CN107453868A - A kind of safe and efficient quantum key method of servicing - Google Patents
A kind of safe and efficient quantum key method of servicing Download PDFInfo
- Publication number
- CN107453868A CN107453868A CN201710780932.6A CN201710780932A CN107453868A CN 107453868 A CN107453868 A CN 107453868A CN 201710780932 A CN201710780932 A CN 201710780932A CN 107453868 A CN107453868 A CN 107453868A
- Authority
- CN
- China
- Prior art keywords
- quantum key
- key
- quantum
- service system
- safe
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a kind of safe and efficient quantum key method of servicing, aim to solve the problem that quantum key from QKD networks to flexibility, security and the efficiency of the cross-domain services of traditional secret communication network, realize the real-time access of quantum key with being adapted to using special purpose interface, the physical security of quantum key processing is realized using cross-domain isolation, the safe and efficient service of quantum key is realized using layout and distributed cryptographic ferry-boat is concentrated.The present invention solves security, flexibility and the efficiency of quantum key service by providing safe and efficient quantum key service in QKD node deployment quantum key service systems, and based on traditional secret communication network for the user in regional extent.The present invention is based on its higher security, more easily application access, more flexible service mode, is a member of a political party, political affairs, industry control, finance, the field such as military affairs have a good application prospect.
Description
Technical field
The present invention relates to a kind of safe and efficient quantum key method of servicing.
Background technology
Quantum key distribution (QKD) is a kind of new random key safety on line distribution technology, and it is based on quantum and surveyed not
Quasi- principle and unclonable theorem, by the use of the quantum state of microcosmic particle as information carrier, realize that physics is pacified by quantum channel
Full key distribution.QKD has significant advantage in lifting secret key distribution safety and real-time etc..In national related industry
Under the excitation of policy, under the fast-developing background of cyberspace safe practice, built with QKD network designs and fusion application system
Fast-developing period is stepped into the quantum communications industry development for being set to main body.Due to QKD networks in technical system it is relatively independent, very
Hardly possible is realized and one-line transmission of traditional secret communication network in fiber channel, it is difficult to which it is seamless to carry out safety with legacy communications system
Docking.In order to promote the application of QKD technologies and significantly lift the security of traditional secret signalling, it is necessary to which to solve quantum close
Security, flexibility and the efficiency of key service.
The content of the invention
In order to overcome the disadvantages mentioned above of prior art, the invention provides a kind of safe and efficient quantum key service side
Method, it is intended to solve quantum key from QKD networks to flexibility, security and the efficiency of the cross-domain services of traditional secret communication network
Problem, i.e., the real-time access for realizing quantum key using special purpose interface realize that quantum key is handled with being adapted to using cross-domain isolation
Physical security, using concentrate layout and distributed cryptographic ferry-boat realize the safe and efficient service of quantum key.
The technical solution adopted for the present invention to solve the technical problems is:A kind of safe and efficient quantum key service side
Method, comprise the following steps:
Step 1: originating end proxy server A initiates a session request to responder proxy server B, complete mutually to recognize each other
After card, consult the parameter of quantum key, and ask quantum to quantum key service system A and quantum key service system B respectively
Key;
Step 2: quantum key service system A and quantum key service system B take with proxy server A and agency respectively
Business device B is authenticated confirming with quantum key parameter, and after being confirmed by certification and parameter, respectively to QKD nodes A and QKD
Node B requests quantum key;Otherwise, apply again;
Step 3: QKD nodes A and QKD node B complete be mutually authenticated after, negotiated in real time quantum key or close from quantum
The quantum key with same index number is read in key pond, is then respectively outputted to quantum key service system A and quantum key
Service system B, and quantum key described in safety deleting is distinguished after output;
Step 4: quantum key service system A and quantum key service system B are to the quantum key by detecting and verifying
After carrying out layout, respectively by the quantum key encryption ferry-boat with same key call number to proxy server A and agency service
Device B, and quantum key described in safety deleting and update index respectively after encryption is ferried;
Step 5: proxy server A and proxy server B decrypt quantum key data respectively, and divide after verification passes through
Quantum key is not injected into application system A and application system B, or quantum key data carried out according to identical strategy
Layout processing after be injected into application system A and application system B, or after re-encrypted using public network ferry respectively to answer
With in system A and application system B, and quantum key described in safety deleting is distinguished after quantum key service process is terminated;If
It can not then be applied again by verification.
Compared with prior art, the positive effect of the present invention is:
1. realize the secure accessing with QKD networks:Special purpose interface, cross-domain isolation, maltilevel security mechanism.
2. realize the flexibility of quantum key service:Access in real time is with being adapted to, synchronous crypto-operation, with rear destroyed.
3. realize the rapid abutting joint between QKD networks and widely distributed application terminal:It is close from QKD application quantum in real time
Key, and application terminal is rapidly injected by traditional secret communication network.
By being in regional extent in QKD node deployment quantum key service systems, and based on traditional secret communication network
User safe and efficient quantum key service is provided, while the security, flexibility and the efficiency that solve quantum key service are asked
Topic.The present invention based on its higher security, more easily application access, more flexible service mode, be a member of a political party, political affairs, industry control, gold
Melt, the field such as military affairs has a good application prospect.
Brief description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is the flow chart of the present invention;
Fig. 2 is the functional module of quantum key service system;
Fig. 3 is the fundamental diagram of the present invention.
Embodiment
A kind of safe and efficient quantum key method of servicing, as shown in figure 1, including following content:
According to application system demand, proxy server is to quantum key service system application quantum key;Quantum key takes
Business system is acted on behalf of to QKD node application quantum keys, and the quantum key data encryption ferry-boat after layout to proxy server
Quantum key is injected application system by server by safe interface.
Specifically include following steps:
Step 1:According to application system demand, originating end proxy server A initiates session to responder proxy server B please
Ask;Proxy server A and proxy server B is authenticated based on wildcard therebetween;After completing to be mutually authenticated,
Consult required for application quantum key parameter (comprise at least quantum key data format, group number and length), and respectively to
Quantum key service system A and quantum key service system B request quantum keys.
Step 2:Quantum key service system A and quantum key service system B respectively with proxy server A and agency service
Device B is authenticated confirming with quantum key parameter;After being confirmed by certification and parameter, quantum key service system A and quantum are close
Key service system B is again respectively to QKD node A and QKD Node B requests quantum keys;Otherwise, apply again.
Step 3:QKD nodes A and QKD node B is authenticated based on wildcard therebetween, is passing through certification
Afterwards, negotiated in real time quantum key or quantum key (now, negotiated in real time of the reading with same index number from quantum key pond
Quantum key be used to supplement quantum key pond), and be respectively outputted to quantum key service system A and quantum key service system
B;Then, QKD nodes A and QKD node B distinguishes quantum key described in safety deleting.
Step 4:Quantum key service system A and quantum key service system B carries out randomness detection, one to quantum key
Cause property and completeness check;Layout is carried out according to key format to the quantum key by detecting and verifying, and presses node relationships
With the corresponding cipher key index number of increase such as data length.Quantum key service system A and quantum key service system B are respectively tool
There is the quantum key encryption ferry-boat of same key call number to proxy server A and proxy server B;Then, quantum key takes
Business system A and quantum key service system B distinguishes quantum key described in safety deleting and updates index.
Step 5:Proxy server A and proxy server B decrypts quantum key data respectively, and quantum key has been carried out
Whole property verification;After verification, quantum key is injected into application system A respectively and answered by proxy server A and proxy server B
With system B, or it is injected into application system A after layout processing is carried out to quantum key data according to identical strategy and application is
Unite in B, or ferried respectively in application system A and application system B using public network after re-encrypted, quantum key service
Process terminates;Quantum key described in proxy server A and proxy server B difference safety deletings;If can not by verification,
Again apply.
Wherein, the method for combination of quantum key is, quantum key service system A (assuming that the application system number of its service
Measure as U) quantum key service system B (assuming that its service application system quantity be V) between shared key be designated as key sequence
Arrange KAB;KABIn data split according to key block length, formed scale be U*V matrix MAB(U, V)={ muv},
(muvBe the bit sequence consistent with key block length, u ∈ [0, U-1], v ∈ [0, V-1]), the element m in matrixuvIt is
Shared key between application system u and v;Finally, by the corresponding cipher key index number of the increases such as node relationships, key length, and
MABData in (U, V) matrix carry out safe storage.
Wherein, between quantum key service system, between proxy server, quantum key service system and proxy server
Between secret communication carried out using the traditional wirelessly or non-wirelessly communication technology.
Wherein, KMC (KMC) situation is included, i.e. quantum key service system uses online coded communication
Mode or offline mode receive KMC management, i.e. receive quantum key service and the application management strategy that KMC is issued, report institute
The summary info of the quantum key service of offer.
As shown in Fig. 2 the quantum key service system of the present invention comprises at least following functional module:Authentication and management
Module, quantum key interface module, quantum key processing and orchestration module, coded communication module, system control module.Wherein,
Authentication and management module:Registered using online or offline mode and obtain administrative center's mandate, obtained
Common system initialization key, pre-share intercommunication key and application management strategy;QKD terminals are accessed after completing just dress and authorizing;Base
Body between pre-share intercommunication key realizes quantum key service system, between quantum key service system and proxy server
Part certification.
Quantum key interface module:Quantum key is obtained from QKD nodes, or the quantum key encryption ferry-boat after layout is arrived
Proxy server or application system;And carry out rate adaption, key synchronization adaptation etc. for different types of application interface.
Wherein, rate adaption:It is different according to application system encryption and decryption speed, quantum key is expanded using cryptographic technique
Exhibition or layout.
Key synchronization is adapted to:Smooth alternating synchronization, communication terminal when being changed according to initial synchronisation, new and old key it is abnormal or
In the case of channel abnormal condition situations such as resynchronisation after step-out, using the key with corresponding secret key call number.
Quantum key processing and orchestration module:Randomness detection, uniformity and completeness check, close are carried out to quantum key
Key layout and safety store;The security protection to quantum key is realized using logic isolation and access control technology;To no longer making
Quantum key carries out safety deleting.
Quantum secret communication module:Encrypted using the direct encrypting plaintext data of quantum key, or using classical cryptographic technique
Quantum key, communication is encrypted.The module has traditional Wireless/wired communication function module.
System control module:Other modules are controlled and managed, each module is uniformly coordinated work.
The proxy server of the present invention is included as the situation of autonomous device and as the functional module in application system
Situation;When an application system is directly accessed a quantum key service system, the application system is counted as integration proxy clothes
The application system for device function of being engaged in;In addition, multiple quantum key service systems can be interconnected by hierarchical relationship, i.e. when one
When quantum key service system and the quantum key service system of another access QKD node directly interconnect, quantum key clothes
Business system is seen as proxy server.
The operation principle of the present invention is as shown in figure 3, according to application system or proxy server demand, quantum key service system
System to the application of QKD nodes and caches quantum key in real time, and randomness detection, uniformity and integrality school are carried out to quantum key
Test;Layout is carried out according to key format to the quantum key by detecting and verifying, and increased by node relationships and data length etc.
Add corresponding cipher key index number, storage is then encrypted;According to the application system or agency service in the node serve region
Device application, quantum key service system A and B synchronism output have the quantum key of same key call number, that is, utilized and agency
Shared key between server encrypts the quantum key data, is then sent to proxy server;Proxy server is the amount
Application system is issued after sub-key decryption.Wherein, application system comprises at least various crypto terminals, security gateway, Security routing
Device and dense tubular system (DTS).
Claims (10)
- A kind of 1. safe and efficient quantum key method of servicing, it is characterised in that:Comprise the following steps:Step 1: originating end proxy server A initiates a session request to responder proxy server B, after completing to be mutually authenticated, Consult the parameter of quantum key, and ask quantum key to quantum key service system A and quantum key service system B respectively;Step 2: quantum key service system A and quantum key service system B respectively with proxy server A and proxy server B It is authenticated confirming with quantum key parameter, and after being confirmed by certification and parameter, respectively to QKD node A and QKD nodes B Ask quantum key;Otherwise, apply again;Step 3: QKD nodes A and QKD node B is after completing to be mutually authenticated, negotiated in real time quantum key or from quantum key pond It is middle to read the quantum key with same index number, then it is respectively outputted to quantum key service system A and quantum key service System B, and quantum key described in safety deleting is distinguished after output;Step 4: quantum key service system A and quantum key service system B is carried out to the quantum key by detecting and verifying After layout, the quantum key encryption with same key call number is ferried to proxy server A and proxy server B respectively, And quantum key described in safety deleting and update index respectively after encryption is ferried;Step 5: proxy server A and proxy server B decrypt quantum key data respectively, and respectively will after verification passes through Quantum key is injected into application system A and application system B, or carries out layout to quantum key data according to identical strategy It is injected into after processing in application system A and application system B, or is ferried respectively using public network after re-encrypted and be to application In system A and application system B, and quantum key described in safety deleting is distinguished after quantum key service process is terminated;If can not By verification, then apply again.
- A kind of 2. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:The quantum is close The parameter of key comprises at least data format, group number and the length of quantum key.
- A kind of 3. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:To quantum key Method of combination be, by the shared key K between quantum key service system A and quantum key service system BABIn data according to Key block length is split, and forms the matrix M that scale is U*VAB(U, V)={ muv, wherein muvIt is and key block length Consistent bit sequence, u ∈ [0, U-1], v ∈ [0, V-1]);U, V is respectively the application of quantum key service system A, B service System quantity;Finally, corresponding cipher key index number is increased by node relationships, key length, and by matrix MABData in (U, V) Carry out safe storage.
- A kind of 4. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:Quantum key takes Between business system, between proxy server, between quantum key service system and proxy server using traditional wireless or have Line communication technology carries out secret communication.
- A kind of 5. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:Quantum key takes Business system receives KMC using online coded communication mode or offline mode and issues quantum key service and application pipe Reason strategy, the summary info that provided quantum key service is provided.
- A kind of 6. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:The quantum is close Key service system is implemented function such as by authentication and management module:Registered and obtained using online or offline mode Administrative center authorizes, and obtains common system initialization key, pre-share intercommunication key and application management strategy;Complete just dress and authorizing QKD terminals are accessed afterwards;Realized based on pre-share intercommunication key between quantum key service system, quantum key service system and generation Manage the authentication between server.
- A kind of 7. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:The quantum is close Key service system is implemented function such as by quantum key interface module:Quantum key is obtained from QKD nodes, or after layout Proxy server or application system are arrived in quantum key encryption ferry-boat;And for different types of application interface carry out rate adaption, Key synchronization is adapted to.
- A kind of 8. safe and efficient quantum key method of servicing according to claim 7, it is characterised in that:The code check is fitted It is different according to application system encryption and decryption speed with referring to, quantum key is extended using cryptographic technique or layout;It is described close Key synchronous adaptation refers to abnormal according to smooth alternating synchronization situation when initial synchronisation situation, the replacing of new and old key, communication terminal Or the resynchronisation situation in the case of channel abnormal condition after step-out, using the key with corresponding secret key call number.
- A kind of 9. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:The quantum is close Key service system is handled by quantum key and implemented function such as with orchestration module:Randomness detection, one are carried out to quantum key Cause property and completeness check, key schedule and safety storage;Realized using logic isolation and access control technology to quantum key Security protection;Safety deleting is carried out to the quantum key not used.
- A kind of 10. safe and efficient quantum key method of servicing according to claim 1, it is characterised in that:The agency Server includes the situation as the situation of autonomous device and as the functional module in application system;When an application system is straight When accessing a quantum key service system, the application system is counted as the application system of integration proxy server capability;When When one quantum key service system and the quantum key service system of another access QKD node directly interconnect, the quantum is close Key service system is counted as proxy server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710780932.6A CN107453868B (en) | 2017-09-01 | 2017-09-01 | A kind of safe and efficient quantum key method of servicing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710780932.6A CN107453868B (en) | 2017-09-01 | 2017-09-01 | A kind of safe and efficient quantum key method of servicing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107453868A true CN107453868A (en) | 2017-12-08 |
CN107453868B CN107453868B (en) | 2019-09-24 |
Family
ID=60493642
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710780932.6A Active CN107453868B (en) | 2017-09-01 | 2017-09-01 | A kind of safe and efficient quantum key method of servicing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107453868B (en) |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109039613A (en) * | 2018-09-14 | 2018-12-18 | 国网信息通信产业集团有限公司 | A kind of quantum key distribution system and method |
CN109194471A (en) * | 2018-09-14 | 2019-01-11 | 北京信息科技大学 | A kind of quantum group cipher key negotiation method towards quantum key distribution network |
CN110113149A (en) * | 2019-04-29 | 2019-08-09 | 南通大学 | A kind of implementation method of the quantum key expansion module for AES hardware encryption system |
CN110430053A (en) * | 2019-08-08 | 2019-11-08 | 国网安徽省电力有限公司信息通信分公司 | A kind of distribution method of quantum key, apparatus and system |
CN110601835A (en) * | 2019-09-30 | 2019-12-20 | 南方电网调峰调频发电有限公司信息通信分公司 | Quantum security gateway key online updating method |
CN110708159A (en) * | 2019-08-27 | 2020-01-17 | 杭州闪捷信息科技有限公司 | Multi-data center safety data transmission method based on quantum QKD technology |
CN110808834A (en) * | 2019-11-15 | 2020-02-18 | 中国联合网络通信集团有限公司 | Quantum key distribution method and quantum key distribution system |
CN111342952A (en) * | 2018-12-18 | 2020-06-26 | 杭州希戈科技有限公司 | Safe and efficient quantum key service method and system |
CN111385280A (en) * | 2018-12-29 | 2020-07-07 | 方正国际软件(北京)有限公司 | Data transmission system and method and data ferry subsystem |
CN111490874A (en) * | 2020-04-16 | 2020-08-04 | 广东纬德信息科技股份有限公司 | Distribution network safety protection method, system, device and storage medium |
CN111865590A (en) * | 2020-08-28 | 2020-10-30 | 国科量子通信网络有限公司 | Quantum secret communication technology-based work key distribution system in financial field and application method thereof |
CN112822010A (en) * | 2021-01-28 | 2021-05-18 | 成都信息工程大学 | Removable storage medium management method based on quantum key and block chain |
CN113489586A (en) * | 2021-07-26 | 2021-10-08 | 河南国科量子通信网络有限公司 | VPN network system compatible with quantum key negotiation |
CN114268441A (en) * | 2022-03-03 | 2022-04-01 | 成都量安区块链科技有限公司 | Quantum security application method, client device, server device and system |
CN114337996A (en) * | 2020-10-09 | 2022-04-12 | 广东国科量子通信网络有限公司 | Satellite-ground integrated quantum network and key pool control method thereof |
CN115589283A (en) * | 2022-08-31 | 2023-01-10 | 国网北京市电力公司 | Quantum secret communication interaction system and method for distribution automation service |
CN115720160A (en) * | 2022-11-09 | 2023-02-28 | 中创通信技术(深圳)有限公司 | Data communication method and system based on quantum key |
CN116155621A (en) * | 2023-04-14 | 2023-05-23 | 中国科学技术大学 | Data protection method and system based on IPSec dynamic fusion quantum key |
CN116527259A (en) * | 2023-07-03 | 2023-08-01 | ***量子科技有限公司 | Cross-domain identity authentication method and system based on quantum key distribution network |
CN116846547A (en) * | 2023-05-10 | 2023-10-03 | 成都信息工程大学 | Quantum technology-based political data cross-domain safe transmission model |
CN117176346A (en) * | 2023-11-01 | 2023-12-05 | ***量子科技有限公司 | Distributed quantum key link control method and key management system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120177201A1 (en) * | 2009-09-29 | 2012-07-12 | Qinetiq Limited | Methods and apparatus for use in quantum key distribution |
CN105515766A (en) * | 2015-12-16 | 2016-04-20 | 浙江神州量子网络科技有限公司 | Application method of quantum key in stunnel |
CN105827397A (en) * | 2015-01-08 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Quantum key distribution system, method and device based on trusted relay |
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
-
2017
- 2017-09-01 CN CN201710780932.6A patent/CN107453868B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120177201A1 (en) * | 2009-09-29 | 2012-07-12 | Qinetiq Limited | Methods and apparatus for use in quantum key distribution |
CN105827397A (en) * | 2015-01-08 | 2016-08-03 | 阿里巴巴集团控股有限公司 | Quantum key distribution system, method and device based on trusted relay |
CN105515766A (en) * | 2015-12-16 | 2016-04-20 | 浙江神州量子网络科技有限公司 | Application method of quantum key in stunnel |
CN106357396A (en) * | 2016-09-23 | 2017-01-25 | 浙江神州量子网络科技有限公司 | Digital signature method, digital signature system and quantum key card |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109194471A (en) * | 2018-09-14 | 2019-01-11 | 北京信息科技大学 | A kind of quantum group cipher key negotiation method towards quantum key distribution network |
CN109039613A (en) * | 2018-09-14 | 2018-12-18 | 国网信息通信产业集团有限公司 | A kind of quantum key distribution system and method |
CN109194471B (en) * | 2018-09-14 | 2021-09-07 | 北京信息科技大学 | Quantum group key negotiation method oriented to quantum key distribution network |
CN111342952A (en) * | 2018-12-18 | 2020-06-26 | 杭州希戈科技有限公司 | Safe and efficient quantum key service method and system |
CN111342952B (en) * | 2018-12-18 | 2022-12-09 | 杭州希戈科技有限公司 | Safe and efficient quantum key service method and system |
CN111385280A (en) * | 2018-12-29 | 2020-07-07 | 方正国际软件(北京)有限公司 | Data transmission system and method and data ferry subsystem |
CN110113149B (en) * | 2019-04-29 | 2022-02-22 | 南通大学 | Implementation method of quantum key expansion module for AES hardware encryption system |
CN110113149A (en) * | 2019-04-29 | 2019-08-09 | 南通大学 | A kind of implementation method of the quantum key expansion module for AES hardware encryption system |
CN110430053B (en) * | 2019-08-08 | 2022-05-27 | 国网安徽省电力有限公司信息通信分公司 | Quantum key distribution method, device and system |
CN110430053A (en) * | 2019-08-08 | 2019-11-08 | 国网安徽省电力有限公司信息通信分公司 | A kind of distribution method of quantum key, apparatus and system |
CN110708159A (en) * | 2019-08-27 | 2020-01-17 | 杭州闪捷信息科技有限公司 | Multi-data center safety data transmission method based on quantum QKD technology |
CN110601835A (en) * | 2019-09-30 | 2019-12-20 | 南方电网调峰调频发电有限公司信息通信分公司 | Quantum security gateway key online updating method |
CN110808834A (en) * | 2019-11-15 | 2020-02-18 | 中国联合网络通信集团有限公司 | Quantum key distribution method and quantum key distribution system |
CN110808834B (en) * | 2019-11-15 | 2022-05-27 | 中国联合网络通信集团有限公司 | Quantum key distribution method and quantum key distribution system |
CN111490874A (en) * | 2020-04-16 | 2020-08-04 | 广东纬德信息科技股份有限公司 | Distribution network safety protection method, system, device and storage medium |
CN111490874B (en) * | 2020-04-16 | 2022-09-06 | 广东纬德信息科技股份有限公司 | Distribution network safety protection method, system, device and storage medium |
CN111865590A (en) * | 2020-08-28 | 2020-10-30 | 国科量子通信网络有限公司 | Quantum secret communication technology-based work key distribution system in financial field and application method thereof |
CN114337996A (en) * | 2020-10-09 | 2022-04-12 | 广东国科量子通信网络有限公司 | Satellite-ground integrated quantum network and key pool control method thereof |
CN114337996B (en) * | 2020-10-09 | 2024-03-01 | 广东国科量子通信网络有限公司 | Star-ground integrated quantum network and key pool control method thereof |
CN112822010B (en) * | 2021-01-28 | 2022-08-26 | 成都信息工程大学 | Removable storage medium management method based on quantum key and block chain |
CN112822010A (en) * | 2021-01-28 | 2021-05-18 | 成都信息工程大学 | Removable storage medium management method based on quantum key and block chain |
CN113489586A (en) * | 2021-07-26 | 2021-10-08 | 河南国科量子通信网络有限公司 | VPN network system compatible with quantum key negotiation |
CN113489586B (en) * | 2021-07-26 | 2023-01-31 | 河南国科量子通信网络有限公司 | VPN network system compatible with quantum key negotiation |
CN114268441A (en) * | 2022-03-03 | 2022-04-01 | 成都量安区块链科技有限公司 | Quantum security application method, client device, server device and system |
CN115589283A (en) * | 2022-08-31 | 2023-01-10 | 国网北京市电力公司 | Quantum secret communication interaction system and method for distribution automation service |
CN115720160B (en) * | 2022-11-09 | 2023-09-01 | 中创通信技术(深圳)有限公司 | Data communication method and system based on quantum key |
CN115720160A (en) * | 2022-11-09 | 2023-02-28 | 中创通信技术(深圳)有限公司 | Data communication method and system based on quantum key |
CN116155621B (en) * | 2023-04-14 | 2023-07-11 | 中国科学技术大学 | Data protection method and system based on IPSec dynamic fusion quantum key |
CN116155621A (en) * | 2023-04-14 | 2023-05-23 | 中国科学技术大学 | Data protection method and system based on IPSec dynamic fusion quantum key |
CN116846547A (en) * | 2023-05-10 | 2023-10-03 | 成都信息工程大学 | Quantum technology-based political data cross-domain safe transmission model |
CN116846547B (en) * | 2023-05-10 | 2024-05-24 | 成都信息工程大学 | Quantum technology-based political data cross-domain secure transmission method |
CN116527259A (en) * | 2023-07-03 | 2023-08-01 | ***量子科技有限公司 | Cross-domain identity authentication method and system based on quantum key distribution network |
CN116527259B (en) * | 2023-07-03 | 2023-09-19 | ***量子科技有限公司 | Cross-domain identity authentication method and system based on quantum key distribution network |
CN117176346A (en) * | 2023-11-01 | 2023-12-05 | ***量子科技有限公司 | Distributed quantum key link control method and key management system |
CN117176346B (en) * | 2023-11-01 | 2024-03-08 | ***量子科技有限公司 | Distributed quantum key link control method and key management system |
Also Published As
Publication number | Publication date |
---|---|
CN107453868B (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107453868B (en) | A kind of safe and efficient quantum key method of servicing | |
CN113783836B (en) | Internet of things data access control method and system based on block chain and IBE algorithm | |
CN103354498B (en) | A kind of file encryption transmission method of identity-based | |
CA2303048C (en) | Security method for transmissions in telecommunication networks | |
EP2356772B1 (en) | Quantum key distribution | |
CN104219051B (en) | The communication means and system of a kind of inner group message | |
CN107708112A (en) | A kind of encryption method suitable for MQTT SN agreements | |
CN107040369A (en) | Data transmission method, apparatus and system | |
CN112887338A (en) | Identity authentication method and system based on IBC identification password | |
CN101677269B (en) | Method and system for transmitting keys | |
CN109981584B (en) | Block chain-based distributed social contact method | |
CN101340443A (en) | Session key negotiating method, system and server in communication network | |
CN107172056A (en) | A kind of channel safety determines method, device, system, client and server | |
CA2886849A1 (en) | A secure mobile electronic payment system where only the bank has the key, distributed key handshakes, one way and two way authentication distributed key processes and setting up a dynamic distributed key server | |
WO2023082599A1 (en) | Blockchain network security communication method based on quantum key | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN107104977A (en) | A kind of block chain data safe transmission method based on Stream Control Transmission Protocol | |
CN106027247A (en) | Method for remotely issuing POS key | |
CN109257347A (en) | Communication means and relevant apparatus, storage medium suitable for data interaction between bank | |
CN102088441A (en) | Data encryption transmission method and system for message-oriented middleware | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN109800588A (en) | Bar code dynamic encrypting method and device, bar code dynamic decryption method and device | |
CN112804356B (en) | Block chain-based networking equipment supervision authentication method and system | |
CN100495964C (en) | A light access authentication method | |
CN108881240B (en) | Member privacy data protection method based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |