantum key distribution device F generate negotiation key K through quantum key negotiation EF ' and utilize K EF ' R2 is encrypted to obtain { R2} K EF ' send to the target node F.
S205', quantum key distribution device F uses negotiation key K EF ' decryption message { R2} K EF ' get the second negotiated key for the quantum random number R2, i.e. R2 is a and G.
S3', negotiation method II after initialization
Wherein, the step S3' comprises the following steps:
after S301', after initialization, the quantum key distribution device a in the node wants to negotiate a key with the pair of quantum key distribution devices F, and the quantum key distribution device a sends a request signal step by step to the last hop in the linear quantum key sub-network, as shown in fig. 6.
S302', preferentially, the quantum key distribution device C indexes the own key buffer according to the request information of the quantum key distribution device a, and takes out the last key K. The quantum key distribution device C generates a quantum random number R3, encrypts the R3 by using the key K to obtain a message { R3} K, and sends the { R3} K to the key sharing node D. After K is used, its corresponding key pool entry is deleted and no longer used. The quantum key distribution device C and the quantum key distribution device B generate a negotiation key K in a quantum key negotiation mode CB ' and utilize K CB ' R3 is encrypted to obtain { R3} K CB ' to the quantum key distribution device B.
S303', quantum key distribution device B uses negotiation key K CB ' decryption message { R3} K CB ' quantum random number R3 is obtained. The quantum key distribution device B and the quantum key distribution device A generate a negotiation key K in a quantum key negotiation mode BA "Quantum key distribution device B utilizes negotiation key K BA "R3 is encrypted to obtain { R3} K BA "send to source node a.
S304', quantum key distribution device a uses negotiation key K BA "pair { R3} K BA And decrypting to obtain a quantum random number R3, namely a third negotiation key with R3 being A and G.
S305', after receiving { R3} K, the quantum key distribution device D takes out the key K from the last time to decrypt { R3} K to obtain a quantum random number R3. After K is used, its corresponding key pool entry is deleted and no longer used. The quantum key distribution device D and the quantum key distribution device E generate a negotiation key K in a quantum key negotiation mode DE '. Quantum key distribution device DUsing negotiation key K DE ' R3 is encrypted to obtain { R3} K DE ' send to trusted node E.
S306', quantum Key distribution device E utilizes negotiation Key K DE ' pair { R3} K DE ' decrypting to obtain the quantum random number R3. The quantum key distribution equipment E and the quantum key distribution equipment F generate a negotiation key K in a quantum key negotiation mode EF ", and utilize K EF "R3 is encrypted to obtain { R3} K EF "send to destination node F".
S307', quantum key distribution device F uses negotiation key K EF "decrypt message { R3} K EF "get the third negotiation key of quantum random number R3, i.e. R3 is a and G.
In the invention, assuming that the number of trusted nodes on a quantum secret communication trunk line in the traditional quantum key distribution method is N (N is more than or equal to 2), the key pair negotiated and consumed in the traditional quantum key distribution method is an (N-1) pair, the negotiation key actually distributed to a user target node is 1 pair (N nodes, two adjacent nodes from a source node to the target node sequentially carry out key distribution, N-1 pair negotiation keys are generated together, 1 pair is actually distributed to the target node), and the key generation efficiency is 1/(N-1).
Assuming that the number of the trusted nodes on the quantum secret communication trunk line is odd (namely n=2m+1), the key pair consumed by negotiation during initialization is 2M pairs, the key pair consumed by the initialized negotiation method 1 is 2 pairs, the key pair consumed by the initialized negotiation method 2 is 4 pairs, and the negotiation key actually distributed to the trusted target node is 3 pairs after the execution of the 3 negotiation methods is completed. The deduction process comprises the following steps:
The total 2M+1 is an odd number of nodes, the middle node is taken, and key distribution is sequentially carried out on the left side and the right side;
when in initialization, M-1 pairs of negotiation keys are generated from the Mth node to the source node on the left side, M-1 pairs of negotiation keys are generated on the right side in a same way, 1 pair of negotiation keys from the left middle node to the Mth node and 1 pair on the right side (1 pair is also generated on the right side in the same way), and (M-1) +2+ (M-1) =2M pairs are generated in all initialization;
second negotiation: directly from the second node and the penultimate node, 1+1=2 pairs in total;
third negotiation: directly from the third node and the third-to-last node, 2+2=4 pairs in total;
and so on, the Mth time has: pair (M-1) + (M-1) =2 (M-1)
A total of 2m+2+4+ … … +2 (M-1) =m (m+1) pairs are produced, with M pairs actually distributed to the targets.
From the above, the efficiency was found to be M/M (m+1) =1/(m+1).
Assuming that the number of trusted nodes on a quantum secret communication trunk is even (namely n=2m), the key pair consumed by negotiation during initialization is 2M-1 pairs, the key pair consumed by the initialized negotiation method 1 is 2 pairs, the key pair consumed by the initialized negotiation method 2 is 4 pairs, after the execution of the 3 negotiation methods is finished, the negotiation key actually distributed to the trusted target node is 3 pairs, the key generation efficiency is obtained as M/[ M (m+1) -1], the number of the same node in the derivation process is odd, and the difference is that the number of the even trusted nodes is less than the number of the odd trusted nodes by one key negotiation during initialization.
In summary, when M takes different numbers of trusted nodes corresponding to different values, the key generation efficiency is as follows:
m value 2 2 3 3
Number N of trusted nodes 4 5 6 7
Traditional negotiation method 33% 25% 20% 16%
This patent negotiation method 40% 33% 27.2% 25%
Therefore, the key distribution method based on the linear quantum key distribution network is superior to the traditional quantum key distribution method.
In summary, by means of the above technical solution of the present invention, the present invention improves the key distribution method of the traditional quantum key distribution network, reduces the waste of key resources, and simultaneously reduces the difficulty of key generation and the consumption of computing resources, in particular, reduces the waste of key resources and the consumption of computing resources of backbone networks such as quantum secret communication satellite networks, quantum secret communication trunks, etc., thereby improving the efficiency of the whole quantum key distribution network.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (10)

1. A key distribution method based on a linear quantum key distribution network, characterized in that it is used for two parties of key requirement to be separated by an odd number of trusted nodes, the method comprising the steps of:
setting n=2m+1 as odd number of nodes, taking the intermediate node to sequentially distribute keys to the left and right sides, taking a pair of quantum key distribution devices closest to the intermediate node as a first pair of quantum key distribution devices, and the like, wherein the pair farthest from the intermediate node is set as an Mth pair of quantum key distribution devices, namely a source node and a target node, 2 nodes in each pair of nodes are mutually called peer nodes, after one-time key relay distribution is carried out by the intermediate node, each pair of quantum key distribution devices shares to obtain a pair of keys, called an mth pair of historical relay keys, wherein the mth pair of historical relay keys and the mth+1th pair of historical relay keys are respectively K m And K m+1 And the keys have the following relationship: k (K) m+1 =H(K m ) I.e. the m-th pair of quantum key distribution devices acquires the relay key K m Then, K is calculated first m+1 =H(K m ) Then carry out key K to the m+1th pair quantum key distribution device m+1 Is a relay distribution of (a);
first key agreement, both parties use historic relay key K M Acquiring a first pair of shared keys;
Second key agreement, both parties use historic relay key K M-1 And the M-th to M-1-th pairs of quantum key distribution devices acquire a second pair of shared keys;
third key agreement, both parties use historic relay key K M-2 Mth to MthThe M-2 pair quantum key distribution device acquires a third pair of shared keys;
similarly, the Mth key agreement, both parties utilize the historical relay key K 1 And the mth to 1 st pair of quantum key distribution devices acquire the mth pair of shared keys.
2. A key distribution method based on a linear quantum key distribution network according to claim 1, wherein the first key agreement specifically comprises the steps of:
when initializing, the quantum key distribution equipment in the source node is utilized to transmit a request signal step by step to the last hop in the linear quantum key distribution network;
the quantum key distribution device in the middle trusted node generates a first quantum random number, and sequentially generates two groups of negotiation keys with the first pair of nodes, and meanwhile, the quantum key distribution device in the middle trusted node encrypts the first quantum random number and sequentially sends the first quantum random number to the quantum key distribution device in the first pair of nodes;
the quantum key distribution equipment in the first pair of nodes respectively decrypts to obtain a first quantum random number, marks the first quantum random number as an initial negotiation key and stores the initial negotiation key locally and temporarily, the quantum key distribution equipment in the first pair of nodes carries out hash calculation on the initial negotiation key to obtain a first key value, two groups of negotiation keys between the first pair of nodes and the intermediate node are generated until two groups of negotiation keys between the M-2 pair of nodes and the M-1 pair of nodes are generated, and simultaneously, the corresponding key values are respectively encrypted and sent to the quantum key distribution equipment in the second pair to the M-1 pair of nodes, and the sent key value is a new key value obtained by carrying out hash calculation on the locally obtained key value;
The M-1 pair node quantum key distribution equipment decrypts the corresponding key value to obtain local storage, hashes the key value to obtain new key value, generates two groups of negotiation keys between the M-1 pair node and the source node and the target node, and encrypts and sends the new key value to the source node quantum key distribution equipment and the target node quantum key distribution equipment respectively;
the quantum key distribution equipment in the source node and the target node respectively decrypts to obtain new key values and stores the new key values locally and temporarily;
the quantum key distribution equipment in the source node and the quantum key distribution equipment in the target node both obtain corresponding new key values during initialization, the quantum key distribution equipment in the source node or the target node generates a second quantum random number, the second quantum random number is encrypted by using the new key values and is sent to the opposite party, the opposite party decrypts the second quantum random number to obtain a second quantum random number, and the second quantum random number is recorded as a first negotiation key between the two parties;
after initialization, each intermediate node forms a key pool entry for storing a historical relay key, and the entry comprises a source node, a target node, a peer node corresponding to the node and a historical relay key value.
3. A key distribution method based on a linear quantum key distribution network according to claim 2, wherein the second key agreement specifically comprises the steps of:
After initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the method comprises the steps that an active quantum key distribution device in an M-1 pair node takes out a first key value, generates a third quantum random number, encrypts the third quantum random number by using the first key value, sends the encrypted third quantum random number to a shared quantum key distribution device, simultaneously generates a new first negotiation key between an active node and a source node in the M-1 pair node, and sends the encrypted third quantum random number to the quantum key distribution device in the source node;
the quantum key distribution equipment in the source node decrypts to obtain a third quantum random number, namely a second negotiation key between the source node and the target node;
the sharing quantum key distribution equipment in the M-1 node receives the message and decrypts the message to obtain a third quantum random number, a new first negotiation key between the sharing node and the target node in the M-1 node is generated, and the encrypted third quantum random number is sent to the quantum key distribution equipment in the target node;
and decrypting by the quantum key distribution equipment in the target node to obtain a third quantum random number, namely a second negotiation key between the source node and the target node.
4. A key distribution method based on a linear quantum key distribution network according to claim 3, wherein the mth key agreement specifically comprises the steps of:
after initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the method comprises the steps that an active quantum key distribution device in a first pair of nodes takes out an initial negotiation key, generates an Mth+1st quantum random number, encrypts the Mth+1st quantum random number by using the initial negotiation key, sends the encrypted Mth+1st quantum random number to a shared quantum key distribution device in the first pair of nodes, simultaneously generates a new negotiation key between an active node in the first pair of nodes and an active node in a second pair of nodes, and sends the encrypted Mth+1st quantum random number to the active quantum key distribution device in the second pair of nodes;
the active quantum key distribution equipment in the second pair of nodes decrypts to obtain an Mth+1st quantum random number, the Mth+1st quantum random number is sent to the previous hop node step by step until the quantum key distribution equipment in the source node, and a new negotiation key between adjacent nodes is adopted between two adjacent nodes to encrypt and decrypt;
The quantum key distribution equipment in the source node decrypts to obtain an Mth+1st quantum random number, namely an Mth negotiation key between the source node and the target node;
the shared quantum key distribution equipment in the first pair of nodes receives the message and decrypts the message to obtain an Mth+1st quantum random number, the Mth+1st quantum random number is sent to the next hop node step by step until the quantum key distribution equipment in the target node, and a new negotiation key between adjacent nodes is adopted between the adjacent two nodes for encryption and decryption;
and decrypting by the quantum key distribution equipment in the target node to obtain an Mth+1th quantum random number, namely an Mth negotiation key between the source node and the target node.
5. The key distribution method based on a linear quantum key distribution network according to claim 4, wherein after the history relay key is used, its corresponding key pool entry is deleted and is not used any more.
6. A key distribution method based on a linear quantum key distribution network, characterized in that it is used for two parties of key requirement to be separated by an even number of trusted nodes, the method comprising the steps of:
setting n=2m as an even number of nodes, taking the middle two nodes to sequentially distribute keys to the left and right sides, taking the middle two nodes as a first pair of quantum key distribution devices, and the like, wherein the pair farthest from the middle two nodes is set as an Mth pair of quantum key distribution devices, namely a source node and a target node, 2 nodes in each pair of nodes are mutually called peer nodes, after the intermediate node performs one-time key relay distribution, each pair of quantum key distribution devices shares to obtain a pair of keys, called an mth pair of historical relay keys, wherein the mth pair of historical relay keys and the mth+1th pair of historical relay keys are respectively K m And K m+1 And the keys have the following relationship: k (K) m+1 =H(K m ) I.e. the m-th pair of quantum key distribution devices acquires the relay key K m Then, K is calculated first m+1 =H(K m ) Then carry out key K to the m+1th pair quantum key distribution device m+1 Is a relay distribution of (a);
first key agreement, both parties use historic relay key K M Acquiring a first pair of shared keys;
second key agreement, both parties use historic relay key K M-1 And the M-th to M-1-th pairs of quantum key distribution devices acquire a second pair of shared keys;
third key agreement, both parties use historic relay key K M-2 And the M-th to M-2-th pairs of quantum key distribution devices acquire a third pair of shared keys;
similarly, the Mth key agreement, both parties utilize the historical relay key K 1 And the mth to 1 st pair of quantum key distribution devices acquire the mth pair of shared keys.
7. The key distribution method based on a linear quantum key distribution network according to claim 6, wherein the first key agreement specifically comprises the steps of:
when initializing, the quantum key distribution equipment in the source node is utilized to transmit a request signal step by step to the last hop in the linear quantum key distribution network;
the key sharing quantum key distribution equipment in the first pair of nodes generates a first quantum random number, locally stores the first quantum random number temporarily, generates a negotiation key between the key sharing node in the first pair of nodes and the active node in the first pair of nodes, encrypts the first quantum random number and sends the first quantum random number to the active quantum key distribution equipment in the first pair of nodes;
The method comprises the steps that an active quantum key distribution device in a first pair of nodes decrypts to obtain a first quantum random number, the first quantum random number is recorded as an initial negotiation key and is stored locally and temporarily, the active quantum key distribution device in the first pair of nodes hashes the initial negotiation key to obtain a first key value, and generates the negotiation key with an active node in a second pair of nodes until a negotiation key between an active node in an M-2 pair of nodes and an active node in an M-1 pair of nodes is generated, and meanwhile, the corresponding key values are respectively encrypted and sent to the active quantum key distribution device in the second pair to the M-1 pair of nodes, and the sent key value is a new key value obtained by hashing the locally obtained key value;
the M-1 st pair of nodes is used for decrypting the active quantum key distribution equipment to obtain a corresponding key value, locally storing the key value, carrying out hash calculation on the key value to obtain a new key value, generating a negotiation key between the active node and the source node in the M-1 st pair of nodes, and encrypting and sending the new key value to the quantum key distribution equipment in the source node;
the quantum key distribution equipment in the source node decrypts to obtain a new key value and stores the new key value locally and temporarily;
the key sharing quantum key distribution equipment in the first pair of nodes carries out hash computation on the first quantum random number to obtain a first key value, generates a negotiation key with the key sharing node in the second pair of nodes until a negotiation key between the key sharing quantum key distribution equipment in the M-2 pair of nodes and the key sharing quantum key distribution equipment in the M-1 pair of nodes is generated, and simultaneously respectively encrypts and sends the corresponding key value to the key sharing quantum key distribution equipment in the second pair to the M-1 pair of nodes, wherein the sent key value is a new key value obtained by carrying out hash computation on the locally obtained key value;
The M-1 secret key sharing quantum key distribution equipment in the node decrypts to obtain a corresponding secret key value, locally stores the secret key value, performs hash calculation on the secret key value to obtain a new secret key value, simultaneously generates a negotiation secret key between the secret key sharing node in the M-1 node and the target node, and encrypts and sends the new secret key value to the quantum key distribution equipment in the target node;
the quantum key distribution equipment in the target node decrypts to obtain a new key value and stores the new key value locally and temporarily;
the quantum key distribution equipment in the source node and the quantum key distribution equipment in the target node both obtain corresponding new key values during initialization, the quantum key distribution equipment in the source node or the target node generates a second quantum random number, the second quantum random number is encrypted by using the new key values and is sent to the opposite party, the opposite party decrypts the second quantum random number to obtain a second quantum random number, and the second quantum random number is recorded as a first negotiation key between the two parties;
after initialization, each intermediate node forms a key pool entry for storing a historical relay key, and the entry comprises a source node, a target node, a peer node corresponding to the node and a historical relay key value.
8. The key distribution method based on a linear quantum key distribution network according to claim 7, wherein the second key agreement specifically comprises the steps of:
After initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the active quantum key distribution equipment in the M-1 pair node takes out the first key value, generates a third quantum random number, encrypts the third quantum random number by using the first key value, sends the third quantum random number to the key sharing quantum key distribution equipment in the M-1 pair node, simultaneously generates a new negotiation key between the active node and the source node in the M-1 pair node, and simultaneously encrypts and sends the third quantum random number to the quantum key distribution equipment in the source node;
the quantum key distribution equipment in the source node decrypts to obtain a third quantum random number, namely a second negotiation key between the source node and the target node;
the secret key sharing quantum key distribution equipment in the M-1 pair node receives the message and decrypts the message to obtain a third quantum random number, and meanwhile generates a negotiation secret key between the secret key sharing node in the M-1 pair node and the target node, and encrypts and sends the third quantum random number to the quantum key distribution equipment in the target node;
and decrypting by the quantum key distribution equipment in the target node to obtain a third quantum random number, namely a second negotiation key between the source node and the target node.
9. The key distribution method based on the linear quantum key distribution network according to claim 8, wherein the mth key agreement specifically comprises the steps of:
after initialization, the quantum key distribution equipment in the source node is utilized to send a request signal step by step to the last hop in the linear quantum key distribution network again;
the method comprises the steps that an active quantum key distribution device in a first pair of nodes takes out an initial negotiation key, generates an Mth+1st quantum random number, encrypts the Mth+1st quantum random number by using the initial negotiation key, sends the encrypted Mth+1st quantum random number to a key sharing quantum key distribution device in the first pair of nodes, simultaneously generates a new negotiation key between an active node in the first pair of nodes and an active node in a second pair of nodes, and sends the encrypted Mth+1st quantum random number to the active quantum key distribution device in the second pair of nodes;
the active quantum key distribution equipment in the second pair of nodes decrypts to obtain an Mth+1st quantum random number, the Mth+1st quantum random number is sent to the previous hop node step by step until the quantum key distribution equipment in the source node, and a new negotiation key between adjacent nodes is adopted between two adjacent nodes to encrypt and decrypt;
The quantum key distribution equipment in the source node decrypts to obtain an Mth+1st quantum random number, namely an Mth negotiation key between the source node and the target node;
the key sharing quantum key distribution equipment in the first pair of nodes receives the message and decrypts the message to obtain the M+1th quantum random number, a new negotiation key between the first pair of nodes and the key sharing node in the second pair of nodes is generated, and the encrypted M+1th quantum random number is sent to the key sharing quantum key distribution equipment in the second pair of nodes;
decrypting the key sharing quantum key distribution equipment in the second pair of nodes to obtain an Mth+1st quantum random number, progressively sending the Mth+1st quantum random number to the next hop node until the quantum key distribution equipment in the target node, and encrypting and decrypting the two adjacent nodes by adopting a new negotiation key between the adjacent nodes;
and decrypting by the quantum key distribution equipment in the target node to obtain an Mth+1th quantum random number, namely an Mth negotiation key between the source node and the target node.
10. A key distribution method based on a linear quantum key distribution network according to claim 9, wherein after the history relay key is used, its corresponding key pool entry is deleted and is not used any more.
CN202011370428.7A 2020-11-30 2020-11-30 Key distribution method based on linear quantum key distribution network Active CN114584288B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011370428.7A CN114584288B (en) 2020-11-30 2020-11-30 Key distribution method based on linear quantum key distribution network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011370428.7A CN114584288B (en) 2020-11-30 2020-11-30 Key distribution method based on linear quantum key distribution network

Publications (2)

Publication Number Publication Date
CN114584288A CN114584288A (en) 2022-06-03
CN114584288B true CN114584288B (en) 2023-09-26

Family

ID=81768127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011370428.7A Active CN114584288B (en) 2020-11-30 2020-11-30 Key distribution method based on linear quantum key distribution network

Country Status (1)

Country Link
CN (1) CN114584288B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108023725A (en) * 2016-11-04 2018-05-11 华为技术有限公司 A kind of quantum key trunking method and device based on centralized management with control network
CN109995511A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of mobile secret communication method based on quantum key distribution network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2581528B (en) * 2019-02-22 2022-05-18 Toshiba Kk A method, a communication network and a node for exchanging a cryptographic key
US11411722B2 (en) * 2019-05-03 2022-08-09 Quantumxchange, Inc. Method of operation of a quantum key controller

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108023725A (en) * 2016-11-04 2018-05-11 华为技术有限公司 A kind of quantum key trunking method and device based on centralized management with control network
CN109995511A (en) * 2017-12-29 2019-07-09 成都零光量子科技有限公司 A kind of mobile secret communication method based on quantum key distribution network

Also Published As

Publication number Publication date
CN114584288A (en) 2022-06-03

Similar Documents

Publication Publication Date Title
EP2555466B1 (en) System for distributing cryptographic keys
US7181011B2 (en) Key bank systems and methods for QKD
US8639927B2 (en) Method of user-authenticated quantum key distribution
US7814320B2 (en) Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks
US20240048371A1 (en) Secure relay-based quantum communication method and communication network
WO2004030270A1 (en) Cryptographic communication apparatus
CN104468612A (en) Privacy protection type attribute matching method based on symmetrical encryption
Li et al. A quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation
Charjan et al. Quantum Key Distribution by Exploitation Public Key Cryptography (ECC) in Resource Constrained Devices
Athulya et al. Security in mobile ad-hoc networks
CN114584288B (en) Key distribution method based on linear quantum key distribution network
Li et al. Deterministic quantum secure direct communication protocol based on hyper-entangled state
Wang et al. Authentication of quantum key distribution with post-quantum cryptography and replay attacks
CN114268432B (en) Device-independent quantum secure direct communication method based on single photon source
WO2023078639A1 (en) Quantum-secured communication
CN114401085A (en) Network architecture of quantum secret communication network and key storage method
CN114338000B (en) Quantum key distribution method and network based on hierarchical structure
Wijesekera et al. Quantum cryptography based key distribution in Wi-Fi networks-Protocol modifications in IEEE 802.11
Lin et al. Authenticated multi-user quantum key distribution with single particles
Jin et al. Fast convergent key distribution algorithms using a dual quantum channel
US11991269B1 (en) System and method for distribution of key generation data in a secure network
Goswami et al. A secured quantum key exchange algorithm using fermat numbers and DNA encoding
Wang et al. Deterministic secure quantum communication against collective noise
Jayaraman et al. Quantum Cryptography And Quantum Key Distribution
Guan A Lightweight Key Agreement Protocol with Authentication Capability

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant