CN117278339B - Data independent transmission verification method based on bidirectional synchronous key pool - Google Patents

Data independent transmission verification method based on bidirectional synchronous key pool Download PDF

Info

Publication number
CN117278339B
CN117278339B CN202311569776.0A CN202311569776A CN117278339B CN 117278339 B CN117278339 B CN 117278339B CN 202311569776 A CN202311569776 A CN 202311569776A CN 117278339 B CN117278339 B CN 117278339B
Authority
CN
China
Prior art keywords
data
processed
verification
encryption
key pool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202311569776.0A
Other languages
Chinese (zh)
Other versions
CN117278339A (en
Inventor
汤智彬
邹晟
许超
刘勇
赵尚谦
庄广壬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Guangyu Technology Development Co Ltd
Original Assignee
Guangdong Guangyu Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Guangyu Technology Development Co Ltd filed Critical Guangdong Guangyu Technology Development Co Ltd
Priority to CN202311569776.0A priority Critical patent/CN117278339B/en
Publication of CN117278339A publication Critical patent/CN117278339A/en
Application granted granted Critical
Publication of CN117278339B publication Critical patent/CN117278339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Abstract

The invention relates to the field of data transmission verification, in particular to a data independent transmission verification method based on a bidirectional synchronous key pool, which comprises the following steps: s1, establishing a bidirectional synchronous key pool by utilizing quantum random numbers; s2, transmitting the data to be processed by using the bidirectional synchronous key pool to obtain data preparation data to be processed; s3, independent transmission verification is completed based on a bidirectional synchronous key pool by utilizing the data to be processed to prepare data, a quantum key is combined with data transmission encryption verification, a bidirectional independent key pool is arranged, mapping is correspondingly established, encryption and verification basis of the same data are guaranteed to be highly compatible, operation confusion caused by key cross use is avoided, the independent encryption and verification process can resume progress at any time or position the problem when the problem occurs or the process needs to be suspended, a complete logic closed loop provides guarantee for data transmission, and the final purpose can be achieved through self circulation when part of data transmission or correspondence is not achieved.

Description

Data independent transmission verification method based on bidirectional synchronous key pool
Technical Field
The invention relates to the field of data transmission verification, in particular to a data independent transmission verification method based on a bidirectional synchronous key pool.
Background
Along with the continuous progress of technology, the variety and quantity of data transmission are continuously increasing, and various means such as encryption are involved, so that the balance between encryption verification and transmission efficiency is guaranteed, and meanwhile, the mutual interference between encryption and verification is reduced as much as possible, which is a problem to be solved in daily work.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data independent transmission verification method based on a bidirectional synchronous key pool, which ensures the anti-interference performance among steps and improves the transmission verification effect through the mutually independent operation of encryption transmission and verification rechecking.
In order to achieve the above object, the present invention provides a data independent transmission verification method based on a bidirectional synchronous key pool, including:
s1, establishing a bidirectional synchronous key pool by utilizing quantum random numbers;
s2, transmitting the data to be processed by using the bidirectional synchronous key pool to obtain data preparation data to be processed;
and S3, completing independent transmission verification based on a bidirectional synchronous key pool by utilizing the data preparation data to be processed.
Preferably, the establishing the bidirectional synchronous key pool by using the quantum random number includes:
s1-1, respectively obtaining a first quantum random number and a second quantum random number by using a quantum random number generator;
s1-2, acquiring a hardware identifier of a transmitting end as a basic quantum key division number;
s1-3, establishing an encryption quantum key pool according to a basic quantum key division number by utilizing the first quantum random number;
s1-4, establishing a verification quantum key pool according to a basic quantum key division number by utilizing the second quantum random number;
s1-5, obtaining a bidirectional synchronous key pool by utilizing the encryption quantum key pool and the verification quantum key pool;
the first quantum random number and the second quantum random number are mutually independent.
Further, obtaining the bidirectional synchronization key pool by using the encryption quantum key pool and the verification quantum key pool comprises:
establishing a key-quantity mapping by utilizing the number of the encrypted quantum key in the encrypted quantum key pool and the number of the basic quantum key;
establishing key-time mapping by utilizing the dividing time corresponding to the dividing number of the verifying quantum key and the basic quantum key in the verifying quantum key pool;
and using the encryption quantum key pool, the key-quantity mapping and the verification quantum key pool and the key-time mapping as a bidirectional synchronous key pool.
Further, the step of transmitting the data to be processed by using the bidirectional synchronous key pool to obtain the data preparation data to be processed includes:
s2-1, judging whether the bidirectional synchronous key pool meets encryption requirements, if yes, executing S2-2, otherwise, using the quantity of data to be processed as a basic quantum key division number, and returning to S1-1;
s2-2, judging whether the number of the quantum keys in the encryption quantum key pool of the bidirectional synchronous key pool is the same as that of the quantum keys in the verification quantum key pool, if so, encrypting the data to be processed by utilizing the encryption quantum keys in the encryption quantum key pool of the bidirectional synchronous key pool to obtain the encrypted data to be processed, otherwise, returning to S1-1;
s2-3, obtaining a corresponding key-quantity mapping as an encryption tag according to the encryption quantum key of the encryption data to be processed;
s2-4, utilizing the encryption data to be processed and the encryption tag as merging data to be processed;
s2-5, the sending end is utilized to send the combined data to be processed to the receiving end to obtain data preparation data to be processed;
the encryption requirement is that the number of encryption quantum keys of an encryption quantum key pool in the bidirectional synchronous key pool is larger than the number of data to be processed.
Further, the step of completing independent transmission verification based on the bidirectional synchronous key pool by utilizing the data preparation data to be processed comprises the following steps:
s3-1, judging whether the data preparation data to be processed completely corresponds to the data to be processed, if so, acquiring a corresponding key-moment mapping as a verification tag according to an encryption tag of the data preparation data to be processed, otherwise, performing traversal verification processing;
s3-2, carrying out transmission verification by using the verification tag to obtain a transmission verification result;
s3-3, performing a rechecking process based on the bidirectional synchronous key pool according to the transmission verification result to obtain a rechecking result;
s3-4, decrypting the preliminary data of the data to be processed according to the rechecking result to finish independent transmission verification.
Further, the performing traversal verification processing includes:
s3-1-1, acquiring a key-moment mapping corresponding to the preparation data to be processed as a traversal verification tag;
s3-1-2, obtaining corresponding key-quantity mapping in a receiving end by using the traversal verification tag to serve as the traversal verification mirror tag;
s3-1-3, acquiring to-be-processed data which does not correspond to the traversal verification mirror label in the transmitting end as to-be-processed missing data;
s3-1-4, judging whether the missing data to be processed has a corresponding transmission history record in the transmitting end, if so, executing S3-1-5, otherwise, retransmitting the missing data to be processed to the receiving end by using the transmitting end, and returning to S3-1;
s3-1-5, judging whether the missing data to be processed has a corresponding receiving history record in the receiving end, if yes, returning to S3-1 after the missing data to be processed is used for supplementing the preparation data of the data to be processed in the receiving end completely, otherwise, abandoning the processing.
Further, the step of obtaining the transmission verification result by using the verification tag for transmission verification includes:
s3-2-1, judging whether the verification tag completely corresponds to an encryption tag corresponding to the encryption data to be processed, if so, directly outputting a transmission verification result to be normal, otherwise, executing S3-2-2;
s3-2-2, judging whether the verification tag is completely not corresponding to the encryption tag corresponding to the encryption data to be processed, if so, directly outputting a transmission verification result as an abnormality, otherwise, obtaining a consistency tag by using the verification tag and the corresponding tag in the encryption tag as a transmission verification result;
wherein the full correspondence is that the key-time map of the authentication tag corresponds to the key-quantity map of the encryption tag.
Further, performing a rechecking process based on the bidirectional synchronous key pool according to the transmission verification result to obtain a rechecking result includes:
s3-3-1, judging whether the transmission verification result is normal, if so, executing S3-3-2, otherwise, executing S3-3-3;
s3-3-2, judging whether the encryption tag corresponding to the transmission verification result and the verification tag point to the same bidirectional synchronous key pool, if so, outputting a rechecking result to be normal, otherwise, discarding the processing;
s3-3-3, judging whether the transmission verification result is abnormal, if so, executing S3-3-4, otherwise, executing S3-3-5;
s3-3-4, judging whether the verification tag and the encryption tag are different from a bidirectional synchronous key pool corresponding to the data to be processed, if so, discarding the processing, otherwise, returning to S2-3;
s3-3-5, when the transmission verification result corresponds to the consistency label, judging whether the data to be processed corresponding to the consistency label in the receiving end is a subset of the data to be processed in the transmitting end, if so, the re-verification result is partially normal, otherwise, the processing is abandoned.
Further, performing decryption processing on the preliminary data of the data to be processed according to the duplicate checking result to complete independent transmission verification includes:
when the re-checking result is normal, decrypting the preliminary data of the data to be processed according to the encrypted quantum key pool of the bidirectional synchronous key pool corresponding to the re-checking result to finish independent transmission verification;
and when the re-checking result is that the part is normal, the data preparation data to be processed of the data to be processed is removed as the current data to be processed after the decryption processing is carried out on the data preparation data to be processed according to the encryption quantum key pool of the bidirectional synchronous key pool corresponding to the re-checking result, and the S1 is returned.
Compared with the closest prior art, the invention has the following beneficial effects:
the quantum key is combined with the encryption and verification of the data transmission, a bidirectional independent key pool is arranged, and mapping is correspondingly established, so that the encryption and verification of the same data are guaranteed to be highly compatible with each other, operation confusion caused by key cross use is avoided, the progress can be restored or the problem can be positioned at any time in the independent encryption and verification process when the problem occurs or the process is required to be suspended, the complete logic closed loop provides guarantee for the data transmission, and the final purpose can be achieved in a self-circulation mode when part of data transmission or the corresponding process is not performed.
Drawings
Fig. 1 is a flowchart of a data independent transmission verification method based on a bidirectional synchronous key pool.
Detailed Description
The following describes the embodiments of the present invention in further detail with reference to the drawings.
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Example 1: the invention provides a data independent transmission verification method based on a bidirectional synchronous key pool, which is shown in figure 1 and comprises the following steps:
s1, establishing a bidirectional synchronous key pool by utilizing quantum random numbers;
s2, transmitting the data to be processed by using the bidirectional synchronous key pool to obtain data preparation data to be processed;
and S3, completing independent transmission verification based on a bidirectional synchronous key pool by utilizing the data preparation data to be processed.
S1 specifically comprises:
s1-1, respectively obtaining a first quantum random number and a second quantum random number by using a quantum random number generator;
s1-2, acquiring a hardware identifier of a transmitting end as a basic quantum key division number;
s1-3, establishing an encryption quantum key pool according to a basic quantum key division number by utilizing the first quantum random number;
s1-4, establishing a verification quantum key pool according to a basic quantum key division number by utilizing the second quantum random number;
s1-5, obtaining a bidirectional synchronous key pool by utilizing the encryption quantum key pool and the verification quantum key pool;
the first quantum random number and the second quantum random number are mutually independent.
In this embodiment, a data independent transmission verification method based on a bidirectional synchronous key pool is used for generating quantum random numbers according to, but not limited to, BB84 protocol, so as to obtain truly random quantum random numbers.
S1-5 specifically comprises:
s1-5-1, establishing key-quantity mapping by utilizing the number of the encrypted quantum key in the encrypted quantum key pool and the number of the basic quantum key partition corresponding to the number of the basic quantum key partition;
s1-5-2, establishing key-time mapping by utilizing the dividing time corresponding to the dividing number of the verifying quantum key and the basic quantum key in the verifying quantum key pool;
s1-5-3, using the encryption quantum key pool, the key-quantity mapping and the verification quantum key pool and the key-time mapping as a bidirectional synchronous key pool.
S2 specifically comprises:
s2-1, judging whether the bidirectional synchronous key pool meets encryption requirements, if yes, executing S2-2, otherwise, using the quantity of data to be processed as a basic quantum key division number, and returning to S1-1;
s2-2, judging whether the number of the quantum keys in the encryption quantum key pool of the bidirectional synchronous key pool is the same as that of the quantum keys in the verification quantum key pool, if so, encrypting the data to be processed by utilizing the encryption quantum keys in the encryption quantum key pool of the bidirectional synchronous key pool to obtain the encrypted data to be processed, otherwise, returning to S1-1;
s2-3, obtaining a corresponding key-quantity mapping as an encryption tag according to the encryption quantum key of the encryption data to be processed;
s2-4, utilizing the encryption data to be processed and the encryption tag as merging data to be processed;
s2-5, the sending end is utilized to send the combined data to be processed to the receiving end to obtain data preparation data to be processed;
the encryption requirement is that the number of encryption quantum keys of an encryption quantum key pool in the bidirectional synchronous key pool is larger than the number of data to be processed.
In this embodiment, in the data independent transmission verification method based on the bidirectional synchronous key pool, when the judgment conditions in S2-1 and S2-2 are not satisfied, the quantum random number can be circularly iterated and re-divided to satisfy the data encryption requirement because only the stage of establishing the key pool is performed.
S3 specifically comprises:
s3-1, judging whether the data preparation data to be processed completely corresponds to the data to be processed, if so, acquiring a corresponding key-moment mapping as a verification tag according to an encryption tag of the data preparation data to be processed, otherwise, performing traversal verification processing;
s3-2, carrying out transmission verification by using the verification tag to obtain a transmission verification result;
s3-3, performing a rechecking process based on the bidirectional synchronous key pool according to the transmission verification result to obtain a rechecking result;
s3-4, decrypting the preliminary data of the data to be processed according to the rechecking result to finish independent transmission verification.
S3-1 specifically comprises:
s3-1-1, acquiring a key-moment mapping corresponding to the preparation data to be processed as a traversal verification tag;
s3-1-2, obtaining corresponding key-quantity mapping in a receiving end by using the traversal verification tag to serve as the traversal verification mirror tag;
s3-1-3, acquiring to-be-processed data which does not correspond to the traversal verification mirror label in the transmitting end as to-be-processed missing data;
s3-1-4, judging whether the missing data to be processed has a corresponding transmission history record in the transmitting end, if so, executing S3-1-5, otherwise, retransmitting the missing data to be processed to the receiving end by using the transmitting end, and returning to S3-1;
s3-1-5, judging whether the missing data to be processed has a corresponding receiving history record in the receiving end, if yes, returning to S3-1 after the missing data to be processed is used for supplementing the preparation data of the data to be processed in the receiving end completely, otherwise, abandoning the processing.
In this embodiment, a data independent transmission verification method based on a bidirectional synchronization key pool performs traversal processing to obtain a final recheck result of missing data by performing overall search in a receiving end.
S3-2 specifically comprises:
s3-2-1, judging whether the verification tag completely corresponds to an encryption tag corresponding to the encryption data to be processed, if so, directly outputting a transmission verification result to be normal, otherwise, executing S3-2-2;
s3-2-2, judging whether the verification tag is completely not corresponding to the encryption tag corresponding to the encryption data to be processed, if so, directly outputting a transmission verification result as an abnormality, otherwise, obtaining a consistency tag by using the verification tag and the corresponding tag in the encryption tag as a transmission verification result;
wherein the full correspondence is that the key-time map of the authentication tag corresponds to the key-quantity map of the encryption tag.
S3-3 specifically comprises:
s3-3-1, judging whether the transmission verification result is normal, if so, executing S3-3-2, otherwise, executing S3-3-3;
s3-3-2, judging whether the encryption tag corresponding to the transmission verification result and the verification tag point to the same bidirectional synchronous key pool, if so, outputting a rechecking result to be normal, otherwise, discarding the processing;
s3-3-3, judging whether the transmission verification result is abnormal, if so, executing S3-3-4, otherwise, executing S3-3-5;
s3-3-4, judging whether the verification tag and the encryption tag are different from a bidirectional synchronous key pool corresponding to the data to be processed, if so, discarding the processing, otherwise, returning to S2-3;
s3-3-5, when the transmission verification result corresponds to the consistency label, judging whether the data to be processed corresponding to the consistency label in the receiving end is a subset of the data to be processed in the transmitting end, if so, the re-verification result is partially normal, otherwise, the processing is abandoned.
In this embodiment, a data independent transmission verification method based on a bidirectional synchronization key pool is implemented according to the scheme that the cases of discarding processes in S3-3-2, S3-3-4 and S3-3-5 are operated at this stage, and when the cases are not satisfied, the problem types cannot be accurately resolved and the steps can be optionally returned, so that the processes are discarded in order to avoid resource waste in practical applications.
S3-4 specifically comprises:
s3-4-1, when the re-checking result is normal, decrypting the data prepared to be processed according to the encrypted quantum key pool of the bidirectional synchronous key pool corresponding to the re-checking result to finish independent transmission verification;
and S3-4-2, when the re-checking result is that the part is normal, removing the data preparation data to be processed of the data to be processed as current data to be processed according to the decryption processing of the encrypted quantum key pool of the bi-directional synchronous key pool corresponding to the re-checking result, and returning to S1.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical aspects of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the above embodiments, it should be understood by those of ordinary skill in the art that: modifications and equivalents may be made to the specific embodiments of the invention without departing from the spirit and scope of the invention, which is intended to be covered by the claims.

Claims (5)

1. The data independent transmission verification method based on the bidirectional synchronous key pool is characterized by comprising the following steps of:
s1, establishing a bidirectional synchronous key pool by utilizing quantum random numbers;
s1-1, respectively obtaining a first quantum random number and a second quantum random number by using a quantum random number generator;
s1-2, acquiring a hardware identifier of a transmitting end as a basic quantum key division number;
s1-3, establishing an encryption quantum key pool according to a basic quantum key division number by utilizing the first quantum random number;
s1-4, establishing a verification quantum key pool according to a basic quantum key division number by utilizing the second quantum random number;
s1-5, obtaining a bidirectional synchronous key pool by utilizing the encryption quantum key pool and the verification quantum key pool;
s1-5-1, establishing key-quantity mapping by utilizing the number of the encrypted quantum key in the encrypted quantum key pool and the number of the basic quantum key partition corresponding to the number of the basic quantum key partition;
s1-5-2, establishing key-time mapping by utilizing the dividing time corresponding to the dividing number of the verifying quantum key and the basic quantum key in the verifying quantum key pool;
s1-5-3, using the encryption quantum key pool, the key-quantity mapping and the verification quantum key pool and the key-time mapping as a bidirectional synchronous key pool;
wherein the first quantum random number and the second quantum random number are mutually independent;
s2, transmitting the data to be processed by using the bidirectional synchronous key pool to obtain data preparation data to be processed;
s2-1, judging whether the bidirectional synchronous key pool meets encryption requirements, if yes, executing S2-2, otherwise, using the quantity of data to be processed as a basic quantum key division number, and returning to S1-1;
s2-2, judging whether the number of the quantum keys in the encryption quantum key pool of the bidirectional synchronous key pool is the same as that of the quantum keys in the verification quantum key pool, if so, encrypting the data to be processed by utilizing the encryption quantum keys in the encryption quantum key pool of the bidirectional synchronous key pool to obtain the encrypted data to be processed, otherwise, returning to S1-1;
s2-3, obtaining a corresponding key-quantity mapping as an encryption tag according to the encryption quantum key of the encryption data to be processed;
s2-4, utilizing the encryption data to be processed and the encryption tag as merging data to be processed;
s2-5, the sending end is utilized to send the combined data to be processed to the receiving end to obtain data preparation data to be processed;
the encryption requirement is that the number of encryption quantum keys of an encryption quantum key pool in the bidirectional synchronous key pool is larger than the number of data to be processed;
s3, completing independent transmission verification based on a bidirectional synchronous key pool by utilizing the data preparation data to be processed;
s3-1, judging whether the data preparation data to be processed completely corresponds to the data to be processed, if so, acquiring a corresponding key-moment mapping as a verification tag according to an encryption tag of the data preparation data to be processed, otherwise, performing traversal verification processing;
s3-2, carrying out transmission verification by using the verification tag to obtain a transmission verification result;
s3-3, performing a rechecking process based on the bidirectional synchronous key pool according to the transmission verification result to obtain a rechecking result;
s3-4, decrypting the preliminary data of the data to be processed according to the rechecking result to finish independent transmission verification.
2. The method for data independent transmission verification based on bidirectional synchronization key pool as set forth in claim 1, wherein said performing a traversal verification process includes:
s3-1-1, acquiring a key-moment mapping corresponding to the preparation data to be processed as a traversal verification tag;
s3-1-2, obtaining corresponding key-quantity mapping in a receiving end by using the traversal verification tag to serve as the traversal verification mirror tag;
s3-1-3, acquiring to-be-processed data which does not correspond to the traversal verification mirror label in the transmitting end as to-be-processed missing data;
s3-1-4, judging whether the missing data to be processed has a corresponding transmission history record in the transmitting end, if so, executing S3-1-5, otherwise, retransmitting the missing data to be processed to the receiving end by using the transmitting end, and returning to S3-1;
s3-1-5, judging whether the missing data to be processed has a corresponding receiving history record in the receiving end, if yes, returning to S3-1 after the missing data to be processed is used for supplementing the preparation data of the data to be processed in the receiving end completely, otherwise, abandoning the processing.
3. The method for data independent transmission verification based on bidirectional synchronization key pool as set forth in claim 1, wherein the step of performing transmission verification by using the verification tag to obtain a transmission verification result comprises:
s3-2-1, judging whether the verification tag completely corresponds to an encryption tag corresponding to the encryption data to be processed, if so, directly outputting a transmission verification result to be normal, otherwise, executing S3-2-2;
s3-2-2, judging whether the verification tag is completely not corresponding to the encryption tag corresponding to the encryption data to be processed, if so, directly outputting a transmission verification result as an abnormality, otherwise, obtaining a consistency tag by using the verification tag and the corresponding tag in the encryption tag as a transmission verification result;
wherein the full correspondence is that the key-time map of the authentication tag corresponds to the key-quantity map of the encryption tag.
4. A method for independently transmitting and verifying data based on a bidirectional synchronous key pool as defined in claim 3, wherein the step of performing the re-verification process based on the bidirectional synchronous key pool according to the transmission verification result to obtain the re-verification result comprises:
s3-3-1, judging whether the transmission verification result is normal, if so, executing S3-3-2, otherwise, executing S3-3-3;
s3-3-2, judging whether the encryption tag corresponding to the transmission verification result and the verification tag point to the same bidirectional synchronous key pool, if so, outputting a rechecking result to be normal, otherwise, discarding the processing;
s3-3-3, judging whether the transmission verification result is abnormal, if so, executing S3-3-4, otherwise, executing S3-3-5;
s3-3-4, judging whether the verification tag and the encryption tag are different from a bidirectional synchronous key pool corresponding to the data to be processed, if so, discarding the processing, otherwise, returning to S2-3;
s3-3-5, when the transmission verification result corresponds to the consistency label, judging whether the data to be processed corresponding to the consistency label in the receiving end is a subset of the data to be processed in the transmitting end, if so, the re-verification result is partially normal, otherwise, the processing is abandoned.
5. The method for verifying independent transmission of data based on a bidirectional synchronous key pool as set forth in claim 1, wherein decrypting the preliminary data of the data to be processed according to the result of the rechecking to complete the independent transmission verification comprises:
when the re-checking result is normal, decrypting the preliminary data of the data to be processed according to the encrypted quantum key pool of the bidirectional synchronous key pool corresponding to the re-checking result to finish independent transmission verification;
and when the re-checking result is that the part is normal, the data preparation data to be processed of the data to be processed is removed as the current data to be processed after the decryption processing is carried out on the data preparation data to be processed according to the encryption quantum key pool of the bidirectional synchronous key pool corresponding to the re-checking result, and the S1 is returned.
CN202311569776.0A 2023-11-23 2023-11-23 Data independent transmission verification method based on bidirectional synchronous key pool Active CN117278339B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311569776.0A CN117278339B (en) 2023-11-23 2023-11-23 Data independent transmission verification method based on bidirectional synchronous key pool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311569776.0A CN117278339B (en) 2023-11-23 2023-11-23 Data independent transmission verification method based on bidirectional synchronous key pool

Publications (2)

Publication Number Publication Date
CN117278339A CN117278339A (en) 2023-12-22
CN117278339B true CN117278339B (en) 2024-04-09

Family

ID=89218253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311569776.0A Active CN117278339B (en) 2023-11-23 2023-11-23 Data independent transmission verification method based on bidirectional synchronous key pool

Country Status (1)

Country Link
CN (1) CN117278339B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117478707B (en) * 2023-12-27 2024-05-07 天津数智物联科技有限公司 Multi-target energy management data transmission method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188080A (en) * 2011-12-31 2013-07-03 中兴通讯股份有限公司 Method and system for secret key certification consultation of terminal to terminal based on identify label
CN115913521A (en) * 2021-08-04 2023-04-04 济南量子技术研究院 Method for identity authentication based on quantum key
CN115913553A (en) * 2023-03-08 2023-04-04 广东广宇科技发展有限公司 Data encryption method based on nonlinear mapping

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113033828B (en) * 2021-04-29 2022-03-22 江苏超流信息技术有限公司 Model training method, using method, system, credible node and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103188080A (en) * 2011-12-31 2013-07-03 中兴通讯股份有限公司 Method and system for secret key certification consultation of terminal to terminal based on identify label
CN115913521A (en) * 2021-08-04 2023-04-04 济南量子技术研究院 Method for identity authentication based on quantum key
CN115913553A (en) * 2023-03-08 2023-04-04 广东广宇科技发展有限公司 Data encryption method based on nonlinear mapping

Also Published As

Publication number Publication date
CN117278339A (en) 2023-12-22

Similar Documents

Publication Publication Date Title
CN117278339B (en) Data independent transmission verification method based on bidirectional synchronous key pool
CN115801257B (en) Big data secure transmission method based on quantum encryption
CN112272094B (en) Internet of things equipment identity authentication method, system and storage medium based on PUF (physical unclonable function) and CPK (compact public key) algorithm
Mood et al. Reuse it or lose it: More efficient secure computation through reuse of encrypted values
CN104580208A (en) Identity authentication method and device
CN115913553B (en) Data encryption method based on nonlinear mapping
CN102571357B (en) Signature realization method and signature realization device
CN116232762B (en) Encryption data transmission method based on quantum key
CN107315967B (en) Data matching method and device and computer readable storage medium
CN115834063B (en) Quantum key-based data compression encryption method
CN113055380A (en) Message processing method and device, electronic equipment and medium
CN112287366A (en) Data encryption method and device, computer equipment and storage medium
CN113271209A (en) Trustable public key encryption system and method based on non-interactive zero-knowledge proof
CN116319097A (en) Multi-node data transmission method based on quantum encryption
CN116318687B (en) Data dynamic encryption method based on bidirectional mapping matrix
CN113591103B (en) Identity authentication method and system between intelligent terminals of electric power Internet of things
CN116089989B (en) Data iterative encryption processing method for offline data terminal
CN116800535A (en) Method and device for avoiding secret between multiple servers
CN116112165A (en) Key dynamic division management method based on key pool state
CN113162765B (en) Trustable public key encryption system and method based on non-interactive key agreement
Qin et al. Research on point-to-point encryption method of power system communication data based on block chain technology
CN116192388B (en) Mixed key encryption processing method based on digital fingerprint
CN117544308B (en) Quantum key-based data transmission verification method
Yutao et al. Study on a CPN-based Auto-analysis Tool for Security Protocols
CN116614232B (en) Nonlinear key updating method for distributed communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant