CN108900298B - Quantum cipher watermark-based private block chain honest node authentication access method - Google Patents

Quantum cipher watermark-based private block chain honest node authentication access method Download PDF

Info

Publication number
CN108900298B
CN108900298B CN201810754285.6A CN201810754285A CN108900298B CN 108900298 B CN108900298 B CN 108900298B CN 201810754285 A CN201810754285 A CN 201810754285A CN 108900298 B CN108900298 B CN 108900298B
Authority
CN
China
Prior art keywords
quantum
mobile terminal
quantum password
honest node
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810754285.6A
Other languages
Chinese (zh)
Other versions
CN108900298A (en
Inventor
吴佳楠
张迪
宋立军
朱德新
陈丽
黄贺艳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changchun University
Original Assignee
Changchun University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changchun University filed Critical Changchun University
Priority to CN201810754285.6A priority Critical patent/CN108900298B/en
Publication of CN108900298A publication Critical patent/CN108900298A/en
Application granted granted Critical
Publication of CN108900298B publication Critical patent/CN108900298B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Abstract

A private block chain honest node authentication access method based on quantum cipher watermarking belongs to the field of quantum secret communication, can generate a security cipher with true randomness, can effectively improve the security and the robustness of a watermarking algorithm when being applied to a digital watermarking technology, and can greatly reduce the possibility of falsifying and attacking a block chain by a credible authentication node network and greatly reduce the risk by permission control by combining a fingerprint identification technology with uniqueness and stability. The honest node authentication access method of the private block chain based on the quantum cryptographic watermark can perform honest node authentication on part or all of access nodes in the block chain, and further enables part or all of the nodes in the block chain to be completely trusted.

Description

Quantum cipher watermark-based private block chain honest node authentication access method
Technical Field
The invention relates to the field of quantum secret communication, in particular to a private block chain honest node authentication access method based on quantum cryptographic watermarks.
Background
The blockchain is a decentralized, non-falsifiable and credible distributed account book, provides a safe, stable, transparent, auditable and efficient way for recording transactions and data information interaction, and can store data and run application programs. At present, the block chain technology is mainly applied to the fields of presence certification, intelligent contracts, internet of things, identity verification, forecasted markets, asset transactions, file storage and the like.
It is characterized in that:
1) highly secure, non-tamperproof distributed ledger.
2) Existing in the internet and open to all users.
3) The point-to-point transaction and interchange between people and things are facilitated.
4) The exchange of value can be accomplished without the intervention of a third party.
The block chain has three main forms: public chain, alliance chain, private chain.
1) Public chains: anyone can read the blockchain information, send a transaction and can be confirmed to participate in the blockchain of the consensus process.
2) Federation chain: the block chain controlled by the preselected node in the consensus process is between the public chain and the private chain, but actually still belongs to the category of the private chain.
3) Private chain: write rights are in only one organization hand, block chains where read rights may be restricted. It is of great value to audit tests within the government of companies and settlement of transactions within banking institutions.
Unlike the fully open, unlicensed public chain, the federation and private chains have limitations on the degree of information disclosure and the strength of central control that can help the blockchain meet different types of application needs. However, as the range is reduced, the security of the private chain is inevitably suspected, and even though the system security guaranteed by the consensus mechanism is more credible, the public chain with a smaller range still has hidden troubles such as 51% attack on the consensus mechanism. Wherein a 51% attack refers to the behavior of a client or an organization after grasping 51% of the computation power of the whole network of the blockchain, and then recalculating the confirmed blockchain by using the computation power, so as to generate fork and gain benefits for the blockchain.
Because the private chain still maintains the characteristics of block chain authenticity and partial decentralization, a system with stricter access right control and limited modification even reading right to a few users needs to be created on the basis of the characteristics, such that decentralization and decentralization are achieved. Meanwhile, an authority setting and admission mechanism needs to be designed to ensure that the nodes of the block chain are basically harmless.
Therefore, compared with a public chain, the private chain has the advantages of wide prospect, popular property, threat reduction, flexibility and the like, but has a trust problem due to the fact that the private chain is closed and the innovation capability is doubtful.
The information security of the quantum communication technology is based on quantum cryptography, the constraint of the traditional encryption method is broken through by taking the quantum state as a key, and the quantum communication technology has the advantages of non-eavesdropping, non-replicability and theoretical unconditional security. Any operation of intercepting or testing the quantum key changes the quantum state, and quantum communication can ensure the absolute safety of key distribution and communication between two places.
Disclosure of Invention
In view of the hidden danger of the consensus mechanism in the block chain technology, the honest node authentication access method of the private block chain based on the quantum cryptographic watermark can perform honest node authentication on part or all access nodes in the block chain, so that part or all the nodes in the block chain are completely trusted.
The invention adopts the following technical scheme:
a private block chain honest node authentication access method based on quantum cryptographic watermarking is characterized in that the method adopts a system comprising: a quantum cipher service region, an authentication service region and an authentication terminal region,
the quantum password service area comprises a quantum password distribution system and a quantum password cloud, wherein the quantum password cloud comprises a quantum password management server, and the quantum password management server is used for receiving a quantum password application, distributing a quantum password, analyzing a mobile terminal identification code, selecting a quantum password distribution terminal close to the mobile terminal to be matched with the mobile terminal, and transmitting the mobile terminal identification code to the quantum password distribution terminal;
the authentication service area comprises a private block chain honest node network and an honest node authentication server, wherein the private block chain honest node network is a network to which the mobile terminal applies for authentication and is to be accessed; the honest node authentication server is used for authenticating the mobile terminal to be accessed into the private block chain honest node network, and registration information and fingerprint information of a user are prestored in the honest node authentication server;
the authentication terminal area comprises a plurality of quantum password distribution terminals and mobile terminals to be authenticated, each quantum password distribution terminal is provided with a corresponding quantum password distribution area, receives a quantum password application request of the mobile terminal in the quantum password distribution area and distributes a quantum password, and the quantum password distribution area where the mobile terminal is located is used as an area identifier and is contained in a mobile terminal identification code of the mobile terminal; when the mobile terminal submits an authentication application to the honest node authentication server, a string of mobile terminal identification codes is generated according to the quantum password distribution area and the unique identification of the mobile terminal, and the mobile terminal identification codes and the authentication application are submitted to the honest node authentication server;
the specific authentication access method comprises the following steps:
1) the mobile terminal to be authenticated sends an authentication application and a mobile terminal identification code to the honest node authentication server;
2) the honest node authentication server verifies the user name and the password of the mobile terminal, and after the verification is successful, the honest node authentication server forwards the identification code of the mobile terminal to the quantum password management server and sends a request for applying the quantum password;
3) the quantum password management server receives a mobile terminal identification code and a request for applying a quantum password which are sent by the honest node authentication server, distributes a pair of quantum password KEY and is matched and associated with the received mobile terminal identification code, and replies the quantum password KEY and the associated mobile terminal identification code to the honest node authentication server; meanwhile, the quantum password management server analyzes the identification code of the mobile terminal to obtain a quantum password distribution area where the mobile terminal is located, and sends the quantum password KEY and the associated identification code of the mobile terminal to the quantum password distribution terminal of the corresponding quantum password distribution area;
4) after receiving the replied quantum password KEY, the honest node authentication server sends an authentication prompt of the quantum watermark fingerprint image to the mobile terminal;
5) after receiving the authentication prompt, the mobile terminal sends a mobile terminal identification code to the quantum password distribution terminal in the quantum password distribution area where the mobile terminal is located, and submits a quantum password application;
6) the quantum password distribution terminal inquires a quantum password KEY associated with the mobile terminal identification code in the internal storage according to the mobile terminal identification code sent by the mobile terminal and replies the quantum password KEY to the mobile terminal;
7) after receiving the quantum password KEY, the mobile terminal prompts a user to input a specified fingerprint through the last two digits of the quantum password KEY and generates a fingerprint image from the input fingerprint; meanwhile, the rest of the quantum password KEY is converted into a binary image, the binary image is embedded into the fingerprint image by using a digital watermark embedding algorithm according to embedding position information provided by the quantum password KEY to generate a quantum watermark fingerprint image, and the quantum watermark fingerprint image is sent to an honest node authentication server to wait for authentication;
8) after receiving the quantum password KEY replied by the quantum password management server, the honest node authentication server calls corresponding fingerprint information of the user in the local library according to the last two bits of the quantum password KEY and converts the rest of the quantum password KEY into a binary image;
9) the honest node authentication server extracts a fingerprint image and a binary image from the quantum watermark fingerprint image transmitted from the mobile terminal according to the embedded position information in the quantum password KEY;
10) and the honest node authentication server compares the extracted fingerprint image and the extracted binary image with the locally stored fingerprint image and binary image respectively, if the comparison fails, the authentication request of the mobile terminal is rejected, and if the comparison succeeds, the mobile terminal is authenticated as an honest node and passes the authentication request of the mobile terminal.
The last two digits of the quantum password KEY in the step 7) take values of 00, 01, 10 or 11, 00, 01, 10 and 11 are input fingerprint numbers, and 00, 01, 10 and 11 respectively correspond to fingerprint information of a thumb, an index finger, a middle finger and a ring finger.
Through the design scheme, the invention can bring the following beneficial effects: the honest node authentication access method of the private block chain based on the quantum cryptographic watermark can perform honest node authentication on part or all of access nodes in the block chain, and further enables part or all of the nodes in the block chain to be completely trusted. The quantum secret communication system based on the quantum secret password distribution mechanism can generate a security password with true randomness, the security password is applied to a digital watermarking technology, the security and the robustness of a watermarking algorithm can be effectively improved, and by combining a fingerprint identification technology with uniqueness and stability, the possibility of falsifying and attacking a block chain is greatly reduced by a credible authentication node network, and the risk can be greatly reduced by authority control.
Drawings
The invention will be further described with reference to the following description and embodiments in conjunction with the accompanying drawings:
fig. 1 is a schematic diagram of a network implementation of the quantum cryptographic watermark-based private block chain honest node authentication access method of the present invention;
FIG. 2 is a flowchart of the operation of the quantum cryptographic watermark-based private block chain honest node authentication access method of the present invention;
fig. 3 is an authentication access timing diagram of the quantum cryptographic watermark-based private block chain honest node authentication access method of the present invention;
FIG. 4 is a quantum cryptography management server process flow diagram;
FIG. 5 is a flow chart of quantum watermark fingerprint image generation;
FIG. 6 is a flow chart of an honest node authentication server authenticating a quantum watermark fingerprint image;
fig. 7 is a view showing a structure of a quantum cryptography.
Detailed Description
In order that the objects, technical solutions and advantages of the present invention will be more clearly understood, the present invention will be further described in detail with reference to the accompanying drawings.
Referring to fig. 1, a system adopted by the private block chain honest node authentication access method based on quantum cryptographic watermarking includes three areas, namely a quantum cryptographic service area, an authentication service area and an authentication terminal area, wherein in the connection relationship among the areas and among the components in the figure, a solid line connection represents a classical wired channel transmission data, a dotted line connection represents a quantum channel transmission data, and a wifi connection represents a classical wireless channel transmission data, and the specific description is as follows:
the quantum password service area mainly comprises a quantum password distribution system and a quantum password cloud, and is used for realizing generation, storage and management of quantum passwords. The quantum password distribution system comprises an Alice sending end and a Bob receiving end and is mainly used for generating a quantum password with true randomness; the quantum password cloud comprises a quantum password management server and is used for processing application of quantum passwords, distributing the quantum passwords, analyzing the identification codes of the mobile terminals, selecting the quantum password distribution terminals nearby the mobile terminals and forwarding the identification codes of the mobile terminals to the quantum password distribution terminals.
The authentication service area contains a private block chain honest node network and honest node authentication servers. The private block chain honest node network is a network to which the mobile terminal applies for authentication and is to be accessed, and nodes in the private block chain honest node network can be regarded as honest nodes, namely blocks generated by the nodes in the private block chain honest node network are credible; the honest node authentication server plays an authentication role of a mobile terminal to be accessed into the private block chain honest node network, and registration information and fingerprint information of a user are prestored in the honest node authentication server.
The authentication terminal area contains a plurality of quantum password distribution terminals, and the mobile terminals to be authenticated are also divided into the area. Each quantum password distribution terminal is provided with a quantum password distribution area which is responsible for the quantum password distribution area and is responsible for the quantum password application of the mobile terminal in the area, and the quantum password distribution area where the mobile terminal is located is embodied in the identification code part of the mobile terminal which is sent by the quantum password distribution area, namely the quantum password distribution area where the mobile terminal is located is used as an area identification to be contained in the identification code of the mobile terminal. The mobile terminal is an initiator of one-time authentication and is also an authenticated person of one-time authentication, and when an authentication application is submitted to the honest node authentication server, a string of mobile terminal identification codes is generated according to the quantum password distribution area and the unique identification of the mobile terminal identification codes and the authentication application and is submitted to the honest node authentication server.
With reference to fig. 2, fig. 3, fig. 4, fig. 5, and fig. 6, the specific flow of the private block chain honest node authentication access method based on quantum cryptographic watermarking is described as follows:
1) the mobile terminal to be authenticated sends an authentication application and a mobile terminal identification code to an honest node authentication server, the honest node authentication server verifies a user name and a password of the mobile terminal, and the authentication application of the mobile terminal is processed after the verification is successful;
2) the honest node authentication server submits a quantum password application to the quantum password management server and forwards a mobile terminal identification code sent by the mobile terminal to the quantum password management server;
3) after the quantum password management server distributes a pair of quantum password KEY and is matched and associated with the received mobile terminal identification code, the quantum password management server sends one of the pair of quantum password KEY to the honest node authentication server;
4) the quantum password management server analyzes the identification code of the mobile terminal to obtain a quantum password distribution area where the mobile terminal is located, and sends the other quantum password KEY and the matched identification code of the mobile terminal to the quantum password distribution terminal of the quantum password distribution area nearby the mobile terminal;
5) after receiving the quantum password KEY, the honest node authentication server sends an authentication prompt of the quantum watermark fingerprint image to the mobile terminal;
6) after receiving the authentication prompt, the mobile terminal sends a mobile terminal identification code to a quantum password distribution terminal in a quantum password distribution area where the mobile terminal is located to submit a quantum password application;
7) the quantum password distribution terminal inquires a quantum password KEY associated with the mobile terminal identification code in the internal storage according to the mobile terminal identification code sent by the mobile terminal and replies the quantum password KEY to the mobile terminal;
8) after receiving the quantum password KEY, the mobile terminal prompts a user to enter fingerprints of corresponding numbers according to the last two digits of the quantum password KEY and converts the rest of the quantum password KEY into a binary image;
9) the mobile terminal combines the embedding position information provided by the quantum password KEY to embed the binary image into the fingerprint image by using a digital watermark embedding algorithm to generate a quantum watermark fingerprint image, and sends the quantum watermark fingerprint image to the honest node authentication server to wait for authentication;
10) after receiving the quantum password KEY replied by the quantum password management server, the honest node authentication server calls corresponding fingerprint information of the user in the local library according to the last two bits of the quantum password KEY and converts the rest of the quantum password KEY into a binary image;
11) the honest node authentication server extracts a fingerprint image and a binary image from the quantum watermark fingerprint image transmitted from the mobile terminal according to the embedded position information in the quantum password KEY;
12) and the honest node authentication server compares the extracted fingerprint image and the extracted binary image with the locally stored fingerprint image and binary image respectively, if the comparison fails, the authentication request of the mobile terminal is rejected, and if the comparison succeeds, the mobile terminal is authenticated as an honest node and passes the authentication request of the mobile terminal.
Fig. 7 shows a quantum cryptography structure diagram of a quantum cryptography watermark-based private block chain honest node authentication access method, which specifically illustrates the following:
1) a quantum password used for the quantum-password-watermark-based private block chain honest node authentication access method should have (n multiplied by m + n +2) bit characters, and is divided into (n +1) parts, and each part of the former n parts has (m +1) bit characters;
2) the first m bit characters of each part of the first n parts are used as quantum digital watermark embedding position information, and the (m +1) th bit characters are used as pixel values for generating the quantum digital watermark;
3) the (n +1) th part of the quantum password is a fingerprint selection bit, and the total number of the quantum passwords is 2 bits, the possible values of the quantum passwords are 00, 01, 10 and 11, the 00, 01, 10 and 11 are input fingerprint numbers, and the 00, 01, 10 and 11 respectively correspond to fingerprint information of a thumb, an index finger, a middle finger and a ring finger;
4) in summary, a quantum cipher with (n × m + n +2) bits can generate a quantum digital watermark with n pixel points, and each pixel point has its corresponding m-bit quantum cipher as its position information for embedding into the fingerprint image, where the fingerprint image in which the quantum digital watermark is embedded is determined by the fingerprint selection bits of the quantum cipher.

Claims (2)

1. A private block chain honest node authentication access method based on quantum cryptographic watermarking is characterized in that the method adopts a system comprising: a quantum cipher service region, an authentication service region and an authentication terminal region,
the quantum password service area comprises a quantum password distribution system and a quantum password cloud, wherein the quantum password cloud comprises a quantum password management server, and the quantum password management server is used for receiving a quantum password application, distributing a quantum password, analyzing a mobile terminal identification code, selecting a quantum password distribution terminal close to the mobile terminal to be matched with the mobile terminal, and transmitting the mobile terminal identification code to the quantum password distribution terminal;
the authentication service area comprises a private block chain honest node network and an honest node authentication server, wherein the private block chain honest node network is a network to which the mobile terminal applies for authentication and is to be accessed; the honest node authentication server is used for authenticating the mobile terminal to be accessed into the private block chain honest node network, and registration information and fingerprint information of a user are prestored in the honest node authentication server;
the authentication terminal area comprises a plurality of quantum password distribution terminals and mobile terminals to be authenticated, each quantum password distribution terminal is provided with a corresponding quantum password distribution area, receives a quantum password application request of the mobile terminal in the quantum password distribution area and distributes a quantum password, and the quantum password distribution area where the mobile terminal is located is used as an area identifier and is contained in a mobile terminal identification code of the mobile terminal; when the mobile terminal submits an authentication application to the honest node authentication server, a string of mobile terminal identification codes is generated according to the quantum password distribution area and the unique identification of the mobile terminal, and the mobile terminal identification codes and the authentication application are submitted to the honest node authentication server;
the specific authentication access method comprises the following steps:
1) the mobile terminal to be authenticated sends an authentication application and a mobile terminal identification code to the honest node authentication server;
2) the honest node authentication server verifies the user name and the password of the mobile terminal, and after the verification is successful, the honest node authentication server forwards the identification code of the mobile terminal to the quantum password management server and sends a request for applying the quantum password;
3) the quantum password management server receives a mobile terminal identification code and a request for applying a quantum password which are sent by the honest node authentication server, distributes a pair of quantum password KEY and is matched and associated with the received mobile terminal identification code, and replies the quantum password KEY and the associated mobile terminal identification code to the honest node authentication server; meanwhile, the quantum password management server analyzes the identification code of the mobile terminal to obtain a quantum password distribution area where the mobile terminal is located, and sends the quantum password KEY and the associated identification code of the mobile terminal to the quantum password distribution terminal of the corresponding quantum password distribution area;
4) after receiving the replied quantum password KEY, the honest node authentication server sends an authentication prompt of the quantum watermark fingerprint image to the mobile terminal;
5) after receiving the authentication prompt, the mobile terminal sends a mobile terminal identification code to the quantum password distribution terminal in the quantum password distribution area where the mobile terminal is located, and submits a quantum password application;
6) the quantum password distribution terminal inquires a quantum password KEY associated with the mobile terminal identification code in the internal storage according to the mobile terminal identification code sent by the mobile terminal and replies the quantum password KEY to the mobile terminal;
7) after receiving the quantum password KEY, the mobile terminal prompts a user to input a specified fingerprint through the last two digits of the quantum password KEY and generates a fingerprint image from the input fingerprint; meanwhile, the rest of the quantum password KEY is converted into a binary image, the binary image is embedded into the fingerprint image by using a digital watermark embedding algorithm according to embedding position information provided by the quantum password KEY to generate a quantum watermark fingerprint image, and the quantum watermark fingerprint image is sent to an honest node authentication server to wait for authentication;
8) after receiving the quantum password KEY replied by the quantum password management server, the honest node authentication server calls corresponding fingerprint information of the user in the local library according to the last two bits of the quantum password KEY and converts the rest of the quantum password KEY into a binary image;
9) the honest node authentication server extracts a fingerprint image and a binary image from the quantum watermark fingerprint image transmitted from the mobile terminal according to the embedded position information in the quantum password KEY;
10) and the honest node authentication server compares the extracted fingerprint image and the extracted binary image with the locally stored fingerprint image and binary image respectively, if the comparison fails, the authentication request of the mobile terminal is rejected, and if the comparison succeeds, the mobile terminal is authenticated as an honest node and passes the authentication request of the mobile terminal.
2. The quantum cryptographic watermark-based private block chain honest node authentication access method of claim 1, characterized in that: the last two digits of the quantum password KEY in the step 7) take values of 00, 01, 10 or 11, 00, 01, 10 and 11 are input fingerprint numbers, and 00, 01, 10 and 11 respectively correspond to fingerprint information of a thumb, an index finger, a middle finger and a ring finger.
CN201810754285.6A 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method Active CN108900298B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810754285.6A CN108900298B (en) 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810754285.6A CN108900298B (en) 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method

Publications (2)

Publication Number Publication Date
CN108900298A CN108900298A (en) 2018-11-27
CN108900298B true CN108900298B (en) 2020-09-18

Family

ID=64348808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810754285.6A Active CN108900298B (en) 2018-07-11 2018-07-11 Quantum cipher watermark-based private block chain honest node authentication access method

Country Status (1)

Country Link
CN (1) CN108900298B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951511A (en) * 2019-01-08 2019-06-28 上海大学 Buyer seller's secure digital Watermarking Protocol generation method based on block platform chain
CN109672518B (en) * 2019-03-02 2022-04-12 西安安盟智能科技股份有限公司 Node data processing of quantum attack resistant blockchains
CN110147683A (en) * 2019-04-26 2019-08-20 江苏信实云安全技术有限公司 Safety of image sharing platform construction method based on block chain
SG11202003810RA (en) * 2019-08-27 2020-05-28 Advanced New Technologies Co Ltd System and method for registering subscribable sub-states in blockchain
US11336462B1 (en) 2019-09-10 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for post-quantum cryptography optimization
US11334667B1 (en) 2020-01-17 2022-05-17 Wells Fargo Bank, N.A. Systems and methods for disparate quantum computing threat detection
US11366897B1 (en) 2020-01-17 2022-06-21 Wells Fargo Bank, N.A. Systems and methods for layered quantum computing detection
CN113765665B (en) * 2021-11-10 2022-02-08 济南量子技术研究院 Block chain network based on quantum key and data secure transmission method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN105812367A (en) * 2016-03-15 2016-07-27 浙江神州量子网络科技有限公司 Authentication system and authentication method of network access device in quantum network
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8693691B2 (en) * 2012-05-25 2014-04-08 The Johns Hopkins University Embedded authentication protocol for quantum key distribution systems
WO2015102694A2 (en) * 2013-09-30 2015-07-09 Hughes Richard J Streaming authentication and multi-level security for communications networks using quantum cryptography

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729256A (en) * 2008-10-24 2010-06-09 深圳宝嘉电子设备有限公司 Security certificate method based on fingerprint, cryptographic technology and fragile digital watermark
CN105812367A (en) * 2016-03-15 2016-07-27 浙江神州量子网络科技有限公司 Authentication system and authentication method of network access device in quantum network
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Enhancing Breeder Document Long-Term Security using Blockchain Technology;Nicolas Buchmann;《IEEE》;20170708;全文 *
融合量子密钥真随机性的二值图像水印;吴佳楠;《光学 精密工程》;20171115(第11期);全文 *

Also Published As

Publication number Publication date
CN108900298A (en) 2018-11-27

Similar Documents

Publication Publication Date Title
CN108900298B (en) Quantum cipher watermark-based private block chain honest node authentication access method
US11496310B2 (en) Methods and systems for universal storage and access to user-owned credentials for trans-institutional digital authentication
CN107925581B (en) Biometric authentication system and authentication server
WO2019232880A1 (en) Biomarker authentication-based block chain secure transaction method and apparatus
CN110959163B (en) Computer-implemented system and method for enabling secure storage of large blockchains on multiple storage nodes
US20030101348A1 (en) Method and system for determining confidence in a digital transaction
JP2012044670A (en) User authentication method based on utilization of biometric identification techniques, and related architecture
IL137099A (en) Method for carrying out secure digital signature and a system therefor
CN109146524A (en) A kind of agricultural product using block chain technology are traced to the source information security solution
US20200007345A1 (en) Apparatus and method for providing authentication, non-repudiation, governed access and twin resolution for data utilizing a data control signature
CN109639711A (en) A kind of Distributed C AS authentication method based on privately owned chain session id
CN117216740A (en) Digital identity authentication method based on blockchain technology
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
CN113938281A (en) Quantum security identity issuing system, issuing method and using method
Sarkar et al. A multi-instance cancelable fingerprint biometric based secure session key agreement protocol employing elliptic curve cryptography and a double hash function
Chaudhary et al. Designing A Secured Framework for the Steganography Process Using Blockchain and Machine Learning Technology
KR102517001B1 (en) System and method for processing digital signature on a blockchain network
Pampori et al. Securely eradicating cellular dependency for e-banking applications
Jamal et al. Enhanced bring your own device (BYOD) environment security based on blockchain technology
WO2023133907A1 (en) Privacy protection biometric authentication method and apparatus, and electronic device
Nguyen et al. Protecting biometrics using fuzzy extractor and non-invertible transformation methods in kerberos authentication protocol
CN111539032A (en) Electronic signature application system resistant to quantum computing disruption and implementation method thereof
Vivek et al. Enhancing the Security of Aadhar Cards using Blockchain and Steganography
Mutharasan et al. Ethereum-Based Certificate Creation and Verification Using Blockchain
Hasson et al. Password authentication scheme based on smart card and QR code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant