TW201445902A - Method for quantum communication - Google Patents

Method for quantum communication Download PDF

Info

Publication number
TW201445902A
TW201445902A TW102118974A TW102118974A TW201445902A TW 201445902 A TW201445902 A TW 201445902A TW 102118974 A TW102118974 A TW 102118974A TW 102118974 A TW102118974 A TW 102118974A TW 201445902 A TW201445902 A TW 201445902A
Authority
TW
Taiwan
Prior art keywords
quantum
plaintext
ciphertext
hash value
receiving end
Prior art date
Application number
TW102118974A
Other languages
Chinese (zh)
Other versions
TWI487308B (en
Inventor
Tzone-Lih Hwang
Yi-Ping Luo
Chun-Wei Yang
Tzu-Han Lin
Original Assignee
Univ Nat Cheng Kung
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Univ Nat Cheng Kung filed Critical Univ Nat Cheng Kung
Priority to TW102118974A priority Critical patent/TWI487308B/en
Publication of TW201445902A publication Critical patent/TW201445902A/en
Application granted granted Critical
Publication of TWI487308B publication Critical patent/TWI487308B/en

Links

Abstract

This invention discloses a method for quantum communication to solve the problem of the communication data unable to provide authentication and encryption functions in the same time. The method comprises two steps. The first step performs a first hash value from a first plaintext based on a hash function, and then edits the first plaintext and the first hash value to form a first compiling text base on a merging rule, and then encrypts the first compiling text to form a first ciphertext based on a value key, and then transforms the first ciphertext to a quantum based on a format key, and then transmits the quantum to a receiver by a transmitter. The second step measures the quantum to obtain a second ciphertext based on the format key, and then decrypts the second ciphertext to obtain a second compiling text based the value key, and then obtains a second plaintext from the second compiling text based on the merging rule by the receiver. Thus, it can actually resolve the said problems.

Description

量子通訊方法 Quantum communication method

本發明係關於一種通訊方法;特別是關於一種結合通訊與認證功能的量子通訊方法。 The present invention relates to a communication method; in particular, to a quantum communication method combining communication and authentication functions.

隨著資通訊技術(ICT)的進步,人類生活中對於資訊傳輸的依賴程度與日俱增,如:電子郵件或電子交易等,在傳輸過程中採用密碼學更可提升資訊傳遞的安全性和隱密性。在傳統資訊技術中,除了一次性密碼本(one-time pad)或已被證明理論安全之方法外,多數習知加密器皆可基於「計算安全」原則進行運算,以確保資訊安全,然而,由於量子平行運算擁有龐大計算能力,將使得習知加密器面臨密碼被破解的危機,導致原本具有保密性的資訊遭到截獲。因此,世界各國先後投入量子(quantum)資訊研究領域,如:量子通訊系統及方法等,期待能為資訊傳輸過程提供更有效且安全的保密方法。 With the advancement of information communication technology (ICT), the dependence on information transmission in human life is increasing day by day, such as e-mail or electronic transactions. The use of cryptography in the transmission process can improve the security and privacy of information transmission. . In traditional information technology, in addition to one-time pad or proven method of security, most conventional ciphers can operate based on the principle of "computational security" to ensure information security. Due to the huge computing power of quantum parallel computing, the conventional cryptographer will face the crisis of password cracking, resulting in the interception of information that was originally confidential. Therefore, countries all over the world have invested in the field of quantum information research, such as quantum communication systems and methods, and look forward to providing more effective and secure methods of confidentiality for the information transmission process.

習知量子通訊系統通常包含「發送端(transmitter,或稱Alice)」及「接收端(receiver,或稱Bob)」兩部分,其中,該「發送端」含有一計算機及一偏振光光子隨機產生器(optical quantum random number generator),該「接收端」含有另一計算機及數台單光子探測器(single photon detector),該「發送端」與「接收端」之間可通過光纖(或稱通道,channel)相連,以便傳輸資訊。 Conventional quantum communication systems usually include a "transmitter (or Alice)" and a "receiver (or Bob)", wherein the "transmitter" contains a computer and a polarized photon is randomly generated. An optical quantum random number generator, the "receiving end" includes another computer and a plurality of single photon detectors, and the "transmitting end" and the "receiving end" can pass through an optical fiber (or channel) , channel) are connected to transfer information.

在習知量子通訊方法的運作流程中,當使用者欲經由上述「發送端」傳輸資訊至上述「接收端」時,該「發送端」的偏振光光子產 生器會經由該通道向該「接收端」的單光子探測器發射「脈沖偏振光光子」,之後,該「發送端」與「接收端」的計算機將會經由該通道進行公開討論(public discussion),以及複雜的判斷過程,用以檢查光子是否有被竊聽或修改,例如:產生並傳送相互認可的密碼,當該「發送端」的資訊以此密碼加密後,即可經由通訊網路(如:網際網路等)進行傳輸,並由該「接收端」還原該資訊。 In the operational flow of the conventional quantum communication method, when the user wants to transmit information to the "receiver" via the "sender", the "transmitter" polarized photon product The device will transmit a "pulse-polarized photon" to the single-photon detector of the "receiving end" via the channel, and then the computer of the "transmitting end" and the "receiving end" will openly discuss via the channel (public discussion) ), as well as a complicated judging process to check whether photons have been eavesdropped or modified, for example, to generate and transmit mutually recognized passwords. When the "sender" information is encrypted with this password, it can be transmitted via a communication network (eg : Internet, etc.) to transmit, and the "receiver" restores the information.

惟,在多數習知量子通訊方法的資訊傳輸過程中,通訊雙方的加密及認證過程通常須分開進行(即無法同時達成加密及認證功能),導致資料傳輸次數增加,除會造成「傳輸效率降低」及「通訊負擔提高」等情況之外,且會提高「資訊遭到攻擊、截獲或竄改」等風險。其中,上述「接收端」還可由一「公正第三方(如:驗證伺服器等)」協助認證上述密碼及「發送端」的身分,然縱如此,該「接收端」與「發送端」之間仍需使用傳統通道(classical channel)及量子通道(quantum channel)傳送不同資訊,故亦會面臨上述「傳輸效率降低」、「通訊負擔提高」及「資訊遭受攻擊、截獲或竄改風險提高」等情事;而且,該「公正第三方」須隨時在線上(on-line)待命,倘若該「公正第三方」因故無法提供服務,則上述認證過程將無法正常運作,造成該「接收端」與「發送端」之間無法正常通訊。 However, in the information transmission process of most conventional quantum communication methods, the encryption and authentication processes of the two communication parties usually have to be performed separately (that is, the encryption and authentication functions cannot be achieved at the same time), resulting in an increase in the number of data transmissions, which will cause "transmission efficiency is reduced." In addition to "increased communication burden", etc., it will increase the risk of "information being attacked, intercepted or tampered with". The "receiver" can also be authenticated by a "fair third party (eg, authentication server, etc.)" to authenticate the password and the "sender". However, the "receiver" and "sender" There is still a need to use traditional channels and quantum channels to transmit different information. It will also face the above-mentioned "reduction in transmission efficiency", "improvement of communication burden" and "increased risk of information attack, interception or tampering". And the "fair third party" is required to be on-line at any time. If the "fair third party" is unable to provide the service for any reason, the above certification process will not function properly, resulting in the "receiving end" and Communication between the "senders" is not possible.

有鑑於此,上述習知量子通訊方法在使用時,除會造成「無法同時達成加密及認證功能」問題,且會產生「降低傳輸效率」、「提高通訊負擔」及「資訊遭到攻擊、截獲或竄改」等疑慮,在實際使用時更衍生諸多限制與缺點,確有不便之處,亟需進一步改良,以提升其實用性。 In view of this, the above-mentioned conventional quantum communication method will cause "impossibility to achieve encryption and authentication functions" at the same time, and will result in "reduce transmission efficiency", "improve communication burden" and "information attack and interception". Doubts such as tampering, and more limitations and shortcomings in actual use, there are inconveniences, and further improvements are needed to enhance their practicality.

本發明之主要目的係提供一種量子通訊方法,可於通訊過程中同時提供加密及認證功能,以提高傳輸效率。 The main object of the present invention is to provide a quantum communication method capable of simultaneously providing encryption and authentication functions in a communication process to improve transmission efficiency.

本發明之次一目的係提供一種量子通訊方法,可於通訊過程中同時提供加密及認證功能,以降低通訊負擔。 A second object of the present invention is to provide a quantum communication method capable of simultaneously providing encryption and authentication functions in a communication process to reduce communication load.

本發明量子通訊方法,係藉由一發送端及一接收端相互耦接,使該發送端及該接收端能夠相互通訊,該方法之步驟包含:由上述發送端將一第一明文依據一雜湊函數運算而產生一第一雜湊值,再將該第一明文與該第一雜湊值依據一合併規則編輯成為一第一輯文,再將該第一輯文依據一數值金鑰加密而產生一第一密文,再將該第一密文依據一基底金鑰轉換成為一量子,再將該量子傳送至上述接收端;及由上述接收端依據上述基底金鑰量測上述量子而獲得一第二密文,再將該第二密文依據上述數值金鑰解密而取得一第二輯文,再依據該合併規則由該第二輯文中取得一第二明文。 The quantum communication method of the present invention is coupled to each other by a transmitting end and a receiving end, so that the transmitting end and the receiving end can communicate with each other. The method comprises the following steps: the first clear text according to the transmitting end is based on a hash The function operation generates a first hash value, and then the first plaintext and the first hash value are edited into a first album according to a merge rule, and then the first album is encrypted according to a numerical key to generate a a first ciphertext, the first ciphertext is converted into a quantum according to a base key, and the quantum is transmitted to the receiving end; and the receiving end obtains a quantum according to the base key measurement The second ciphertext, the second ciphertext is decrypted according to the numerical value key to obtain a second essay, and a second plaintext is obtained from the second essay according to the merging rule.

較佳地,上述接收端依據上述合併規則由上述第二輯文中取得一第二雜湊值,依據上述第二明文與上述雜湊函數運算而產生一第三雜湊值,判斷該第三雜湊值與該第二雜湊值是否相同,若判斷為是,該接收端認可該第二明文,若判斷為否,該接收端放棄該第二明文。 Preferably, the receiving end obtains a second hash value from the second series according to the combining rule, generates a third hash value according to the second plaintext and the hash function operation, and determines the third hash value and the Whether the second hash value is the same, if the determination is yes, the receiving end approves the second plaintext, and if the determination is no, the receiving end discards the second plaintext.

較佳地,若上述接收端判斷該第三雜湊值與該第二雜湊值相同,該接收端傳送一回應訊息至上述發送端,否則,該接收端傳送一重送訊息至該發送端。 Preferably, if the receiving end determines that the third hash value is the same as the second hash value, the receiving end transmits a response message to the sending end, otherwise, the receiving end transmits a resending message to the sending end.

較佳地,上述基底金鑰、上述第一密文及上述量子分別包含n個位元,若該基底金鑰之第i位元為0,上述發送端將該第一密文之第i位元以Z基底轉換為該量子之第i位元,上述接收端以Z基底量測該量子之第i位元;若該基底金鑰之第i位元為1,該發送端將該第一密文之第i位元以X基底轉換為該量子之第i位元,該接收端以X基底量測該量子之第i位元;0≦i<n。 Preferably, the base key, the first ciphertext and the quantum respectively comprise n bits, and if the i-th bit of the base key is 0, the transmitting end is the i-th bit of the first ciphertext The element is converted into the i-th bit of the quantum by the Z-substrate, and the receiving end measures the i-th bit of the quantum by the Z-base; if the i-th bit of the base key is 1, the transmitting end is the first The i-th bit of the ciphertext is converted into the i-th bit of the quantum by the X-substrate, and the receiving end measures the i-th bit of the quantum by the X-base; 0≦i<n.

較佳地,上述量子之第i位元係如下表所示: 其中,Bi為上述基底金鑰之第i位元,Ci為上述第一密文及上述第二密文之第i位元,Qi為該量子之第i位元。 Preferably, the ith bit of the quantum is as follows: Wherein B i is the i-th bit of the base key, C i is the i-th bit of the first ciphertext and the second ciphertext, and Q i is the i-th bit of the quantum.

較佳地,上述第一輯文與上述數值金鑰所包含之位元數相同,上述發送端將該第一輯文與該數值金鑰進行互斥或邏輯運算而產生上述第一密文,上述接收端將上述第二密文與該數值金鑰進行互斥或邏輯運算而產生上述第二輯文。 Preferably, the first album has the same number of bits as the numerical key, and the transmitting end mutually exclusive or logically operates the first album and the numerical key to generate the first ciphertext. The receiving end mutually exclusive or logically operates the second ciphertext and the numerical key to generate the second essay.

較佳地,上述第一輯文與上述數值金鑰所包含之位元數相同,上述發送端將該第一輯文與該數值金鑰進行加密運算而產生上述第一密文,上述接收端將上述第二密文與該數值金鑰進行解密運算而產生上述第二輯文。 Preferably, the first album has the same number of bits as the numerical key, and the transmitting end encrypts the first album and the numerical key to generate the first ciphertext, and the receiving end The second ciphertext is decrypted by the second ciphertext to generate the second essay.

較佳地,上述第一明文及上述第一雜湊值依據上述合併規則串連成上述第一輯文,上述第二輯文中包含上述第二明文及上述第二雜湊值,該第二雜湊值依據該合併規則串連該第二明文。 Preferably, the first plaintext and the first hash value are concatenated into the first album according to the merge rule, and the second album includes the second plaintext and the second hash value, and the second hash value is based on The merge rule concatenates the second plaintext.

較佳地,上述第一雜湊值依據上述合併規則插入上述第一明文中而形成上述第一輯文,上述第二輯文中包含上述第二明文及上述第二雜湊值,該第二雜湊值依據該合併規則插入該第二明文中。 Preferably, the first hash value is inserted into the first plaintext according to the merge rule to form the first album, and the second album includes the second plaintext and the second hash value, and the second hash value is based on The merge rule is inserted into the second plaintext.

〔本發明〕 〔this invention〕

A‧‧‧合併規則 A‧‧‧ merger rules

C‧‧‧第一密文 C‧‧‧First ciphertext

C’‧‧‧第二密文 C’‧‧‧Second ciphertext

H(‧)‧‧‧雜湊函數 H(‧)‧‧‧ hash function

H(m)‧‧‧第一雜湊值 H(m)‧‧‧ first hash value

H(m)’‧‧‧第二雜湊值 H(m)’‧‧‧ second hash value

H(m)”‧‧‧第三雜湊值 H(m)”‧‧‧ third hash value

KB‧‧‧基底金鑰 K B ‧‧‧Base Key

KV‧‧‧數值金鑰 K V ‧‧‧Numeric Key

M‧‧‧第一輯文 M‧‧‧ first series

M’‧‧‧第二輯文 M’‧‧‧Second

N‧‧‧通道 N‧‧‧ channel

R‧‧‧接收端 R‧‧‧ Receiver

T‧‧‧發送端 T‧‧‧Send

S1‧‧‧傳送步驟 S1‧‧‧Transfer steps

S2‧‧‧接收步驟 S2‧‧‧ receiving steps

S3‧‧‧認證步驟 S3‧‧‧ Certification Steps

|Q M 〉‧‧‧量子 | Q M 〉‧‧‧ Quantum

a‧‧‧回應訊息 a‧‧‧Response message

r‧‧‧重送訊息 r‧‧‧Resend message

m‧‧‧第一明文 m‧‧‧First plaintext

m’‧‧‧第二明文 m’‧‧‧Second plaintext

第1圖係本發明量子通訊方法較佳實施例之系統架構圖。 BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 is a system architecture diagram of a preferred embodiment of the quantum communication method of the present invention.

第2圖係本發明量子通訊方法較佳實施例之運作流程圖。 Figure 2 is a flow chart showing the operation of the preferred embodiment of the quantum communication method of the present invention.

為讓本發明之上述及其他目的、特徵及優點能更明顯易懂,下文特舉本發明之較佳實施例,並配合所附圖式,作詳細說明如下:本發明全文所述之「發送端」(transmitter),係指量子通訊系統中用以發送資訊的硬體(hardware),該發送端可包含一計算機及一偏振光光子隨機產生器等,其詳細情形係本發明所屬技術領域中具有通常知識者可以理解。 The above and other objects, features and advantages of the present invention will become more <RTIgt; """"""""""""""""""""""""""""""""""""""" Those with ordinary knowledge can understand.

本發明全文所述之「接收端」(receiver),係指量子通訊系統中用以接收資訊的硬體,該發送端可包含一計算機及數台單光子探測器等,其詳細情形係本發明所屬技術領域中具有通常知識者可以理解。 The "receiver" as used throughout the present invention refers to a hardware for receiving information in a quantum communication system, and the transmitting end may include a computer and a plurality of single photon detectors, etc., and the detailed situation thereof is the present invention. Those of ordinary skill in the art will understand.

本發明全文所述之「耦接」(coupling),係指二裝置(如:發送端與接收端)之間相互連結,例如:藉由實體線路(如:光纖等)相互連接等,用以傳輸可表示量子位元(qubit)的載體(例如:光子等),其詳細情形係本發明所屬技術領域中具有通常知識者可以理解。 The term "coupling" as used throughout the present invention means that two devices (eg, a transmitting end and a receiving end) are connected to each other, for example, by connecting physical lines (eg, optical fibers, etc.) to each other. A carrier (e.g., photon, etc.) that can represent a qubit is transmitted, and the details thereof can be understood by those of ordinary skill in the art to which the present invention pertains.

本發明全文所述之「明文」(plaintext),係指二通訊裝置(如:發送端與接收端)之間欲流通的訊息,如:文字或影音訊息等,其詳細情形係本發明所屬技術領域中具有通常知識者可以理解。 The term "plaintext" as used throughout the text of the present invention refers to a message to be circulated between two communication devices (eg, a transmitting end and a receiving end), such as a text or video message, etc., the detailed case of which is the technology of the present invention. Those with ordinary knowledge in the field can understand.

本發明全文所述之「密文」(ciphertext),係指二通訊裝置(如:發送端與接收端)之間欲流通的訊息經過加密過程後的結果,其詳細情形係本發明所屬技術領域中具有通常知識者可以理解。 The ciphertext of the present invention refers to the result of the encryption process between two communication devices (such as the sender and the receiver), and the detailed situation thereof is the technical field to which the present invention pertains. Those with ordinary knowledge can understand.

本發明全文所述之「輯文」(compiling text),係指二資料經過一合併(merge)規則所編輯成的另一資料,例如:將A、B資料合併為C資料等,其詳細情形係本發明所屬技術領域中具有通常知識者可以理解。 The "compiling text" as used throughout the text of the present invention refers to another material that has been edited by a merge rule, for example, the combination of A and B data into C data, etc. It will be understood by those of ordinary skill in the art to which the present invention pertains.

本發明全文所述之「量測」(measurement),係指用以得知量子狀態的過程,例如:利用單光子量測(single photon measurement)方 法得知量子狀態等過程,其詳細情形係本發明所屬技術領域中具有通常知識者可以理解。 "Measurement" as used throughout the present invention refers to a process for knowing the quantum state, for example, using single photon measurement. The process is known as a process such as a quantum state, and the details thereof can be understood by those having ordinary knowledge in the technical field to which the present invention pertains.

請參閱第1圖所示,其係本發明量子通訊方法較佳實施例之系統架構圖。其中,該系統包含一發送端T及一接收端R,該發送端T及接收端R相互耦接,用以執行一量子通訊作業,使該發送端T及接收端R能夠相互通訊。其中,該發送端T及接收端R(即通訊雙方)可以共享一基底金鑰KB及一數值金鑰KV等通訊雙方秘密分享之資訊,且通訊雙方可公開約定一合併規則A及一雜湊函數H(‧)等資訊,該基底金鑰KB及一數值金鑰KV可供該發送端T將一第一明文m轉為一量子(quantum)|Q M 〉,並供該接收端R由該量子|Q M 〉中取得一第二明文m’。在此實施例中,該發送端T及接收端R之間係耦接一通道N(如:光纖等)作為實施態樣,該發送端T由一計算機電性連接一偏振光光子隨機產生器,該接收端R由另一計算機電性連接數台單光子探測器;該二計算機可以執行資料處理(data processing)功能,並共同儲存數組安保資料(即該基底金鑰KB、數值金鑰KV)及上述合併規則A雜湊函數H(‧)等,如此,該二計算機可於每次通訊過程中更換不同安保資料作為確保資訊安全的依據,例如:依該安保資料之序號等作為指定順序,惟不以此為限;該偏振光光子隨機產生器與單光子探測器之間經由該通道N相互耦接,該偏振光光子隨機產生器可由該發送端T之計算機控制,而將該第一明文m轉為該量子|Q M 〉,以便傳送該量子|Q M 〉至該單光子探測器,並由該接收端R之計算機取得該第二明文m’;其中,前述量子通訊過程中所運用的硬體設備係該技術領域中具有通常知識者可以理解,在此容不贅述。 Please refer to FIG. 1 , which is a system architecture diagram of a preferred embodiment of the quantum communication method of the present invention. The system includes a transmitting end T and a receiving end R. The transmitting end T and the receiving end R are coupled to each other for performing a quantum communication operation, so that the transmitting end T and the receiving end R can communicate with each other. The sender T and the receiver R (ie, the two parties) can share a secret information shared by a communication key such as a base key K B and a numerical key K V , and the communication parties can publicly agree on a merge rule A and a The information such as the hash function H(‧), the base key K B and a numerical key K V are available for the transmitting end T to convert a first plaintext m into a quantum | Q M 〉 for the receiving The terminal R obtains a second plaintext m' from the quantum | Q M 〉. In this embodiment, the transmitting end T and the receiving end R are coupled to a channel N (such as an optical fiber, etc.) as an implementation manner, and the transmitting end T is electrically connected to a polarized photon random generator by a computer. The receiving end R is electrically connected to the plurality of single photon detectors by another computer; the two computers can perform data processing functions and jointly store the array security data (ie, the base key K B , the numerical key K V ) and the above-mentioned merger rule A hash function H (‧), etc., so that the two computers can replace different security data in each communication process as a basis for ensuring information security, for example, according to the serial number of the security data, etc. The sequence is not limited thereto; the polarized photon random generator and the single photon detector are coupled to each other via the channel N, and the polarized photon random generator can be controlled by the computer of the transmitting terminal T, and the The first plaintext m is converted to the quantum | Q M 〉 to transmit the quantum | Q M 〉 to the single photon detector, and the second plaintext m′ is obtained by the computer of the receiving end R; wherein the quantum communication process in Using hardware-based device in the art having ordinary knowledge will be appreciated, this capacity is not repeated here.

請參閱第2圖所示,其係本發明量子通訊方法較佳實施例之運作流程圖。請一併參閱第1圖所示,其中,該量子通訊方法較佳實施例主要包含一傳送步驟S1及一接收步驟S2,分別敘述如後。 Please refer to FIG. 2, which is a flowchart of the operation of the preferred embodiment of the quantum communication method of the present invention. Referring to FIG. 1 together, the preferred embodiment of the quantum communication method mainly includes a transmitting step S1 and a receiving step S2, respectively, as described later.

上述傳送步驟S1係由上述發送端T將上述第一明文m依據上述雜湊函數(hash function)H(‧)運算而產生一第一雜湊值H(m),再將該第一明文m與該第一雜湊值H(m)依據上述合併規則A編輯成為一第一輯文M,再將該第一輯文M依據上述數值金鑰KV加密而產生一第一密文C,再將該第一密文C依據上述基底金鑰KB轉換成為上述量子|Q M 〉,再將該量子|Q M 〉傳送至上述接收端R。詳言之,該發送端T可將該第一明文m(如:以二進位表示的文字訊息等)利用該雜湊函數H(‧)運算,而產生該第一雜湊值H(m),該第一明文m與第一雜湊值H(m)包含至少一位元,該位元數量可為不同的預設值,該雜湊函數H(‧)之定義可參酌「Damgard,“A design principle for hash functions”,Advances in Cryptology:Proceedings of CRYPTO’89,Santa Barbara,California,USA,pp.416-427,20-24 Aug,1989」論文,其係本發明所屬技術領域中具有通常知識者可以理解,在此容不贅述。其中,由於該第一明文m已依據該雜湊函數H(‧)進行轉換,使該第一明文m轉變為該第一雜湊值H(m),因此,該雜湊函數H(‧)可作為該接收端R認證或取得該第一明文m的依據。 In the transmitting step S1, the first plaintext m is generated by the transmitting end T according to the hash function H(‧) to generate a first hash value H(m), and then the first plaintext m and the The first hash value H(m) is edited into a first album M according to the above merge rule A, and then the first album M is encrypted according to the numerical key K V to generate a first ciphertext C, and then the first ciphertext C is generated. The first ciphertext C is converted into the quantum | Q M 〉 according to the base key K B , and the quantum | Q M 〉 is transmitted to the receiving end R. In detail, the transmitting end T may use the hash function H(‧) to calculate the first plaintext m (eg, a text message represented by a binary, etc.) to generate the first hash value H(m). The first plaintext m and the first hash value H(m) comprise at least one bit, the number of the bits may be different preset values, and the definition of the hash function H(‧) may be considered as "Damgard," A design principle for "Hash functions", Advances in Cryptology: Proceedings of CRYPTO '89, Santa Barbara, California, USA, pp. 416-427, 20-24 Aug, 1989", which is understood by those of ordinary skill in the art to which the present invention pertains. I will not repeat them here. Wherein, since the first plaintext m has been converted according to the hash function H(‧), the first plaintext m is converted into the first hash value H(m), so the hash function H(‧) can be used as the The receiving end R authenticates or obtains the basis of the first plaintext m.

接著,該發送端T可將該第一明文m與該第一雜湊值H(m)依據該合併規則A編輯成為該第一輯文M,使該第一輯文M與數值金鑰KV所包含之位元數相同,例如:若該第一明文m為〝110〞,且該第一雜湊值H(m)為〝0〞,則可採用「串連(concatenate,||)」合併規則A,將該第一明文m與該第一雜湊值H(m)兩者串連形成該第一輯文M,如:〝110〞串連〝0〞而組成〝1100〞;或者,採用「插入(inserted)」合併規則A,將該第一雜湊值H(m)插入該第一明文m中形成該第一輯文M,如:在〝110〞中的位元〝11〞間插入〝0〞而組成〝1010〞等,惟不以此為限。其中,由於該第一明文m與該第一雜湊值H(m)已依據該合併規則A進行轉換,使該第一明文m散佈於該第一輯文M中,因此,該合併規則A可做為該接 收端R認證或取得該第一明文m的依據。 Then, the transmitting end T can edit the first plaintext m and the first hash value H(m) into the first album M according to the merge rule A, and make the first album M and the numerical key K V The number of bits included is the same. For example, if the first plaintext m is 〝110〞, and the first hash value H(m) is 〝0〞, then “concatenate (||)” can be used for merging. Rule A, the first plaintext m and the first hash value H(m) are concatenated to form the first album M, such as: 〝110〞 is connected to 〞0〞 to form 〝1100〞; or, "Insert" merge rule A, inserting the first hash value H(m) into the first plaintext m to form the first album M, such as: inserting the bit 〝11〞 in the 〝110〞 〝0〞 and constitute 〝1010〞, etc., but not limited to this. The first plaintext m and the first hash value H(m) have been converted according to the merge rule A, so that the first plaintext m is dispersed in the first edit M. Therefore, the merge rule A can be As the basis for the receiving end R to authenticate or obtain the first plaintext m.

接著,將該第一輯文M依據該數值金鑰KV加密而產生該第一密文C,例如:採用該第一輯文M與數值金鑰KV進行加密運算,如:邏輯運算(如:互斥或,XOR)或AES、DES、3-DES加密演算法等,惟不以此為限,使該第一密文C、基底金鑰KB及量子|Q M 〉分別包含n個位元,n為正整數,例如:若該第一密文C的n個位元為〝0101〞,則其第i(i=0~3)位元分別為〝0〞、〝1〞、〝0〞、〝1〞。其中,由於該第一輯文M已依據該數值金鑰KV進行加密,使該第一輯文M隱藏於該第一密文C中,因此,該數值金鑰KV可做為該接收端R解密該第一輯文M的依據。 Then, the first ciphertext M is encrypted according to the numerical key K V to generate the first ciphertext C, for example, using the first essay M and the numerical key K V to perform an encryption operation, such as a logical operation ( Such as: mutual exclusion or XOR) or AES, DES, 3-DES encryption algorithm, etc., but not limited to, the first ciphertext C, the base key K B and the quantum | Q M 〉 respectively include n One bit, n is a positive integer. For example, if the n bits of the first ciphertext C are 〝0101〞, then the i-th (i=0~3) bits are 〝0〞, 〝1〞, respectively. , 〝0〞, 〝1〞. Wherein, since the first album M has been encrypted according to the numerical key K V , the first album M is hidden in the first ciphertext C, and therefore, the numerical key K V can be used as the receiving The terminal R decrypts the basis of the first album M.

接著,該發送端T可將該第一密文C之第i位元依據該基底金鑰KB之第i位元進行轉換,而形成能夠表示該第一密文C之位元值的不同基底值(如:Z基底或X基底等),並以該轉換後的基底值作為該量子|Q M 〉之第i位元。在此實施例中,係以Z基底及X基底說明該量子|Q M 〉之第i位元的實施態樣,惟不以此為限,任何可表示該第一密文C之位元值的不同基底(basis)皆含括於本發明之揭露範圍,該量子|Q M 〉之第i位元如下列表一所示: 其中,Qi為該量子|Q M 〉之第i位元,Bi為該基底金鑰KB之第i位元,Ci為密文(如:該第一密文C)之第i位元,倘若Bi為〝0〞,則「Qi可採用Z基底{|0〉,|1〉}表示Ci之〝0〞及〝1〞」,亦即,該第一密文C之第i位元係以Z基底轉換為該量子|Q M 〉之第i位元,使該接收端R可採用Z基底量測 該量子|Q M 〉之第i位元;反之,倘若Bi為〝1〞,則「Qi可採用X基底{|+〉,|-〉}表示Ci之〝0〞及〝1〞」,亦即,該第一密文C之第i位元係以X基底轉換為該量子|Q M 〉之第i位元,使該接收端R可採用X基底量測該量子|Q M 〉之第i位元,惟不以此為限。其中,由於該第一密文C已依據該基底金鑰KB進行轉換,使該第一密文C轉變為該量子|Q M 〉,因此,該基底金鑰KB可做為該接收端R解密該第一密文C的依據。 Then, the transmitting end T can convert the i-th bit of the first ciphertext C according to the i-th bit of the base key K B to form a difference that can represent the bit value of the first ciphertext C. The base value (for example, Z substrate or X substrate, etc.), and the converted base value is used as the i-th bit of the quantum | Q M 〉. In this embodiment, the implementation of the i-th bit of the quantum | Q M 〉 is described by the Z substrate and the X substrate, but not limited thereto, any bit value of the first ciphertext C can be represented. The different bases are included in the scope of the present disclosure, and the i-th bit of the quantum | Q M 〉 is as shown in the following list 1: Where Q i is the i-th bit of the quantum | Q M 〉, B i is the i-th bit of the base key K B , and C i is the ith of the ciphertext (eg, the first ciphertext C) Bit, if B i is 〝0〞, then "Q i can use Z base {|0>, |1>} to indicate i0〞 and 〝1〞 of C i , that is, the first ciphertext C The i-th bit is converted into the i-th bit of the quantum | Q M 〉 by the Z-substrate, so that the receiving end R can measure the i-th bit of the quantum | Q M 〉 by using the Z-base; otherwise, if B i is 〝1〞, then "Q i can use X base {|+>, |->} to indicate i0〞 and 〝1〞 of C i , that is, the i-th bit of the first ciphertext C The X-substrate is converted into the i-th bit of the quantum | Q M 〉, so that the receiving end R can measure the i-th bit of the quantum | Q M 〉 by using the X-base, but not limited thereto. Wherein, since the first ciphertext C has been converted according to the base key K B , the first ciphertext C is converted into the quantum | Q M 〉, therefore, the base key K B can be used as the receiving end. R decrypts the basis of the first ciphertext C.

舉例而言,倘若上述基底金鑰KB、數值金鑰KV、第一明文m及第一雜湊值H(m)分別為〝0101〞、〝0011〞、〝110〞及〝0〞,則上述發送端T可先串連該第一明文m及第一雜湊值H(m),而得到上述第一輯文M為〝1100〞,接著,再將該數值金鑰KV與第一輯文M進行XOR運算,而得到上述第一密文C為〝1111〞,接著,再利用該基底金鑰KB轉換該第一密文C之值,而產生上述量子|Q M 〉為〝|1〉|-〉|1〉|-〉〞,之後,該發送端T即可將該量子|Q M 〉經由上述通道N傳送至上述接收端R,並由該接收端R進行上述接收步驟S2。 For example, if the base key K B , the numerical key K V , the first plaintext m, and the first hash value H(m) are 〝0101〞, 〝0011〞, 〝110〞, and 〝0〞, respectively, The transmitting end T may first concatenate the first plaintext m and the first hash value H(m), and obtain the first album M as 〝1100〞, and then the numeric key K V and the first series The text M performs an XOR operation, and obtains the first ciphertext C as 〝1111〞, and then converts the value of the first ciphertext C by using the base key K B to generate the quantum | Q M 〉 is 〝| 1>|->|1>|->〞, after that, the transmitting end T can transmit the quantum | Q M 〉 to the receiving end R via the channel N, and the receiving end R performs the receiving step S2 .

請再參閱第1及2圖所示,上述接收步驟S2係由上述接收端R依據上述基底金鑰KB量測上述量子|Q M 〉而獲得一第二密文C’,再將該第二密文C’依據上述數值金鑰KV解密而取得一第二輯文M’,再依據上述合併規則A由該第二輯文M’中取得上述第二明文m’。舉例而言,如上表一所示,該接收端R可利用雙方共享的基底金鑰KB(如:〝0101〞)量測上述量子|Q M 〉(如:〝|1〉|-〉|1〉|-〉〞),例如:若該基底金鑰之第i位元為0,該接收端以Z基底量測該量子|Q M 〉之第i位元;若該基底金鑰之第i位元為1,該接收端以X基底量測該量子|Q M 〉之第i位元。進一步獲得該第二密文C’(如:〝1111〞),再將該第二密文C’依據雙方共享的數值金鑰KV解密,例如:採用該接收端R與發送端T雙方認同之方式,將上述第二密文與該數值金鑰進行解密運算,如:採用與上述加密運算方式相對應的 邏輯運算或解密演算法等,以進一步獲得一第二輯文M’(如:〝1100〞),之後,再依據該接收端R與發送端T雙方認同之「串連」或「插入」合併規則A(如:上述第一明文m與第一雜湊值H(m)兩者串連),由該第二輯文M’中取得該第二明文m’(如:〝110〞),其中,在該量子|Q M 〉傳輸的過程中還可加入錯誤更正碼,以編成該量子|Q M 〉之位元,例如:採用漢明碼(Hamming Code)等古典錯誤更正碼,或者,採用如「Phys.Rev.Lett.78,405-408(1997)Quantum Error Correction and Orthogonal Geometry」論文所述的量子錯誤更正碼等,惟不以此為限,,用以避免雜訊干擾,其中,加入錯誤更正碼的過程係熟知該項技藝者可以理解,在此容不贅述。藉此,該發送端T與接收端R之間僅需傳輸一次量子|Q M 〉,且不需透過「公正第三方」提供認證服務,即可讓該發送端T與接收端R安全地相互通訊,相較習知量子通訊方法,本發明量子通訊方法較佳實施例僅需傳送一次量子|Q M 〉,而且不需使用傳統通道傳送認證資料,即可供該接收端R驗證所接收的訊息是否有效,並認證該發送端T的身分是否合法,同時兼具訊息加密及來源認證的功能,達成「提高傳輸效率」及「降低通訊負擔」等功效。 Referring to FIGS. 1 and 2 again, in the receiving step S2, the receiving end R measures the quantum | Q M 〉 according to the base key K B to obtain a second ciphertext C′, and then the first The second ciphertext C' is decrypted according to the numerical value key K V to obtain a second album M', and the second plaintext m' is obtained from the second album M' according to the merge rule A. For example, as shown in Table 1 above, the receiving end R can measure the above quantum | Q M 〉 by using the base key K B (eg, 〝0101〞) shared by both parties (eg: 〝|1>|->| 1>|->〞), for example, if the i-th bit of the base key is 0, the receiving end measures the i-th bit of the quantum | Q M 〉 by the Z base; if the base key is The i bit is 1, and the receiving end measures the i-th bit of the quantum | Q M 〉 by the X base. Further obtaining the second ciphertext C' (eg, 〝1111〞), and then decrypting the second ciphertext C′ according to the numerical key K V shared by the two parties, for example, adopting the receiving end R and the transmitting end T agree The second ciphertext and the numerical key are decrypted, for example, by using a logical operation or a decryption algorithm corresponding to the encryption operation method, to further obtain a second album M' (eg: 〝1100〞), and then according to the “connected” or “inserted” merge rule A agreed by both the receiving end R and the transmitting end T (eg, the first plaintext m and the first hash value H(m) In the second series M', the second plaintext m' (eg: 〝110〞) is obtained, wherein an error correction code may be added during the transmission of the quantum | Q M 〉 The bit of the quantum | Q M 〉, for example, a classical error correction code such as a Hamming Code, or a paper such as "Phys. Rev. Lett. 78, 405-408 (1997) Quantum Error Correction and Orthogonal Geometry" The quantum error correction code, etc., but not limited thereto, to avoid noise interference, , During the addition of error correction code system known in the art may be appreciated, this capacity is not repeated here. Therefore, only the quantum | Q M 〉 needs to be transmitted between the transmitting end T and the receiving end R, and the transmitting end T and the receiving end R can be securely mutually exchanged without providing an authentication service through the “fair third party”. Communication, compared with the conventional quantum communication method, the preferred embodiment of the quantum communication method of the present invention only needs to transmit the quantum | Q M 〉, and does not need to use the traditional channel to transmit the authentication data, that is, the receiving end R can verify the received Whether the message is valid and whether the identity of the sender T is legal, and the functions of message encryption and source authentication are combined to achieve the functions of "improving transmission efficiency" and "reducing communication burden".

請再參閱第1及2圖所示,本發明量子通訊方法較佳實施例還可以包含一認證步驟S3,用以驗證上述第二明文m’是否遭到竄改。該認證步驟S3係由上述接收端R依據上述合併規則A由上述第二輯文M’中取得一第二雜湊值H(m)’,依據上述第二明文m’與上述雜湊函數H(‧)運算而產生一第三雜湊值H(m)”,判斷該第三雜湊值H(m)”與該第二雜湊值H(m)’是否相同,若判斷為是,認可該第二明文m’,若判斷為否,放棄該第二明文m’。詳言之,由於該第二輯文M’(如:〝1100〞)中包含該第二明文m’(如:〝110〞)及第二雜湊值H(m)’(如:〝0〞),故可利用該第二雜湊值H(m)’驗證該第二明文m’是否已被量測或竄改。因此,該接收端R可先以該第二明文m’與雜湊函數H(‧)運算產生該第三雜湊值 H(m)”,倘若該第三雜湊值H(m)”與該第二雜湊值H(m)’相同,則表示該量子|Q M 〉未被量測或竄改,該接收端R能夠「認可」該第二明文m’,並傳送一回應訊息(ack)a至上述發送端T,用以通知該發送端T結束通訊。反之,倘若該量子|Q M 〉已被量測或竄改,則表示該第三雜湊值H(m)”與該第二雜湊值H(m)’應不相同,故該接收端R可以「放棄」該第二明文m’,並傳送一重送訊息(res)r至該發送端T,用以通知該發送端T重新傳送上述第一明文m。藉此,該發送端T與接收端R之間除可相互通訊,更可讓該接收端R驗證該量子|Q M 〉是否已被第三者量測或竄改,確保該第一明文m可正確無誤地進行傳輸。 Referring to FIGS. 1 and 2, the preferred embodiment of the quantum communication method of the present invention may further include an authentication step S3 for verifying whether the second plaintext m' has been tampered with. In the authentication step S3, the receiving end R obtains a second hash value H(m)' from the second set of texts M' according to the merge rule A, according to the second plaintext m' and the hash function H(‧ Calculating to generate a third hash value H(m)", determining whether the third hash value H(m)" is the same as the second hash value H(m)', and if the determination is yes, the second plaintext is recognized m', if the judgment is no, the second plaintext m' is discarded. In detail, since the second album M' (eg: 〝1100〞) contains the second plaintext m' (eg: 〝110〞) and the second hash value H(m)' (eg: 〝0〞) Therefore, the second hash value H(m)' can be used to verify whether the second plaintext m' has been measured or tampered with. Therefore, the receiving end R may first calculate the third hash value H(m) by the second plaintext m' and the hash function H(‧), if the third hash value H(m)" and the second If the hash value H(m)' is the same, it means that the quantum | Q M > is not measured or falsified, and the receiving end R can "accept" the second plaintext m' and transmit a response message (ack) a to the above The sending end T is used to notify the sending end T to end the communication. On the other hand, if the quantum | Q M 〉 has been measured or tampered, it means that the third hash value H(m)” and the second hash value H(m)′ should be different, so the receiving end R can “ The second plaintext m' is discarded, and a resend message (res) r is transmitted to the transmitting end T to notify the transmitting end T to retransmit the first plaintext m. Thereby, the transmitting end T and the receiving end R can communicate with each other, and the receiving end R can verify whether the quantum | Q M 〉 has been measured or tampered by a third party to ensure that the first plaintext m can be Transfer correctly.

其中,倘若該量子|Q M 〉在傳輸過程中被第三者暗中量測,由於該第三者並不知道該第一明文m傳輸時所使用的基底金鑰KB,當該第三者嘗試擷取該第一明文m時,若該基底金鑰KB或數值金鑰KV有誤,例如:該基底金鑰KB只要有1位元錯誤,即會影響測量結果,造成雪崩效應(avalanche effect)等,因此,該第三者無法通過公開檢查。而且,在不知道數值金鑰KV情況下,第三者也無法得知該第一明文m,確保該第一明文m不會洩漏。 Wherein, if the quantum | Q M 〉 is measured darkly by a third party during transmission, since the third party does not know the base key K B used in the transmission of the first plaintext m, when the third party When the first plaintext m is attempted, if the base key K B or the numerical key K V is incorrect, for example, if the base key K B has a 1-bit error, the measurement result is affected, causing an avalanche effect. (avalanche effect), etc., therefore, the third party cannot pass the public inspection. Moreover, in the case where the numerical key K V is not known, the third party cannot know the first plaintext m, and ensures that the first plaintext m does not leak.

藉由前揭之技術手段,本發明量子通訊方法較佳實施例的主要特點列舉如下:由於上述發送端及接收端共享上述基底金鑰及數值金鑰,並公開約定上述合併規則及雜湊函數,因此,該發送端與接收端欲相互通訊時,可由該發送端將上述第一明文依據上述雜湊函數運算而產生上述第一雜湊值,再將該第一明文與該第一雜湊值依據上述合併規則編輯成為上述第一輯文,再將該第一輯文依據該數值金鑰加密產生上述第一密文,再將該第一密文依據該基底金鑰轉換成為上述量子,以便將該量子傳送至上述接收端。之後,該接收端可依據該基底金鑰量測該量子而獲得上述第二密文,再將該第二密文依據上述數值金鑰解密而取得上述第二輯 文,再依據該合併規則由該第二輯文中取得上述第二明文。因此,該發送端與接收端之間僅需傳輸一次量子,即可於通訊過程中同時兼具訊息加密及來源認證功能,且不需透過「公正第三方」提供認證服務,即可相互通訊,進一步提高傳輸效率及降低通訊負擔。 The main features of the preferred embodiment of the quantum communication method of the present invention are as follows: since the transmitting end and the receiving end share the base key and the numerical key, and publicly agree to the merge rule and the hash function, Therefore, when the transmitting end and the receiving end want to communicate with each other, the transmitting end may generate the first hash value according to the hash function operation, and then combine the first plaintext with the first hash value according to the foregoing. The rule editing becomes the first series of texts, and then the first series is encrypted according to the numerical key to generate the first ciphertext, and then the first ciphertext is converted into the quantum according to the base key, so as to Transfer to the above receiving end. Afterwards, the receiving end may obtain the second ciphertext according to the base key, and then decrypt the second ciphertext according to the numerical key to obtain the second essay, and then according to the merging rule. The second plaintext is obtained in the second series. Therefore, only one quantum needs to be transmitted between the transmitting end and the receiving end, so that the message encryption and source authentication functions can be simultaneously performed in the communication process, and communication can be performed without providing an authentication service through an "fair third party". Further improve transmission efficiency and reduce communication burden.

再者,上述接收端還可驗證其所取得的第二明文是否已被量測或竄改,主要依據上述合併規則由上述第二輯文中取得上述第二雜湊值,再依據上述第二明文與上述雜湊函數產生上述第三雜湊值,再判斷該第三雜湊值與該第二雜湊值是否相同,若判斷為是,該接收端認可該第二明文,若判斷為否,該接收端放棄該第二明文,並可請上述發送端重新傳送上述第一明文。藉此,可以加強通訊過程中的訊息來源認證功能,確保該第一明文不會被洩漏或竄改。 Furthermore, the receiving end may further verify whether the second plaintext obtained by the receiving end has been measured or falsified, and obtain the second hash value from the second series according to the combining rule, and then according to the second plaintext and the foregoing The hash function generates the third hash value, and then determines whether the third hash value is the same as the second hash value. If the determination is yes, the receiving end approves the second plaintext, and if the determination is no, the receiving end gives up the first Second, the text can be sent to the sender to retransmit the first plaintext. In this way, the message source authentication function in the communication process can be enhanced to ensure that the first plaintext is not leaked or tampered with.

本發明量子通訊方法較佳實施例,藉由上述發送端及接收端共享上述基底金鑰及數值金鑰,並公開約定上述合併規則及雜湊函數,使該發送端可據以產生上述量子,而且,該量子同時兼具訊息加密及來源認證功能,當該量子經由一次傳送過程到達該接收端後,該接收端即可據以取得該發送端欲傳送的訊息,並確認該訊息是否有被竄改,以取得正確的通訊內容,達到「提高傳輸效率」、「降低通訊負擔」、「不需第三方認證」、「降低通道設置成本」及「避免訊息遭到截獲或竄改」等功效。 In the preferred embodiment of the quantum communication method of the present invention, the transmitting end and the receiving end share the base key and the numerical key, and publicly agree to the combining rule and the hash function, so that the transmitting end can generate the quantum according to the The quantum also has the function of message encryption and source authentication. When the quantum reaches the receiving end through a transmission process, the receiving end can obtain the message to be transmitted by the transmitting end, and confirm whether the message has been tampered with. In order to achieve the correct communication content, achieve "improving transmission efficiency", "reducing communication burden", "no need for third-party certification", "reducing channel setup cost" and "avoiding message interception or tampering".

雖然本發明已利用上述較佳實施例揭示,然其並非用以限定本發明,任何熟習此技藝者在不脫離本發明之精神和範圍之內,相對上述實施例進行各種更動與修改仍屬本發明所保護之技術範疇,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。 While the invention has been described in connection with the preferred embodiments described above, it is not intended to limit the scope of the invention. The technical scope of the invention is protected, and therefore the scope of the invention is defined by the scope of the appended claims.

A‧‧‧合併規則 A‧‧‧ merger rules

C‧‧‧第一密文 C‧‧‧First ciphertext

C’‧‧‧第二密文 C’‧‧‧Second ciphertext

H(‧)‧‧‧雜湊函數 H(‧)‧‧‧ hash function

H(m)‧‧‧第一雜湊值 H(m)‧‧‧ first hash value

H(m)’‧‧‧第二雜湊值 H(m)’‧‧‧ second hash value

H(m)”‧‧‧第三雜湊值 H(m)”‧‧‧ third hash value

KB‧‧‧基底金鑰 K B ‧‧‧Base Key

KV‧‧‧數值金鑰 K V ‧‧‧Numeric Key

M‧‧‧第一輯文 M‧‧‧ first series

M’‧‧‧第二輯文 M’‧‧‧Second

R‧‧‧接收端 R‧‧‧ Receiver

S1‧‧‧傳送步驟 S1‧‧‧Transfer steps

S2‧‧‧接收步驟 S2‧‧‧ receiving steps

S3‧‧‧認證步驟 S3‧‧‧ Certification Steps

T‧‧‧發送端 T‧‧‧Send

|Q M 〉‧‧‧量子 | Q M 〉‧‧‧ Quantum

a‧‧‧回應訊息 a‧‧‧Response message

r‧‧‧重送訊息 r‧‧‧Resend message

m‧‧‧第一明文 m‧‧‧First plaintext

m’‧‧‧第二明文 m’‧‧‧Second plaintext

Claims (9)

一種量子通訊方法,係藉由一發送端及一接收端相互耦接,使該發送端及該接收端能夠相互通訊,該方法之步驟包含:由上述發送端將一第一明文依據一雜湊函數運算而產生一第一雜湊值,再將該第一明文與該第一雜湊值依據一合併規則編輯成為一第一輯文,再將該第一輯文依據一數值金鑰加密而產生一第一密文,再將該第一密文依據一基底金鑰轉換成為一量子,再將該量子傳送至上述接收端;及由上述接收端依據上述基底金鑰量測上述量子而獲得一第二密文,再將該第二密文依據上述數值金鑰解密而取得一第二輯文,再依據上述合併規則由該第二輯文中取得一第二明文。 A quantum communication method is characterized in that a transmitting end and a receiving end are coupled to each other to enable the transmitting end and the receiving end to communicate with each other. The method comprises the following steps: the sending end of the first plaintext according to a hash function The operation generates a first hash value, and then edits the first plaintext and the first hash value into a first series according to a merge rule, and then encrypts the first album according to a numerical key to generate a first a ciphertext, the first ciphertext is converted into a quantum according to a base key, and the quantum is transmitted to the receiving end; and the receiving end obtains a second by measuring the quantum according to the base key. The ciphertext, the second ciphertext is decrypted according to the numerical value key to obtain a second essay, and a second plaintext is obtained from the second essay according to the merging rule. 根據申請專利範圍第1項所述的量子通訊方法,其中上述接收端依據上述合併規則由上述第二輯文中取得一第二雜湊值,依據上述第二明文與上述雜湊函數運算而產生一第三雜湊值,判斷該第三雜湊值與該第二雜湊值是否相同,若判斷為是,該接收端認可該第二明文,若判斷為否,該接收端放棄該第二明文。 According to the quantum communication method of claim 1, wherein the receiving end obtains a second hash value from the second series according to the combining rule, and generates a third according to the second plaintext and the hash function operation. The hash value determines whether the third hash value is the same as the second hash value. If the determination is yes, the receiving end approves the second plaintext. If the determination is no, the receiving end discards the second plaintext. 根據申請專利範圍第2項所述的量子通訊方法,其中若上述接收端判斷該第三雜湊值與該第二雜湊值相同,該接收端傳送一回應訊息至上述發送端,否則,該接收端傳送一重送訊息至該發送端。 According to the quantum communication method of claim 2, wherein the receiving end determines that the third hash value is the same as the second hash value, the receiving end transmits a response message to the transmitting end, otherwise, the receiving end Send a resend message to the sender. 根據申請專利範圍第1或2項所述的量子通訊方法,其中上述基底金鑰、上述第一密文及上述量子分別包含n個位元,若該基底金鑰之第i位元為0,上述發送端將該第一密文之第i位元以Z基底轉換為該量子之第i位元,上述接收端以Z基底量測該量子之第i位元;若該基底金鑰之第i位元為1,該發送端將該第一密文之第i位元以X基底轉換為該量子之第i位元,該接收端以X基 底量測該量子之第i位元;0≦i<n。 The quantum communication method according to claim 1 or 2, wherein the base key, the first ciphertext, and the quantum respectively comprise n bits, and if the i-th bit of the base key is 0, The transmitting end converts the i-th bit of the first ciphertext into the i-th bit of the quantum by the Z-substrate, and the receiving end measures the i-th bit of the quantum by the Z-base; if the base key is The i bit is 1, and the transmitting end converts the i-th bit of the first ciphertext into an ith bit of the quantum by the X base, and the receiving end is based on the X base. The bottom measures the i-th bit of the quantum; 0≦i<n. 根據申請專利範圍第4項所述的量子通訊方法,其中上述量子之第i位元係如下表所示: 其中,Bi為上述基底金鑰之第i位元,Ci為上述第一密文及上述第二密文之第i位元,Qi為該量子之第i位元。 According to the quantum communication method described in claim 4, wherein the ith bit of the quantum is as follows: Wherein B i is the i-th bit of the base key, C i is the i-th bit of the first ciphertext and the second ciphertext, and Q i is the i-th bit of the quantum. 根據申請專利範圍第1或2項所述的量子通訊方法,其中上述第一輯文與上述數值金鑰所包含之位元數相同,上述發送端將該第一輯文與該數值金鑰進行互斥或邏輯運算而產生上述第一密文,上述接收端將上述第二密文與該數值金鑰進行互斥或邏輯運算而產生上述第二輯文。 The quantum communication method according to claim 1 or 2, wherein the first album and the numerical key include the same number of bits, and the transmitting end performs the first album and the numerical key. The first ciphertext is generated by mutual exclusion or logical operation, and the receiving end mutually exclusive or logically operates the second ciphertext and the numerical key to generate the second corpus. 根據申請專利範圍第1或2項所述的量子通訊方法,其中上述第一輯文與上述數值金鑰所包含之位元數相同,上述發送端將該第一輯文與該數值金鑰進行加密運算而產生上述第一密文,上述接收端將上述第二密文與該數值金鑰進行解密運算而產生上述第二輯文。 The quantum communication method according to claim 1 or 2, wherein the first album and the numerical key include the same number of bits, and the transmitting end performs the first album and the numerical key. The first ciphertext is generated by an encryption operation, and the receiving end decrypts the second ciphertext and the numerical key to generate the second album. 根據申請專利範圍第1項所述的量子通訊方法,其中上述第一明文及上述第一雜湊值依據上述合併規則串連成上述第一輯文,上述第二輯文中包含上述第二明文及一第二雜湊值,該第二雜湊值依據該合併規則串連該第二明文。 According to the quantum communication method of claim 1, wherein the first plaintext and the first hash value are concatenated into the first album according to the merge rule, and the second album includes the second plaintext and one a second hash value, the second hash value concatenating the second plaintext according to the merge rule. 根據申請專利範圍第1項所述的量子通訊方法,其中上述第一雜湊值依據上述合併規則插入上述第一明文中而形成上述第一輯 文,上述第二輯文中包含上述第二明文及一第二雜湊值,該第二雜湊值依據該合併規則插入該第二明文中。 According to the quantum communication method of claim 1, wherein the first hash value is inserted into the first plaintext according to the merge rule to form the first series. The second album includes the second plaintext and a second hash value, and the second hash value is inserted into the second plaintext according to the merge rule.
TW102118974A 2013-05-29 2013-05-29 Method for quantum communication TWI487308B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW102118974A TWI487308B (en) 2013-05-29 2013-05-29 Method for quantum communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW102118974A TWI487308B (en) 2013-05-29 2013-05-29 Method for quantum communication

Publications (2)

Publication Number Publication Date
TW201445902A true TW201445902A (en) 2014-12-01
TWI487308B TWI487308B (en) 2015-06-01

Family

ID=52707228

Family Applications (1)

Application Number Title Priority Date Filing Date
TW102118974A TWI487308B (en) 2013-05-29 2013-05-29 Method for quantum communication

Country Status (1)

Country Link
TW (1) TWI487308B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105471587A (en) * 2016-01-18 2016-04-06 成都信息工程大学 Method of building user behavior trustworthy management model employing entangled state as quantum carrier
CN105721157A (en) * 2016-01-18 2016-06-29 成都信息工程大学 Establishing method of node trusted access model by taking entangled state as quantum carrier
TWI715537B (en) * 2015-04-22 2021-01-11 香港商阿里巴巴集團服務有限公司 Encryption machine key injection system, method and device based on cloud environment

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106470101B (en) * 2015-08-18 2020-03-10 阿里巴巴集团控股有限公司 Identity authentication method, device and system for quantum key distribution process
US11218303B2 (en) * 2020-03-27 2022-01-04 Ahp-Tech Inc. Quantum attack-resistant system to facilitate and enhance processes of cryptography key exchange

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1841122A1 (en) * 2006-03-31 2007-10-03 Alain Schumacher Encryption method for highest security applications

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI715537B (en) * 2015-04-22 2021-01-11 香港商阿里巴巴集團服務有限公司 Encryption machine key injection system, method and device based on cloud environment
CN105471587A (en) * 2016-01-18 2016-04-06 成都信息工程大学 Method of building user behavior trustworthy management model employing entangled state as quantum carrier
CN105721157A (en) * 2016-01-18 2016-06-29 成都信息工程大学 Establishing method of node trusted access model by taking entangled state as quantum carrier
CN105471587B (en) * 2016-01-18 2018-06-22 成都信息工程大学 Using Entangled State as the method for building up of the trustworthy user behavior administrative model of quantum carrier
CN105721157B (en) * 2016-01-18 2018-08-24 成都信息工程大学 It is a kind of using Entangled State as the method for building up of the credible access model of the node of quantum carrier

Also Published As

Publication number Publication date
TWI487308B (en) 2015-06-01

Similar Documents

Publication Publication Date Title
CN108292402B (en) Determination of a common secret and hierarchical deterministic keys for the secure exchange of information
CN113038468B (en) Method for distributing and negotiating quantum key of wireless terminal of Internet of things
US8433066B2 (en) Method for generating an encryption/decryption key
US20030084292A1 (en) Using atomic messaging to increase the security of transferring data across a network
CN111092733B (en) Quantum blind double signature method for resisting collective noise
TWI487308B (en) Method for quantum communication
Sharbaf Quantum cryptography: a new generation of information technology security system
Zhou et al. Quantum deterministic key distribution protocols based on the authenticated entanglement channel
Lakshmi et al. Comparison of classical and quantum cryptography using QKD simulator
TW202232913A (en) Generating shared keys
Goyal et al. Quantum cryptography & its comparison with classical cryptography: A review paper
TW202347208A (en) Methods and systems for performing secure transactions
CN108494554B (en) Data symmetric encryption method based on double plaintexts
Chaudhari et al. A research paper on new hybrid cryptography algorithm
CN114499857A (en) Method for realizing data correctness and consistency in big data quantum encryption and decryption
Shah et al. Efficient Cryptography for data security
Suo et al. Encryption technology in information system security
Rizvi et al. EXPLORING MODERN CRYPTOGRAPHY: A COMPREHENSIVE GUIDE TO TECHNIQUES AND APPLICATIONS.
US11811924B1 (en) System and method of securing a server using elliptic curve cryptography
Sarath et al. Dual channel authentication in cryptography using quantum stratagem
Djellab et al. Securing encryption key distribution in WLAN via QKD
Lee The key distribution problem: Prior advances and future challenges
Shrivastava et al. A security enhancement approach in quantum cryptography
Niture Cryptographic Algorithm Analysis and Implementation
Tripathi et al. Post Quantum Cryptography & its Comparison with Classical Cryptography

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees