WO2023229097A1 - Système et procédé de réseau quantique distribué basé sur une chaîne de blocs pour réseau ido - Google Patents

Système et procédé de réseau quantique distribué basé sur une chaîne de blocs pour réseau ido Download PDF

Info

Publication number
WO2023229097A1
WO2023229097A1 PCT/KR2022/009628 KR2022009628W WO2023229097A1 WO 2023229097 A1 WO2023229097 A1 WO 2023229097A1 KR 2022009628 W KR2022009628 W KR 2022009628W WO 2023229097 A1 WO2023229097 A1 WO 2023229097A1
Authority
WO
WIPO (PCT)
Prior art keywords
data processing
processing request
client terminal
quantum
request message
Prior art date
Application number
PCT/KR2022/009628
Other languages
English (en)
Korean (ko)
Inventor
박종혁
아자위 아비르엘
김태우
Original Assignee
서울과학기술대학교 산학협력단
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 서울과학기술대학교 산학협력단 filed Critical 서울과학기술대학교 산학협력단
Publication of WO2023229097A1 publication Critical patent/WO2023229097A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y30/00IoT infrastructure
    • G16Y30/10Security thereof
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/30Control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to a blockchain-based distributed quantum network system and method for IoT networks, and more specifically, to IoT networks for providing security measures and safe server solutions desired by IoT networks and performing efficient calculations on data. It relates to a blockchain-based distributed quantum network system and method for.
  • the Internet of Things (IoT), a heterogeneous environment of interconnected objects, has experienced exponential growth due to the emergence of 5G networks, artificial intelligence (AI), and blockchain technology.
  • IoT Internet of Things
  • AI artificial intelligence
  • IoT devices in the IoT network are used in various industrial fields such as smart healthcare, smart industry, smart transportation, and smart city, and industrial fields that use IoT devices collect data using IoT devices and use data to utilize technology. Provides practical services to users.
  • smart healthcare services use IoT wearable devices to collect biometric data and exercise information about users in real time
  • smart transportation services use IoT to support fast and efficient communication between vehicles.
  • IoT devices often have limited resources, so they lack computation and battery capacity and are vulnerable to cyber attacks. These problems lead to privacy and confidentiality issues.
  • the data storage of cloud servers continuously stores large amounts of data that require fast and efficient calculations, but there is not enough storage space to resource such large amounts of data, so there is a problem that storage-related failures may occur in the data storage in the near future. do.
  • quantum information technology and quantum computers are the perfect solution to these problems, maintaining safe calculations quickly and efficiently, improving the quality of service and quality of experience, and improving the security of IoT devices. and personal information collected by IoT devices can be strengthened.
  • Patent Document 1 (Republic of Korea) Registered Patent Publication No. 10-2315725
  • the present invention was created to solve the above problems, and the purpose of the present invention is to provide a blockchain for IoT network that provides desirable computing power and improved security in an IoT network environment through blockchain, virtual quantum machine, and edge layer.
  • the goal is to provide a distributed quantum network system and method.
  • a blockchain-based distributed quantum network system for an IoT network includes at least one client terminal that collects data and generates a data processing request message including the data; an edge server that verifies the client terminal by inputting terminal information of the client terminal that generated the data processing request message and the data processing request message into a previously prepared blockchain; and a quantum server that analyzes the data processing request message and performs a data processing request when the edge server completes verification of the client terminal.
  • the edge server sets any one client terminal among the at least one client terminal existing in the blockchain as a confirmation authority node, and transmits the terminal information to the confirmation authority node to confirm the client terminal.
  • a root role is assigned to the verification authority node, a message broadcast is performed until a preset round, and the verification authority node performs message broadcasting through the message broadcast.
  • the client terminal can be verified by comparing different results displayed by .
  • the edge server inputs the data processing request message into a pre-prepared virtual quantum machine and converts it into a qubit, and adds Q-OTP to the data processing request message converted into the qubit.
  • Quantum-based encryption can be performed by applying .
  • the quantum server can access the data processing request message transmitted by the edge server through delegated quantum computing, and perform and store the data processing request of the client's terminal calculated through access.
  • the blockchain-based distributed quantum network method is performed in a blockchain-based distributed quantum network system for IoT networks, and at least one client terminal collects data and includes the data. generating a data processing request message; An edge server verifying the client terminal by inputting terminal information of the client terminal that generated the data processing request message and the data processing request message into a previously prepared blockchain; and when the quantum server completes verification of the client terminal at the edge server, analyzing the data processing request message and performing a data processing request.
  • computing power and security in the IoT environment can be improved by providing a blockchain-based distributed quantum network system and method for IoT networks.
  • the need to have a quantum machine on the client terminal side can be reduced and safe access between the client terminal and the cloud server can be provided.
  • requests from complex client terminals can be calculated while maintaining data and security.
  • Figure 1 is an example diagram of a blockchain-based distributed quantum network system for an IoT network according to an embodiment of the present invention.
  • Figure 2 is an example diagram of a process in which the edge server of Figure 1 performs authentication of a client terminal using blockchain.
  • FIG. 3 is an example diagram of a virtual quantum machine provided on the edge server of FIG. 1.
  • FIG. 4 is a diagram of instructions for the virtual quantum machine of FIG. 3 to convert data into qubits and encode them into a gate.
  • 5 to 11 are diagrams of the gate protocol of FIG. 4.
  • Figure 12 is an example diagram visualizing Q-OTP.
  • FIG. 13 is an algorithm diagram of a process in which the edge server of FIG. 2 performs authentication of a client terminal.
  • Figures 14 and 15 are algorithm diagrams of the process of encoding a gate by the virtual quantum machine of Figure 3.
  • Figure 16 is a flow diagram of a blockchain-based distributed quantum network method according to another embodiment of the present invention.
  • Figure 1 is an example diagram of a blockchain-based distributed quantum network system for an IoT network according to an embodiment of the present invention
  • Figures 2 and 3 show the edge server of Figure 1 performing authentication of a client terminal using a blockchain.
  • This is an example diagram of a virtual quantum machine provided in the process and edge server
  • FIG. 4 is a diagram of instructions for the virtual quantum machine of FIG. 3 to convert data into qubits and encode them into a gate.
  • FIGS. 5 to 11 are diagrams of the gate protocol of FIG. 4, and FIGS. 13 to 15 are diagrams of an algorithm performed in the blockchain-based distributed quantum network system for the IoT network of FIG. 1.
  • the blockchain-based distributed quantum network system 10 for an IoT network includes a terminal layer 11 in which at least one client terminal 111 is provided, and at least one device existing at a preset distance interval. It consists of an edge layer 13 provided with a plurality of edge servers 131 that communicate with the client terminal 111, and a cloud layer 15 provided with a quantum server 155 that communicates with a plurality of edge servers 131. do.
  • At least one client terminal 111, the edge server 131, and the quantum server 155 can communicate over a network.
  • a network refers to a connection structure that allows information to be exchanged between nodes such as terminals and servers.
  • These networks include the Internet, Wireless LAN (Wireless Local Area Network), WAN (Wide Area Network), and PAN. (Personal Area Network), 3G, 5G, LTE (Long Term Evolution), WiFi (Wireless Fidelity), WiMAX (World Interoperability for Microwave Access), WiGig (Wireless gigabit), etc., but are not limited to these.
  • At least one client terminal 111 may be equipped with a wireless communication device that guarantees portability and mobility, an Unmanned Aerial Vehicle (UAV), a closed-circuit television (CCTV) of a smart factory, etc., and such wireless communication device PCS (Personal Communication System), GSM (Global System for Mobile communications), PDC (Personal Digital Celluar), PHS (Personal Handyphone System), PDA (Personal Digital Assistant), IMT (International Mobile Telecommunication)-2000, CDMA (Code Division) Multiple Access)-2000, W-CDMA (W-Code Division Multiple Access), Wibro (Wireless Broadband Internet) terminal, smartphone, smartpad, tablet PC, VR (Virtual Reality) device, HMD ( It may include, but is not limited to, all types of handheld wireless communication devices such as Head Mounted Display, etc., and may be used depending on the field to which the blockchain-based distributed quantum network system for IoT networks (10) is applied. It can be equipped with other wireless communication devices or devices capable of communication such as UAV and CCTV.
  • the blockchain-based distributed quantum network system 10 for an IoT network can configure at least one client terminal 111 existing at a preset distance interval into one cluster.
  • the blockchain-based distributed quantum network system 10 for IoT networks exists in a cluster and is connected to a base station, that is, a base station, to any one client terminal 111 that has been previously authenticated as a trustworthy client terminal 111.
  • a base station that is, a base station
  • client terminal 111 that has been previously authenticated as a trustworthy client terminal 111.
  • the blockchain-based distributed quantum network system 10 for IoT networks combines and inputs the client terminals 111 assigned to the base station in each cluster into the blockchain provided in the edge server 131 to connect each client. Authentication of the terminal 111 may be performed or communication with the client terminal 111 may be performed.
  • At least one client terminal 111 collects data and generates a data processing request message including the data.
  • the data collected by at least one client terminal 111 is information or records collected by each client terminal 111 according to the user's command, and this information or records are IoT raw data, which is very sensitive and personalized. This is data that necessarily requires higher security measures to generate information.
  • At least one client terminal 111 may generate a data processing request message including its terminal information and collected data, and transmit the generated data processing request message to the edge server 131.
  • the edge server 131 when a client terminal 111 present in a cluster managed by the edge server 131 transmits a data processing request message, the edge server 131 sends a data processing request message to the client terminal 111 that generated the data processing request message.
  • the client terminal 111 is verified by inputting the terminal information and data processing request message into a previously prepared blockchain.
  • the edge server 131 can confirm whether the client terminal 111 is a safe and verified terminal by transmitting terminal information to the verification authority node present in the blockchain 1311.
  • the confirmation authority node refers to a client terminal 111 assigned the role of a base station for managing the different client terminals 111 described above. Hereinafter, it will be described as a confirmation authority node.
  • the edge server 131 can check whether the client terminal 111 that transmitted the data processing request message is a client terminal 111 previously connected to the blockchain 1311 through the blockchain-based Practical Byzantine Fault Tolerance algorithm.
  • the edge server 131 sends the terminal of the client terminal 111 to the confirmation authority node that verifies the client terminal 111.
  • a confirmation request containing information may be forwarded.
  • the confirmation authority node verifies the client terminal 111 through the client ID stored in the terminal information of the client terminal 111, and if the client ID is the same as the client terminal 111 that generated the data processing request message, confirmation An authentication message for the request may be delivered to the edge server 131.
  • the edge server 131 verifies the identity of the client ID included in the terminal information with the client terminal 111 that generated and delivered the data processing request message through an authentication message transmitted from the confirmation authority node, and when confirmation is completed, , by further assigning the root role to the verification authority node that delivered the authentication message, message broadcasting can be performed up to a preset round.
  • the confirmation authority node delivers the message to all client terminals 111 connected to the confirmation authority node up to a preset round, and among all client terminals 111, the client terminal 111 that generated the data processing request message responds to the message. Result messages can be transmitted up to a preset round.
  • the confirmation authority node when it reaches a preset round, it is transformed into a commit state and can display the result generated through message broadcast as the number of messages delivered to all client terminals 111.
  • the confirmation authority node counts the number of result messages transmitted up to the 2f+1 round by the client terminal 111 that generated the data processing request message, and the result generated by broadcasting the number of messages and the commit status as a result of counting
  • the number of messages can be transmitted to the edge server 131.
  • the edge server 131 compares the number of result messages delivered by the verification authority node and the number of messages generated by broadcasting the commit status of the storage of the verification authority node to the client terminal 111 that delivered the data processing request message. ) can be verified whether it is a client terminal 111 that exists in a pre-established blockchain. At this time, if the number of different messages is not the same through comparison, the edge server 131 may omit the data processing request message delivered by the client terminal 111.
  • the blockchain-based quantum network system 10 for IoT networks is secure and can provide the protection desired by users using the client terminal 111 by setting only authenticated client terminals 111 as part of the system, Only honest, verified users can use the system, enhancing security within the IoT network.
  • the edge server 131 when the edge server 131 completes verification of the client terminal 111 that delivered the data processing request message, it inputs the data processing request message into the pre-prepared virtual quantum machine 133 to It can be converted to qubits.
  • a qubit is the basic unit for calculation by a quantum computer, and is a bit that has the states of 0 and 1 simultaneously, and the virtual quantum machine 133 is located between the existing client terminal 111 and the quantum server 155 in the cloud layer 15.
  • QMT Quantum Machine Terminal
  • This QMT is equipped with an encoding gate and a compiler, reducing the need for a quantum computer in a cloud environment or smart city environment, and performing quantum-based encryption to strengthen communication security between the client terminal 111 and the quantum server 155. .
  • the QMT provided in the edge server 131 can convert a data processing request message generated as a classic bit into a qubit using an encoding gate.
  • QMT can encode the data processing request message converted to qubits using an encoding gate.
  • the QMT is a plurality of gates 135 that communicate with the quantum server 155, and can transmit qubits by distributing Rx, Ry, and Rz Quantum Logical Gates in advance. here , and is defined as [Equation 1] to [Equation 3] below.
  • the edge server 131 uses Rx, Ry, and Rz as gates 135 for transmitting data to the quantum server 155, and may further include a CNOT gate to transmit data.
  • the edge server 131 converts the data processing request message prepared as a classic bit into a plurality of qubits using QMT, and converts the converted qubits into one of the plurality of gates 135 provided as Rx, Ry, and Rz. It can be encoded in the gate 135 and transmitted to the quantum server 155.
  • the edge server 131 may further provide QSDC (Quantum Secure Direct Communication) to improve the calculation perspective and error accuracy that occurs in the process of transmitting qubits to the quantum server 155.
  • QSDC Quadratum Secure Direct Communication
  • the edge server 131 can deliver a secure message using QSDC without generating a separate shared secret key.
  • edge server 131 may further use QSDC to use QMT as a device for communicating with at least one client terminal 111 for which verification has been completed.
  • photons can be polarized based on one of four main states:
  • the edge server 131 receives an encrypted data processing request message through QMT, randomly selects a set of photons to be measured, and can check whether an eavesdropper exists based on the concept of error rate.
  • the edge server 131 may determine that the communication channel is safe and maintain communication, and if the error rate is high, it may determine that an eavesdropper exists in the communication channel and stop communication.
  • the edge server 131 before delivering the data processing request message converted to qubits to the quantum server 155, the edge server 131 further performs quantum-based encryption by applying Q-OTP to the data processing request message converted to qubits. It can be done.
  • the edge server 131 can apply the Q-OTP (Quantum One-Time Pad) shown in FIG. 12 to the data processing request message converted to qubits, where Q-OTP is a standard-based operation. It is an encryption technique that performs encryption by simultaneously using the Q-OTP (Quantum One-Time Pad) shown in FIG. 12 to the data processing request message converted to qubits, where Q-OTP is a standard-based operation. It is an encryption technique that performs encryption by simultaneously using the
  • [Equation 4] is an equation representing encryption performed by applying Q-OTP to a data processing request message converted to qubits
  • [Equation 5] is a data processing request encrypted through [Equation 4]. This is a mathematical expression that represents the decryption of a message.
  • e is an encryption function
  • both X and Z operations are operations used to encrypt random qubits.
  • Q-OTP defined by [Equation 4] and [Equation 5] can perform encryption with the values shown in FIG. 12.
  • the edge server 131 encodes the qubits of the data processing request message encrypted through Q-OTP into the prepared gate 135 among the plurality of gates 135 provided as Rx, Ry, and Rz to perform quantum processing. It can be delivered to the server 155.
  • the edge server 131 verifies at least one client terminal 111 by performing the algorithm shown in FIGS. 13 to 15, converts the data processing request message of the verified client terminal 111 into qubits, and , Encryption is performed by applying Q-OTP to the converted qubit, and the qubit of the encrypted data processing request message is encoded in the prepared gate 135 among the plurality of gates 135 provided as Rx, Ry, and Rz. You can.
  • the quantum server 155 analyzes the data processing request message and performs a data processing request.
  • the quantum server 155 transmits the qubit of the encrypted data processing request message through the prepared gate 135 of the plurality of gates 135 provided by the edge server 131 as Rx, Ry, and Rz.
  • the data processing request message can be accessed through delegated quantum computing, and the data processing request of the client terminal calculated through access can be performed and stored.
  • delegated quantum computing can be prepared to maximize the use of quantum computing performance while protecting the user's data and computing security.
  • the quantum server 155 uses the gate protocol sequence shown in FIGS. 5 to 11 to perform data processing according to the data processing request message and calculation tasks for storing the message using delegated quantum computing.
  • a quantum circuit consisting of a set of measured angles can be constructed.
  • the ⁇ You can.
  • the quantum server 155 accesses only the prepared gate 135 among the plurality of gates 135 provided by Rx, Ry, and Rz in which the edge server 131 encodes the qubits of the encrypted data processing request message.
  • the data can be processed by analyzing the data processing request message, and the qubits of the encrypted data processing request message can be stored in the internal storage space.
  • the blockchain-based distributed quantum network system 10 for IoT networks improves computing power and security in the IoT environment and reduces the need to have a quantum machine on the client terminal 111 side. It can provide safe access between the quantum server 155 and the quantum server 155, and can provide the effect of performing complex calculations requested by the client terminal 111 while maintaining security for data stored in the quantum server 155.
  • FIG 16 is a flow diagram of a blockchain-based distributed quantum network method according to an embodiment of the present invention.
  • the blockchain-based distributed quantum network method according to an embodiment of the present invention uses the IoT network shown in Figures 1 to 15. Since it is carried out on the same configuration as the blockchain-based distributed quantum network system 10 for the IoT network, the same reference numerals as the blockchain-based distributed quantum network system for the IoT network of FIGS. 1 to 15 are assigned, and repeated descriptions are omitted. do.
  • the distributed quantum network method (hereinafter, the method) according to an embodiment of the present invention is a method performed in the blockchain-based quantum network system 10 for an IoT network, and includes at least one client terminal 111. ), edge server 131, and quantum server 155.
  • At least one client terminal 111 collects data and performs a step 1610 of generating a data processing request message including the data.
  • the data collected by at least one client terminal 111 is information or records collected by each client terminal 111 according to the user's command, and this information or records are IoT raw data, which is very sensitive and personalized. This is data that necessarily requires higher security measures to generate information.
  • At least one client terminal 111 may generate a data processing request message including its terminal information and collected data, and transmit the generated data processing request message to the edge server 131.
  • the edge server 131 inputs the terminal information of the client terminal 111 that generated the data processing request message and the data processing request message into the previously prepared blockchain 1311 to verify the client terminal 111. Step 1630 is performed.
  • the edge server 131 uses blockchain-based software to confirm whether the client terminal 111 that transmitted the data processing request message is a client terminal 111 previously connected to the blockchain and to verify the safety of the client terminal 111.
  • the Practical Byzantine Fault Tolerance algorithm can be performed.
  • edge server 131 when the edge server 131 completes verification of the client terminal 111 that delivered the data processing request message, it inputs the data processing request message prepared as a classic bit into the pre-prepared virtual quantum machine 133 and converts it into a qubit.
  • quantum-based encryption can be performed by applying Q-OTP to the data processing request message converted to qubits.
  • the edge server 131 encodes the qubits of the quantum-based encryption performed data processing request message into the prepared gate 135 of the plurality of gates 135 previously connected to the quantum server 155. ) can be passed on.
  • the quantum server 155 performs step 1650 of analyzing the data processing request message and performing a data processing request.
  • the quantum server 155 encodes and transmits the qubits of the data processing request message on which quantum-based encryption was performed in the edge server 131 to the prepared gate 135 among the plurality of gates 135 connected in advance.
  • the gate can be accessed through delegated quantum computing, the data processing request of the client terminal 111 calculated through access can be performed, and stored in a separate storage space provided internally.
  • the method can provide secure access between the client terminal 111 and the quantum server 155 by improving computing power and security in an IoT environment and reducing the need to have a quantum machine on the client terminal 111 side. It can provide the effect of performing complex calculations requested by the client terminal 111 while maintaining security for data stored in the quantum server 155.
  • Such a method may be implemented as an application or in the form of program instructions that can be executed through various computer components and recorded on a computer-readable recording medium.
  • the computer-readable recording medium may include program instructions, data files, data structures, etc., singly or in combination.
  • the program instructions recorded on the computer-readable recording medium may be those specifically designed and configured for the present invention, or may be known and usable by those skilled in the computer software field.
  • Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks and magnetic tapes, optical recording media such as CD-ROMs and DVDs, and magneto-optical media such as floptical disks. media), and hardware devices specifically configured to store and perform program instructions, such as ROM, RAM, flash memory, etc.
  • Examples of program instructions include not only machine language code such as that created by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like.
  • the hardware device may be configured to operate as one or more software modules to perform processing according to the invention and vice versa.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Power Engineering (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

La présente invention concerne un système de réseau quantique distribué basé sur une chaîne de blocs pour un réseau IdO, comprenant : au moins un terminal client qui collecte des données et génère un message de demande de traitement de données comprenant les données ; un serveur périphérique qui vérifie le terminal client en entrant des informations de terminal du terminal client qui a généré le message de demande de traitement de données, et le message de demande de traitement de données dans une chaîne de blocs pré-agencée ; et un serveur quantique qui analyse le message de demande de traitement de données et effectue une demande de traitement de données lorsque le serveur périphérique achève la vérification du terminal client. En raison de cette caractéristique, le système de réseau quantique distribué basé sur une chaîne de blocs pour un réseau IdO fournit une puissance de calcul recherchée et une sécurité améliorée dans l'environnement de réseau IdO.
PCT/KR2022/009628 2022-05-23 2022-07-05 Système et procédé de réseau quantique distribué basé sur une chaîne de blocs pour réseau ido WO2023229097A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2022-0063006 2022-05-23
KR1020220063006A KR102564375B1 (ko) 2022-05-23 2022-05-23 IoT 네트워크를 위한 블록체인 기반 분산 양자 네트워크 시스템 및 방법

Publications (1)

Publication Number Publication Date
WO2023229097A1 true WO2023229097A1 (fr) 2023-11-30

Family

ID=87567064

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2022/009628 WO2023229097A1 (fr) 2022-05-23 2022-07-05 Système et procédé de réseau quantique distribué basé sur une chaîne de blocs pour réseau ido

Country Status (2)

Country Link
KR (1) KR102564375B1 (fr)
WO (1) WO2023229097A1 (fr)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180375869A1 (en) * 2017-06-27 2018-12-27 Alibaba Group Holding Limited Multi-blockchain network data processing
KR20200144756A (ko) * 2019-06-19 2020-12-30 에스케이텔레콤 주식회사 블록체인 기반 합의 장치 및 방법

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101830339B1 (ko) * 2016-05-20 2018-03-29 한국전자통신연구원 양자 네트워크상에서의 양자키 분배 장치 및 방법
KR20190034048A (ko) * 2017-09-22 2019-04-01 삼성전자주식회사 암호화 보안 프로토콜 기반 통신을 이용한 클라이언트의 서버 등록 방법 및 암호화 보안 프로토콜 기반 통신을 이용한 클라이언트와 서버간 무결성 검증 방법
KR20190046624A (ko) * 2017-10-25 2019-05-07 고려대학교 산학협력단 일회용 비밀번호 생성 장치 및 qotp 프로토콜에 의한 인증 방법
KR102315725B1 (ko) 2020-01-01 2021-10-22 채령 Qrn key 분배방법 및 이종망 qrn key 분배 하이브리드 양자통신 폐쇄망 시스템
KR20220026326A (ko) * 2020-08-25 2022-03-04 주식회사 케이티 Did 블록체인을 활용한 양자암호통신서비스 제공 방법 및 그 시스템

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180375869A1 (en) * 2017-06-27 2018-12-27 Alibaba Group Holding Limited Multi-blockchain network data processing
KR20200144756A (ko) * 2019-06-19 2020-12-30 에스케이텔레콤 주식회사 블록체인 기반 합의 장치 및 방법

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ADAM J BENNET; SHAKIB DARYANOOSH: "Energy efficient mining on a quantum-enabled blockchain using light", ARXIV.ORG, 25 February 2019 (2019-02-25), XP081033254 *
EL AZZAOUI ABIR, SHARMA PRADIP KUMAR, PARK JONG HYUK: "Blockchain-based delegated Quantum Cloud architecture for medical big data security", JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, ACADEMIC PRESS, NEW YORK, NY,, US, vol. 198, 1 February 2022 (2022-02-01), US , pages 103304, XP093111471, ISSN: 1084-8045, DOI: 10.1016/j.jnca.2021.103304 *
LI YUPENG, KIM KITAK, DING YU: "Research on Optimization of Blockchain Network and Data Communication in the Ecological Structure of Sports Industry", WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, JOHN WILEY & SONS, vol. 2021, 27 September 2021 (2021-09-27), pages 1 - 11, XP093111472, ISSN: 1530-8669, DOI: 10.1155/2021/3523681 *

Also Published As

Publication number Publication date
KR102564375B1 (ko) 2023-08-09

Similar Documents

Publication Publication Date Title
Ye et al. An efficient authentication and access control scheme for perception layer of internet of things
CN109041057A (zh) 一种基于5g aka的核心网网元间鉴权流程安全性增强方法
CN111935714B (zh) 一种移动边缘计算网络中身份认证方法
Altamimi Security and privacy issues in eHealthcare systems: Towards trusted services
Tabassum et al. Security issues and challenges in IoT
Hou et al. Design and prototype implementation of a blockchain-enabled LoRa system with edge computing
Liu et al. Study on network security based on PCA and BP neural network under green communication
Fang et al. A secure and fine-grained scheme for data security in industrial IoT platforms for smart city
Ali et al. Uplifting healthcare cyber resilience with a multi-access edge computing zero-trust security model
Kumar et al. Blockchain-enabled secure communication for unmanned aerial vehicle (UAV) networks
Erroutbi et al. Secure and lightweight HMAC mutual authentication protocol for communication between IoT devices and fog nodes
Goswami et al. A blockchain-based authentication scheme for 5g-enabled iot
CN211352206U (zh) 基于量子密钥分发的IPSec VPN密码机
WO2022075815A1 (fr) Procédés et systèmes pour l'authentification et l'établissement d'une connexion sécurisée pour des services informatiques de périphérie
Deb et al. CovChain: Blockchain-enabled identity preservation and anti-infodemics for COVID-19
Charaf et al. A distributed XACML based access control architecture for IoT systems
Cho et al. Secure open fronthaul interface for 5G networks
WO2023229097A1 (fr) Système et procédé de réseau quantique distribué basé sur une chaîne de blocs pour réseau ido
CN116208330A (zh) 一种基于量子加密的工业互联网云边协同数据安全传输方法及系统
Abdukhalilov Problems of security networks internet things
CN113242216A (zh) 一种基于国产商用密码算法的可信网络摄像机
Kandavel et al. A novel royal seal cloudlet for security enhancement in mobile cloud computing
Li et al. A Secure and Effective Authentication Method in 5G
Sujithra et al. Iot security challenges and issues–an overview
Meng et al. A Novel Multi-Party Authentication Scheme for FCN-based MIoT Systems in Natural Language Processing Environment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22943904

Country of ref document: EP

Kind code of ref document: A1