CN115801257A - Quantum encryption-based big data secure transmission method - Google Patents

Quantum encryption-based big data secure transmission method Download PDF

Info

Publication number
CN115801257A
CN115801257A CN202310102593.1A CN202310102593A CN115801257A CN 115801257 A CN115801257 A CN 115801257A CN 202310102593 A CN202310102593 A CN 202310102593A CN 115801257 A CN115801257 A CN 115801257A
Authority
CN
China
Prior art keywords
big data
transmitted
quantum
basic
quantum key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310102593.1A
Other languages
Chinese (zh)
Other versions
CN115801257B (en
Inventor
汤智彬
邓超河
植挺生
许超
邹晟
刘勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Guangyu Technology Development Co Ltd
Original Assignee
Guangdong Guangyu Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Guangyu Technology Development Co Ltd filed Critical Guangdong Guangyu Technology Development Co Ltd
Priority to CN202310102593.1A priority Critical patent/CN115801257B/en
Publication of CN115801257A publication Critical patent/CN115801257A/en
Application granted granted Critical
Publication of CN115801257B publication Critical patent/CN115801257B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)
  • Optical Communication System (AREA)

Abstract

The invention relates to the field of big data secure transmission, in particular to a big data secure transmission method based on quantum encryption, which comprises the following steps: generating a basic quantum random number by using a quantum random number generator; dividing the basic quantum random number to obtain a basic quantum key; encrypting the big data to be transmitted by using the basic quantum key to obtain encrypted big data to be transmitted; the encrypted big data to be transmitted are utilized to carry out safe transmission processing, the quantum key is established by utilizing the true randomness of the quantum random number, even if leakage exists in the transmission process, the obtained quantum random number or the encrypted data still cannot be decrypted, other quantum keys cannot be deduced through the intercepted quantum random number or the encrypted data, the safety of big data transmission is greatly improved, a verification mode is provided by means of adding a time tag in the way of combining the big data in different servers in a segmented mode, and the method has good application to the integrity of the big data.

Description

Quantum encryption-based big data secure transmission method
Technical Field
The invention relates to the field of safe transmission of big data, in particular to a safe transmission method of big data based on quantum encryption.
Background
With the continuous development of science and technology, big data is gradually applied to more and more extensive fields, but the problems therewith are also gradually increased, the security of big data transmission at different ports becomes the central importance of big data transmission, and how to ensure the integrity of big data in the transmission process and the indecipherability after leakage becomes the problem which needs to be solved urgently today.
Quantum random is used as a new field, and the property of true random and irrecoverable after being intercepted becomes an important means of data encryption, so how to combine quantum random encryption with big data secure transmission and ensure transmission efficiency, and therefore, a feasible method for applying quantum encryption to the field of big data transmission is urgently needed.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a quantum encryption-based big data secure transmission method, which is used for encrypting the big data in a segmented manner based on the characteristic of quantum random number, so that the transmission security is ensured, and the integrity of the associated big data is improved.
In order to achieve the above object, the present invention provides a method for secure transmission of big data based on quantum cryptography, comprising:
generating a basic quantum random number by using a quantum random number generator;
dividing the basic quantum random number to obtain a basic quantum key;
encrypting the big data to be transmitted by using the basic quantum key to obtain encrypted big data to be transmitted;
and carrying out safe transmission processing by utilizing the encrypted big data to be transmitted.
Preferably, the generating of the base quantum random number using the quantum random number generator includes:
obtaining an initial quantum random number according to the generation time by using a quantum random number generator;
obtaining a generation time label by using the generation time;
and using the initial quantum random number and the generated time label as basic quantum random numbers.
Preferably, the obtaining the basic quantum key by performing the partition processing by using the basic quantum random number includes:
carrying out division processing according to division time by using the initial quantum random number of the basic quantum random number to obtain an initial quantum key;
using the dividing time as a dividing time label;
and using the initial quantum key and the division time label as a basic quantum key.
Preferably, the encrypting the big data to be transmitted by using the basic quantum key to obtain the encrypted big data to be transmitted includes:
carrying out segmentation processing by utilizing the big data to be transmitted to obtain segmented big data to be transmitted;
judging whether the quantity of the segmented big data to be transmitted is smaller than that of the basic quantum key or not, if so, performing first encryption on the segmented big data to be transmitted by using the basic quantum key to obtain first encrypted big data to be transmitted, and if not, performing second encryption processing on the segmented big data to be transmitted by using the basic quantum key to obtain second encrypted big data to be transmitted;
utilizing the first encrypted big data to be transmitted and the second encrypted big data to be transmitted as encrypted big data to be transmitted;
the quantity of the segmented big data to be transmitted is the number of the segmented segments of the big data to be transmitted.
Further, the obtaining of the first encrypted big data to be transmitted by performing the first encryption on the segmented big data to be transmitted by using the basic quantum key includes:
and when the basic quantum key is used for completing encryption processing on the segmented big data to be transmitted to obtain first encrypted big data to be transmitted, using the residual basic quantum key as a spare basic quantum key.
Further, performing a second encryption process on the segmented big data to be transmitted by using the basic quantum key to obtain second encrypted big data to be transmitted includes:
and when the number of the basic quantum keys is smaller than that of the segmented big data to be transmitted, judging whether the basic quantum keys correspond to the basic quantum keys at the previous adjacent moment or not, if so, utilizing the basic quantum keys at the previous adjacent moment to supplement the basic quantum keys at the current moment, then carrying out encryption processing to obtain second encrypted big data to be transmitted, otherwise, utilizing a quantum random number generator to generate a supplement quantum random number according to the corresponding moment of the current basic quantum keys and carrying out encryption processing to obtain the second encrypted big data to be transmitted.
Further, the generating, by using the quantum random number generator, the supplemental quantum random number according to the current basic quantum key at the corresponding moment, and performing encryption processing to obtain the second encrypted big data to be transmitted includes:
generating a supplementary quantum random number by using a quantum random number generator according to the corresponding moment of the current basic quantum key;
using the corresponding moment of the current basic quantum key as a supplementary moment label;
the complementary quantum random number and the complementary time label are used as a complementary quantum key;
and after the supplementary quantum key is used for supplementing the basic quantum key at the current moment, encryption processing is carried out to obtain second encrypted big data to be transmitted.
Preferably, the processing of performing secure transmission by using the encrypted big data to be transmitted includes:
establishing a connection relation between a sending terminal server and a receiving terminal server;
when the sending end server has encrypted big data to be transmitted, judging whether the encrypted big data to be transmitted has a single basic quantum random number or not, if so, completing transmission processing based on a first transmission rule, otherwise, completing transmission processing based on a second transmission rule;
when transmission processing is finished and the receiving end server has encrypted big data to be transmitted, acquiring the division time corresponding to the encrypted big data to be transmitted;
and finishing safe transmission processing in a receiving end server by utilizing the division time corresponding to the encrypted big data to be transmitted.
Further, the step of completing the safe transmission processing in the receiving end server by using the division time corresponding to the encrypted big data to be transmitted includes:
judging whether a plurality of quantum random numbers corresponding to the same moment exist in the receiving end server, if so, acquiring a basic quantum key and a supplementary quantum key by using the division moment corresponding to the encrypted big data to be transmitted, and otherwise, acquiring the basic quantum key by using the division moment corresponding to the encrypted big data to be transmitted;
and completing safe transmission processing in a receiving end server according to the basic quantum key and the supplementary quantum key.
Further, the process of completing the secure transmission in the receiving end server according to the basic quantum key and the supplemental quantum key includes:
when a basic quantum key and a supplementary quantum key exist in the receiving end server, judging whether a generation moment tag of the basic quantum key is the same as a supplementary moment tag of the supplementary quantum key, if so, decrypting encrypted big data to be transmitted in the receiving end server by using the basic quantum key and the supplementary quantum key to complete safe transmission processing, and if not, giving up processing;
when only a basic quantum key exists in the receiving end server, judging whether the basic quantum key is a single-moment quantum key or not, if so, decrypting the encrypted big data to be transmitted by using the basic quantum key to obtain decrypted data to be transmitted and complete safe transmission processing, and otherwise, verifying the basic quantum key of the decrypted data to be transmitted at the adjacent previous moment to obtain a non-single-moment key safety verification result;
and performing decryption processing by using the security verification result of the key at the non-single moment to finish security transmission processing.
Compared with the closest prior art, the invention has the following beneficial effects:
the quantum key is established by utilizing the true randomness of the quantum random number, and the quantum key is classified according to different moments, so that the independence of large data transmission at different moments is ensured, even if leakage exists in the transmission process, the obtained quantum random number or encrypted data can not be decrypted, other quantum keys can not be deduced through the intercepted quantum random number or encrypted data, the safety of large data transmission is greatly improved, a verification mode is provided for large data segmentation combination in different servers by adding a time tag, and the method has better application to the integrity of the large data.
Drawings
Fig. 1 is a flow chart of a quantum encryption-based big data secure transmission method provided by the invention.
Detailed Description
The following describes embodiments of the present invention in further detail with reference to the accompanying drawings.
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. :
example 1: the invention provides a quantum encryption-based big data secure transmission method, as shown in fig. 1, comprising:
s1, generating a basic quantum random number by using a quantum random number generator;
s2, dividing the basic quantum random number to obtain a basic quantum key;
s3, encrypting the big data to be transmitted by using the basic quantum key to obtain the encrypted big data to be transmitted;
and S4, carrying out safe transmission processing by using the encrypted big data to be transmitted.
In this embodiment, a quantum encryption-based big data secure transmission method is a scheme in which a quantum random number generator implements key distribution by using a single quantum unclonable theorem, and the quantum random number generator complies with the BB84 protocol.
S1 specifically comprises the following steps:
s1-1, obtaining an initial quantum random number according to the generation time by using a quantum random number generator;
s1-2, obtaining a generation time label by using the generation time;
and S1-3, using the initial quantum random number and the generation time label as basic quantum random numbers.
S2 specifically comprises the following steps:
s2-1, carrying out division processing according to division time by using the initial quantum random number of the basic quantum random number to obtain an initial quantum key;
s2-2, using the division time as a division time label;
and S2-3, using the initial quantum key and the division time label as a basic quantum key.
S3 specifically comprises the following steps:
s3-1, carrying out segmentation processing by utilizing the big data to be transmitted to obtain segmented big data to be transmitted;
s3-2, judging whether the quantity of the segmented big data to be transmitted is smaller than that of the basic quantum key, if so, performing first encryption on the segmented big data to be transmitted by using the basic quantum key to obtain first encrypted big data to be transmitted, and if not, performing second encryption processing on the segmented big data to be transmitted by using the basic quantum key to obtain second encrypted big data to be transmitted;
s3-3, using the first encrypted big data to be transmitted and the second encrypted big data to be transmitted as encrypted big data to be transmitted;
the quantity of the segmented big data to be transmitted is the number of the segmented segments of the big data to be transmitted.
S3-2 specifically comprises:
and S3-2-1, when the basic quantum key is used for completing encryption processing on the segmented big data to be transmitted to obtain first encrypted big data to be transmitted, using the rest basic quantum key as a spare basic quantum key.
S3-2-2, when the number of the basic quantum keys is smaller than that of the segmented big data to be transmitted, judging whether the basic quantum keys correspond to the basic quantum keys at the previous adjacent moment or not, if so, performing encryption processing to obtain second encrypted big data to be transmitted after the basic quantum keys at the previous adjacent moment are supplemented by the basic quantum keys at the current moment, and otherwise, generating supplementary quantum random numbers by a quantum random number generator according to the corresponding moments of the current basic quantum keys to perform encryption processing to obtain the second encrypted big data to be transmitted.
In this embodiment, a quantum encryption-based big data secure transmission method determines whether the basic quantum key has a definition corresponding to the basic quantum key at the previous neighboring time as an unused basic quantum key at the previous neighboring time.
S3-2-2 specifically comprises:
s3-2-2-1, generating a supplementary quantum random number by using a quantum random number generator according to the corresponding moment of the current basic quantum key;
s3-2-2-2, utilizing the corresponding moment of the current basic quantum key as a supplementary moment label;
s3-2-2-3, using the complementary quantum random number and the complementary time tag as a complementary quantum key;
and S3-2-2-4, after the complementary quantum key is used for complementing the basic quantum key at the current moment, encryption processing is carried out to obtain second encrypted big data to be transmitted.
S4 specifically comprises the following steps:
s4-1, establishing a connection relation between a sending end server and a receiving end server;
s4-2, when the sending end server has the encrypted big data to be transmitted, judging whether the encrypted big data to be transmitted has a single basic quantum random number, if so, completing transmission processing based on a first transmission rule, and if not, completing transmission processing based on a second transmission rule;
s4-3, when the transmission processing is finished and the receiving end server has the encrypted big data to be transmitted, obtaining the division time corresponding to the encrypted big data to be transmitted;
and S4-4, completing safe transmission processing in a receiving end server by utilizing the division time corresponding to the encrypted big data to be transmitted.
In the embodiment, a quantum encryption-based big data secure transmission method includes that a quantum random number is transmitted first, then encrypted big data to be transmitted is transmitted, a quantum random number at the current moment is transmitted first, then encrypted big data to be transmitted is transmitted, and finally quantum random numbers corresponding to other quantum keys are transmitted.
S4-4 specifically comprises:
s4-4-1, judging whether a plurality of quantum random numbers corresponding to the same moment exist in the receiving end server, if so, acquiring a basic quantum key and a supplementary quantum key by using the division moment corresponding to the encrypted big data to be transmitted, and otherwise, acquiring the basic quantum key by using the division moment corresponding to the encrypted big data to be transmitted;
and S4-4-2, completing safe transmission processing in a receiving end server according to the basic quantum key and the supplementary quantum key.
S4-4-2 specifically comprises:
s4-4-2-1, when a basic quantum key and a complementary quantum key exist in the receiving end server, judging whether a generation moment tag of the basic quantum key is the same as a complementary moment tag of the complementary quantum key, if so, decrypting the encrypted big data to be transmitted in the receiving end server by using the basic quantum key and the complementary quantum key to complete safe transmission processing, and if not, giving up processing;
s4-4-2-2, when only a basic quantum key exists in the receiving end server, judging whether the basic quantum key is a single-moment quantum key or not, if so, decrypting the encrypted big data to be transmitted by using the basic quantum key to obtain decrypted data to be transmitted and complete safe transmission processing, and if not, verifying the basic quantum key of the decrypted data to be transmitted at the adjacent previous moment to obtain a non-single-moment key safety verification result;
and S4-4-2-3, performing decryption processing by using the non-single-moment key security verification result to complete security transmission processing.
In this embodiment, a quantum encryption-based big data secure transmission method assembles decrypted segmented big data according to a time tag in a receiving end server to complete restoration of the decrypted big data.
In this embodiment, when only a basic quantum key at a single moment exists, the number of the segment segments of the big data to be transmitted is the same as the number of the basic quantum key, and when a basic quantum key at multiple moments exists, the number of the segment segments of the big data to be transmitted is equal to the sum of the number of the basic quantum keys at the current moment and the number of the complementary quantum keys.
In this embodiment, a method for securely transmitting big data based on quantum cryptography, where the obtaining of a non-single-time key security verification result by performing verification processing using a basic quantum key of to-be-transmitted decrypted data at an adjacent previous time includes: and combining the key at the previous moment adjacent to the current moment for encryption with the key at the previous moment adjacent to the last moment after transmission to obtain a complete basic quantum key at the previous moment adjacent to the previous moment, verifying whether the basic quantum random number at the previous moment adjacent to the basic quantum key at the previous moment completely corresponds to the basic quantum key at the previous moment to obtain a verification result, performing the next step when the verification result corresponds to the basic quantum random number, determining that the risk of leakage or interception exists when the verification result does not correspond to the basic quantum key at the previous moment, and giving up the processing.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.

Claims (10)

1. A big data secure transmission method based on quantum encryption is characterized by comprising the following steps:
generating a basic quantum random number by using a quantum random number generator;
dividing the basic quantum random number to obtain a basic quantum key;
encrypting the big data to be transmitted by using the basic quantum key to obtain encrypted big data to be transmitted;
and carrying out safe transmission processing by utilizing the encrypted big data to be transmitted.
2. The method for safely transmitting big data based on quantum cryptography according to claim 1, wherein the generating of the basic quantum random number by the quantum random number generator comprises:
obtaining an initial quantum random number according to the generation time by using a quantum random number generator;
obtaining a generation time label by using the generation time;
and utilizing the initial quantum random number and the generated time label as basic quantum random numbers.
3. The method for secure transmission of big data based on quantum cryptography according to claim 1, wherein said partitioning with said fundamental quantum random number to obtain a fundamental quantum key comprises:
dividing the initial quantum random number of the basic quantum random number according to the dividing time to obtain an initial quantum key;
using the dividing time as a dividing time label;
and using the initial quantum key and the division time label as a basic quantum key.
4. The quantum encryption-based big data secure transmission method as claimed in claim 1, wherein encrypting the big data to be transmitted by using the basic quantum key to obtain the encrypted big data to be transmitted comprises:
carrying out segmentation processing by utilizing the big data to be transmitted to obtain segmented big data to be transmitted;
judging whether the quantity of the segmented big data to be transmitted is smaller than that of the basic quantum key or not, if so, performing first encryption on the segmented big data to be transmitted by using the basic quantum key to obtain first encrypted big data to be transmitted, and if not, performing second encryption processing on the segmented big data to be transmitted by using the basic quantum key to obtain second encrypted big data to be transmitted;
utilizing the first encrypted big data to be transmitted and the second encrypted big data to be transmitted as encrypted big data to be transmitted;
the quantity of the segmented big data to be transmitted is the number of the segmented segments of the big data to be transmitted.
5. The quantum encryption-based big data secure transmission method of claim 4, wherein the first encryption of the segmented big data to be transmitted by using the basic quantum key to obtain the first encrypted big data to be transmitted comprises:
and when the basic quantum key is used for completing encryption processing on the segmented big data to be transmitted to obtain first encrypted big data to be transmitted, using the residual basic quantum key as a standby basic quantum key.
6. The method for safely transmitting big data based on quantum cryptography according to claim 4, wherein the second encryption processing of the segmented big data to be transmitted by using the basic quantum key to obtain the second encrypted big data to be transmitted comprises:
and when the number of the basic quantum keys is smaller than that of the segmented big data to be transmitted, judging whether the basic quantum keys correspond to the basic quantum keys at the previous adjacent moment or not, if so, utilizing the basic quantum keys at the previous adjacent moment to supplement the basic quantum keys at the current moment, then carrying out encryption processing to obtain second encrypted big data to be transmitted, otherwise, utilizing a quantum random number generator to generate a supplement quantum random number according to the corresponding moment of the current basic quantum keys and carrying out encryption processing to obtain the second encrypted big data to be transmitted.
7. The method for safely transmitting big data based on quantum cryptography according to claim 6, wherein the step of generating a supplementary quantum random number by using a quantum random number generator according to the current basic quantum key at the corresponding moment to perform the cryptographic processing to obtain the second encrypted big data to be transmitted comprises the steps of:
generating a supplementary quantum random number by using a quantum random number generator according to the corresponding moment of the current basic quantum key;
using the corresponding moment of the current basic quantum key as a supplementary moment label;
the complementary quantum random number and the complementary time label are used as a complementary quantum key;
and after the supplementary quantum key is used for supplementing the basic quantum key at the current moment, encryption processing is carried out to obtain second encrypted big data to be transmitted.
8. The big data secure transmission method based on quantum cryptography according to claim 1, wherein the secure transmission processing by using the encrypted big data to be transmitted comprises:
establishing a connection relation between a sending end server and a receiving end server;
when the sending end server has the encrypted big data to be transmitted, judging whether the encrypted big data to be transmitted has a single basic quantum random number or not, if so, completing transmission processing based on a first transmission rule, otherwise, completing transmission processing based on a second transmission rule;
when transmission processing is finished and the receiving end server has encrypted big data to be transmitted, acquiring the division time corresponding to the encrypted big data to be transmitted;
and finishing safe transmission processing in a receiving end server by utilizing the division time corresponding to the encrypted big data to be transmitted.
9. The method for securely transmitting big data based on quantum cryptography according to claim 8, wherein the step of completing the secure transmission process in the receiving end server by using the division time corresponding to the encrypted big data to be transmitted comprises:
judging whether a plurality of quantum random numbers corresponding to the same moment exist in the receiving end server, if so, acquiring a basic quantum key and a supplementary quantum key by using the division moment corresponding to the encrypted big data to be transmitted, otherwise, acquiring the basic quantum key by using the division moment corresponding to the encrypted big data to be transmitted;
and completing safe transmission processing in a receiving end server according to the basic quantum key and the supplementary quantum key.
10. The method for securely transmitting big data based on quantum cryptography according to claim 9, wherein the performing of the secure transmission process in the receiving end server according to the basic quantum key and the supplemental quantum key comprises:
when a basic quantum key and a supplementary quantum key exist in the receiving end server, judging whether a generation moment tag of the basic quantum key is the same as a supplementary moment tag of the supplementary quantum key, if so, decrypting encrypted big data to be transmitted in the receiving end server by using the basic quantum key and the supplementary quantum key to complete safe transmission processing, and if not, giving up processing;
when only a basic quantum key exists in the receiving end server, judging whether the basic quantum key is a single-moment quantum key or not, if so, decrypting the encrypted big data to be transmitted by using the basic quantum key to obtain decrypted data to be transmitted and completing safe transmission processing, and otherwise, verifying by using the basic quantum key of the decrypted data to be transmitted at the adjacent previous moment to obtain a non-single-moment key safety verification result;
and performing decryption processing by using the security verification result of the key at the non-single moment to finish security transmission processing.
CN202310102593.1A 2023-02-13 2023-02-13 Big data secure transmission method based on quantum encryption Active CN115801257B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310102593.1A CN115801257B (en) 2023-02-13 2023-02-13 Big data secure transmission method based on quantum encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310102593.1A CN115801257B (en) 2023-02-13 2023-02-13 Big data secure transmission method based on quantum encryption

Publications (2)

Publication Number Publication Date
CN115801257A true CN115801257A (en) 2023-03-14
CN115801257B CN115801257B (en) 2023-05-05

Family

ID=85430890

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310102593.1A Active CN115801257B (en) 2023-02-13 2023-02-13 Big data secure transmission method based on quantum encryption

Country Status (1)

Country Link
CN (1) CN115801257B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116089989A (en) * 2023-04-10 2023-05-09 广东广宇科技发展有限公司 Data iterative encryption processing method for offline data terminal
CN116192388A (en) * 2023-04-26 2023-05-30 广东广宇科技发展有限公司 Mixed key encryption processing method based on digital fingerprint
CN116232762A (en) * 2023-05-05 2023-06-06 广东广宇科技发展有限公司 Encryption data transmission method based on quantum key
CN116319097A (en) * 2023-05-19 2023-06-23 广东广宇科技发展有限公司 Multi-node data transmission method based on quantum encryption
CN117544308A (en) * 2024-01-09 2024-02-09 广东广宇科技发展有限公司 Quantum key-based data transmission verification method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110611572A (en) * 2019-10-30 2019-12-24 江苏亨通问天量子信息研究院有限公司 Asymmetric password terminal based on quantum random number, communication system and method
CN112068803A (en) * 2020-08-07 2020-12-11 西藏民族大学 Quantum pseudo-random number generation method and generation system
CN112398651A (en) * 2021-01-12 2021-02-23 南京易科腾信息技术有限公司 Quantum secret communication method and device, electronic equipment and storage medium
CN112910644A (en) * 2021-03-29 2021-06-04 安徽华典大数据科技有限公司 Security authentication system based on quantum secret data
CN113536362A (en) * 2021-09-16 2021-10-22 中科问天量子科技(天津)有限公司 Quantum key management method and system based on security chip carrier
CN113890735A (en) * 2021-11-10 2022-01-04 天宇鸿图应用技术研究院(重庆)有限公司 Large prime number multiplication symmetrical encryption method based on quantum key distribution
CN114020241A (en) * 2021-11-10 2022-02-08 天宇鸿图应用技术研究院(重庆)有限公司 RSA password large prime number generation method based on quantum true random number generator
CN114679262A (en) * 2021-12-31 2022-06-28 广东国腾量子科技有限公司 Quantum key distribution system and method fusing asymmetric system
CN115442163A (en) * 2022-11-08 2022-12-06 广东广宇科技发展有限公司 Big data one-way encryption transmission method based on asymmetric algorithm
CN115473638A (en) * 2022-09-09 2022-12-13 国开启科量子技术(北京)有限公司 Quantum key encryption and decryption methods and systems

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110611572A (en) * 2019-10-30 2019-12-24 江苏亨通问天量子信息研究院有限公司 Asymmetric password terminal based on quantum random number, communication system and method
CN112068803A (en) * 2020-08-07 2020-12-11 西藏民族大学 Quantum pseudo-random number generation method and generation system
CN112398651A (en) * 2021-01-12 2021-02-23 南京易科腾信息技术有限公司 Quantum secret communication method and device, electronic equipment and storage medium
CN112910644A (en) * 2021-03-29 2021-06-04 安徽华典大数据科技有限公司 Security authentication system based on quantum secret data
CN113536362A (en) * 2021-09-16 2021-10-22 中科问天量子科技(天津)有限公司 Quantum key management method and system based on security chip carrier
CN113890735A (en) * 2021-11-10 2022-01-04 天宇鸿图应用技术研究院(重庆)有限公司 Large prime number multiplication symmetrical encryption method based on quantum key distribution
CN114020241A (en) * 2021-11-10 2022-02-08 天宇鸿图应用技术研究院(重庆)有限公司 RSA password large prime number generation method based on quantum true random number generator
CN114679262A (en) * 2021-12-31 2022-06-28 广东国腾量子科技有限公司 Quantum key distribution system and method fusing asymmetric system
CN115473638A (en) * 2022-09-09 2022-12-13 国开启科量子技术(北京)有限公司 Quantum key encryption and decryption methods and systems
CN115442163A (en) * 2022-11-08 2022-12-06 广东广宇科技发展有限公司 Big data one-way encryption transmission method based on asymmetric algorithm

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116089989A (en) * 2023-04-10 2023-05-09 广东广宇科技发展有限公司 Data iterative encryption processing method for offline data terminal
CN116089989B (en) * 2023-04-10 2023-08-01 广东广宇科技发展有限公司 Data iterative encryption processing method for offline data terminal
CN116192388A (en) * 2023-04-26 2023-05-30 广东广宇科技发展有限公司 Mixed key encryption processing method based on digital fingerprint
CN116192388B (en) * 2023-04-26 2023-08-01 广东广宇科技发展有限公司 Mixed key encryption processing method based on digital fingerprint
CN116232762A (en) * 2023-05-05 2023-06-06 广东广宇科技发展有限公司 Encryption data transmission method based on quantum key
CN116319097A (en) * 2023-05-19 2023-06-23 广东广宇科技发展有限公司 Multi-node data transmission method based on quantum encryption
CN116319097B (en) * 2023-05-19 2023-09-22 广东广宇科技发展有限公司 Multi-node data transmission method based on quantum encryption
CN117544308A (en) * 2024-01-09 2024-02-09 广东广宇科技发展有限公司 Quantum key-based data transmission verification method
CN117544308B (en) * 2024-01-09 2024-04-19 广东广宇科技发展有限公司 Quantum key-based data transmission verification method

Also Published As

Publication number Publication date
CN115801257B (en) 2023-05-05

Similar Documents

Publication Publication Date Title
CN115801257B (en) Big data secure transmission method based on quantum encryption
CN109246098B (en) Method for supporting comparison of synchronous ciphertext of backup server
CN105450620A (en) Information processing method and device
CN115913553B (en) Data encryption method based on nonlinear mapping
CN103795534A (en) Password-based authentication method and apparatus executing the method
CN115442163B (en) Big data one-way encryption transmission method based on asymmetric algorithm
CN113271209B (en) Trustable public key encryption system and method based on non-interactive zero-knowledge proof
CN105184181B (en) File encryption method, file decryption method and file encryption device
CN110430053B (en) Quantum key distribution method, device and system
CN116232762B (en) Encryption data transmission method based on quantum key
CN109005184A (en) File encrypting method and device, storage medium, terminal
CN110460436A (en) Hardware device key management method, system, storage medium and computer equipment
CN117278339B (en) Data independent transmission verification method based on bidirectional synchronous key pool
CN113645235A (en) Distributed data encryption and decryption system and encryption and decryption method
CN112532387B (en) Key service operation system and method thereof
CN113326518A (en) Data processing method and device
CN116318687B (en) Data dynamic encryption method based on bidirectional mapping matrix
CN113079015A (en) Electric power data anti-counterfeiting encryption verification method and system
CN100544248C (en) The key data receiving/transmission method
CN114154185A (en) Data encryption storage method based on national cryptographic algorithm
CN117544308B (en) Quantum key-based data transmission verification method
CN116506121B (en) Quantum key distribution method
CN116633702B (en) Data transmission method based on symmetric encryption
CN113676462B (en) Key distribution and decryption method, device, equipment and medium
CN111064753B (en) One-Time Pad-based password manager implementation method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant