Movatterモバイル変換


[0]ホーム

URL:


CN115913521B - Method for identity authentication based on quantum key - Google Patents

Method for identity authentication based on quantum key
Download PDF

Info

Publication number
CN115913521B
CN115913521BCN202110891668.XACN202110891668ACN115913521BCN 115913521 BCN115913521 BCN 115913521BCN 202110891668 ACN202110891668 ACN 202110891668ACN 115913521 BCN115913521 BCN 115913521B
Authority
CN
China
Prior art keywords
key
authentication
communication
identity
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110891668.XA
Other languages
Chinese (zh)
Other versions
CN115913521A (en
Inventor
王琳
高洁
周飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan Institute of Quantum Technology
Original Assignee
Jinan Institute of Quantum Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan Institute of Quantum TechnologyfiledCriticalJinan Institute of Quantum Technology
Priority to CN202110891668.XApriorityCriticalpatent/CN115913521B/en
Publication of CN115913521ApublicationCriticalpatent/CN115913521A/en
Application grantedgrantedCritical
Publication of CN115913521BpublicationCriticalpatent/CN115913521B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Landscapes

Abstract

Translated fromChinese

本发明提供了一种基于量子密钥进行身份认证的方法,通信双方在进行身份认证和数据传输中,用于消息校验码的共享密钥从量子密钥分发网络获取,在进行身份认证过程中,对双方所传递认证消息的校验码使用共享的量子密钥作为密钥进行计算,通过对消息校验码的鉴别来验证对方的身份及传输数据的完整性;共享量子密钥在使用后即进行清除,在下一次通信时选取新的密钥;可以降低预置共享密钥的复杂度,缩短共享量子密钥的更新周期,提高密钥的安全性。

The present invention provides a method for identity authentication based on quantum keys. When the communicating parties perform identity authentication and data transmission, a shared key for a message check code is obtained from a quantum key distribution network. During the identity authentication process, the check code of the authentication message transmitted by the two parties is calculated using the shared quantum key as a key. The identity of the other party and the integrity of the transmitted data are verified by identifying the message check code. The shared quantum key is cleared after use, and a new key is selected in the next communication. The complexity of presetting the shared key can be reduced, the update cycle of the shared quantum key can be shortened, and the security of the key can be improved.

Description

Method for identity authentication based on quantum key
Technical Field
The invention belongs to the technical field of quantum communication, and particularly relates to a method for identity authentication based on a quantum key.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
Identity authentication is the process of verifying whether the true identity of a user matches the identity it claims to be. Authentication based on symmetric keys requires that the prover and verifier share a key by which trust relationships are maintained with each other. The method comprises the steps of sending a section of different data, usually a section of different random numbers, to a proving party by a verifying party during each authentication, giving corresponding response according to agreed rules after the verifying party receives data messages, and verifying the identity of the proving party according to the correctness of the agreed rules compared with the response messages. If the two communication parties respectively serve as the evidence party and the opposite party to carry out one-time identity authentication, the two-way identity authentication is completed, namely, the two parties respectively authenticate the identity of the opposite party.
However, in the existing technical solutions for identity authentication based on symmetric passwords, key sharing is mostly needed between two users, so that if users in the network need to perform identity authentication, the users need to share keys between two users. Assuming that the number of user nodes in the network is N, the number of keys to be shared is N (N-1)/2, and as the number of user nodes increases, the number of keys to be preset increases sharply, and the difficulty and cost of the preset keys also increase continuously. Meanwhile, in order to ensure that the shared key is not stolen by others, the key needs to be updated frequently to reduce the security problem caused by the fact that an attacker steals the key.
Disclosure of Invention
In order to solve the problems, the invention provides a method for carrying out identity authentication based on a quantum key, which adopts a mode of acquiring a shared key from a quantum key distribution network, the complexity of presetting the shared key by the user can be greatly reduced, and the security of the identity authentication process is enhanced.
According to some embodiments, the present invention employs the following technical solutions:
A method for identity authentication based on quantum key comprises the following steps:
Each communication direction sends a request to a quantum key distribution node connected with the communication direction, and the quantum key which is the same as other communication parties participating in identity authentication is obtained;
each communication party divides the acquired multiple groups of quantum keys into an authentication key pool and a communication key pool for storage respectively;
One communication party initiates an identity authentication request, receives authentication results of other communication parties on the identity information of the requesting party, authenticates the identity information of the opposite party, authenticates the identity of the opposite party through authentication of the message check code in the authentication process, and obtains a shared secret key for calculating the message check code from an authentication secret key pool;
After the identity information passes verification, data transmission is carried out, the transmitted data is encrypted by utilizing an encryption key obtained from a communication key pool, and a check code for verifying the identity of a data sender and the integrity of the data is obtained by calculating the check code obtained from the communication key pool.
As an alternative embodiment, the communication parties participating in the information interaction are configured or connected with quantum key distribution nodes, the quantum key distribution nodes distribute shared quantum keys through a quantum key distribution technology, and the communication parties acquire the shared quantum keys through the quantum key distribution nodes.
As an alternative embodiment, the quantum key distribution node comprises a quantum key distribution device and a quantum key management device according to the actual deployment of the quantum key distribution network.
Alternatively, the communication key pool includes an encryption key and a verification key, and the storage medium capacity of the authentication key pool and the communication key pool is set by the communication requirement of the communication party.
Alternatively, the authentication key pool and the communication key pool are labeled with key type and key identification information when stored.
As an alternative embodiment, each authentication key in the authentication key pool, each communication key in the communication key pool is used only once, and is cleared after use, and a new key is used in the next communication.
As an alternative embodiment, when one of the communication parties initiates an identity authentication request, user information of the communication party and a locally generated random number are sent, wherein the user information comprises at least one of a user name, a user IP address and a user serial number.
The method comprises the steps of receiving a request message, selecting a first key for authentication from an authentication key pool by a receiver, calculating a message check code of a local random number of the request party by using the first key as a response message, generating another section of random number locally, and sending user information, the response message, a key identification of the first key and the other random number to the identity authentication request party together.
As a further limitation, when the message check code of the local random number of the requester is calculated using the first key as the response message, the calculation method is an HMAC algorithm implemented as a one-way hash function or a block cipher calculation method is used.
As an alternative implementation mode, the process of verifying the identity information of the opposite party by the requesting party comprises the steps of verifying whether the user information of the opposite party is legal or not, and terminating the authentication process if the user is illegal; if the user is legal, selecting a corresponding authentication key from the authentication key pool according to the authentication key identification, calculating a message check code of the random number of the user, comparing the message check code with the received response message, if the comparison fails, terminating the authentication process, and sending a message of authentication failure to the opposite party, if the comparison succeeds, sending a message of authentication success to the opposite party.
Alternatively, the process of verifying the identity information of the requester by the receiver includes:
The identity authentication requester selects a second authentication key from the authentication key pool, calculates a message check code of another random number sent by the opposite party by using the second authentication key, and sends the local user information, the message check code and a second authentication key identifier to the identity authentication receiver;
After receiving the information, the identity authentication receiver firstly verifies the validity of the user information of the identity authentication requester, then selects a corresponding second authentication key according to the authentication key identification, calculates the message check code of another random number by using the key, compares the message check code with the received message check code, if the comparison fails, terminates the authentication process, and sends a message of failure in verification to the identity authentication requester, if the comparison succeeds, sends a message of success in authentication to the identity authentication requester, and the identity authentication of both sides is successful.
When data is transmitted, a data transmitting end selects a key of a first key identifier from a communication key pool as an encryption key, selects a key of a second key identifier as a check key, encrypts data to be transmitted by using the encryption key to generate a ciphertext, calculates a message check code by using the check key to information containing the ciphertext, the user information of the transmitting end, the first key identifier and the second key identifier, and transmits the ciphertext, the user information of the transmitting end, the first key identifier and the second key identifier to a receiving end, and the receiving end uses the check key to calculate a corresponding message check code by using the check key to the information containing the ciphertext, the user information of the transmitting end, the first key identifier and the second key identifier and compares the message check code with the received message check code, if the comparison is consistent, the data is complete and comes from the transmitting end, and then the receiving end uses the encryption key to decrypt the ciphertext to obtain a plaintext.
Compared with the prior art, the invention has the beneficial effects that:
According to the technical scheme provided by the invention, in the process of identity authentication and data transmission, the shared secret key for the message check code is acquired from the quantum secret key distribution network, so that the complexity of presetting the shared secret key can be reduced, the updating period of the shared quantum secret key can be shortened, the safety of the secret key can be improved, and the online acquisition can be supported.
In the data transmission process, the communication parties calculate the check code of the data message transmitted by the two parties by using the shared quantum key as a key, the identity of the data sender and the integrity of the data are verified by identifying the message check code, the shared quantum key is cleared after being used, and a new key is selected in the next communication. Because the shared quantum key uses the quantum key distribution technology, even if the computing capacity is improved, the risk of being stolen can be resisted, and only two communication parties hold the key, so that the security of the message check code is improved, and the security of the identity authentication process is enhanced.
In the data transmission process, the shared quantum key is used for carrying out check code calculation and comparison on the transmitted information, so that the identity authentication of a sender and the integrity verification of the transmitted data can be carried out on each piece of data transmitted by the quantum key again in the data transmission stage on the basis of the identity authentication carried out in the handshake stage, and the strength of the identity authentication is enhanced.
The invention solves the problems that in the identity authentication method based on the symmetric key, a large amount of shared keys are usually needed, and the shared keys need to be re-acquired when updated, and the prior art generally adopts a preset mode in advance, so that the method has higher complexity, greatly shortens the updating period of the shared quantum keys, improves the security of the keys, improves the acquisition efficiency of the keys, can provide a one-time-one-secret key using mode, and solves the transient problem of the shared symmetric keys in the identity authentication.
In order to make the above objects, features and advantages of the present invention more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the invention.
FIG. 1 is a communication two-party quantum key distribution scheme;
FIG. 2 is a schematic diagram of generating multiple sets of identical keys between two end quantum key distribution nodes;
FIG. 3 is a schematic diagram of a key storage scheme;
FIG. 4 is a schematic diagram of an authentication/communication key storage format;
fig. 5 is a schematic diagram of an authentication and data transmission process.
Detailed Description
The invention will be further described with reference to the drawings and examples.
It should be noted that the following detailed description is illustrative and is intended to provide further explanation of the invention. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the present invention. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
In this embodiment, for convenience of understanding of the technician, two communication parties are taken as two communication parties, and the protection scope of the present invention is not limited to this.
The method of the embodiment specifically comprises the following steps:
one quantum key distribution stage
Quantum keys are distributed between two parties of communication Alice and Bob through quantum key distribution technology. The key distribution scheme is shown in fig. 1. The quantum key distribution node 1 and the quantum key distribution node 2 are two nodes in the quantum key distribution network, between which a shared quantum key is distributed by means of a quantum key distribution technique, and then the quantum keys are provided to Alice and Bob, respectively, in which way there will also be a shared quantum key between Alice and Bob.
The quantum key distribution network can distribute shared quantum keys between any two nodes in the network through a quantum key distribution technology. The user can acquire the shared quantum key with any other node through the node as long as the user accesses the node of the quantum key distribution network. The acquisition mode can be near-end filling or far-end online acquisition, wherein online acquisition is recommended preferentially, and because online acquisition has higher convenience, the key updating period is shortened, and the key security is improved.
The quantum key distribution process between Alice and Bob is specifically performed according to the following steps:
step one:
by quantum key distribution techniques, multiple sets of identical quantum keys are distributed between two end quantum key distribution nodes, as shown in fig. 2.
Step two:
before starting identity authentication, alice and Bob respectively acquire the same quantum key as the other party from the quantum key distribution nodes connected with the Alice and Bob, and the key update can also be performed in the same way.
Step three:
Alice and Bob store the obtained or updated multiple groups of quantum keys respectively in two types, wherein one type is an authentication key, the other type is a communication key, and the communication key comprises an encryption key and a verification key. The number of storage of authentication keys and communication keys may be set according to the size of the storage medium or the specific needs of the user. The key storage is shown in fig. 3.
The authentication key and the communication key need to be marked with information such as a key type, a key identification, and the like when stored, as shown in fig. 4.
The authentication key and the communication key are used once in the use process, the authentication key and the communication key are cleared after the authentication key and the communication key are used for the next communication.
(II) handshake phase
In the first stage, alice shares a quantum key with Bob through a quantum key distribution technology, and the quantum key is used as an authentication key and a communication key for an identity authentication process, and in a specific identity authentication mode, alice initiates identity authentication, for example, as shown in fig. 5;
As shown in fig. 5, the detailed steps of the authentication and data transmission process using the quantum key are as follows:
step one:
Alice initiates an identity authentication request to Bob, and the message contains user information UserInfo of Alice and a Random number Random1 generated locally by Alice;
The above "user information" is related information for identifying the user, and may be information unique to each user, such as a user name, a user IP address, a user serial number, and the like.
Step two:
Bob verifies the validity of the user information UserInfo after receiving Alice's message. If UserInfo is illegal, the authentication process is terminated, if UserInfo is legal, a next authentication message is sent to Alice, wherein the content of the message is that Bob selects a secret key AuKey1 for authentication from an authentication secret key pool, the secret key is identified as IDAukey1, a message check code MACAukey1 (Random 1) of Random1 is calculated by using AuKey1 and is used as a response message, a Random number Random2 is generated locally, user information of Bob is UserInfo, and Bob sends UserInfo, MACAukey1(Random1)、IDAukey1 and Random2 to Alice together.
In the above process, (1) the method for calculating the message check code may be implemented using a one-way hash function, for example, HMAC-SHA-256, for a message check code using a SHA-256 one-way hash function, or using a block cipher, for example, AES-CMAC, for a message check code using an AES algorithm CBC mode.
(2) The random number may be a classical random number or a quantum random number.
Step three:
after Alice receives Bob's message, it first verifies if Bob's user information UserInfo is legal, if not, it terminates the authentication process, if not, it selects the corresponding authentication key from the authentication key pool according to authentication key IDAukey1, calculates the message check code of Random number Random1, and compares it with received MACAukey1 (Random 1). If the comparison fails, the authentication process is terminated, and an authentication failure message is sent to Bob, if the comparison is successful, an authentication success message is sent to Bob, and the following step four operation is started.
Step four:
Alice selects an authentication key AuKey from the authentication key pool, the key identification of which is IDAukey2, calculates a message check code MACAukey2 (Random 2) of Random2 by using AuKey2, and sends UserInfo and MACAukey2(Random2)、IDAukey2 together to Bob;
Step five:
After Bob receives the message, first verifies the validity of Alice's user information UserInfo, then selects a corresponding authentication key according to the authentication key IDAukey2, uses the key to calculate a message check code of Random2, and compares it with the received MACAukey2 (Random 2). If the comparison is successful, the identity of the Alice is successfully passed, and the authentication success message is sent to the Alice, and at the moment, the identity authentication of the two parties is successful, so that the following safe data transmission operation can be performed;
(III) data transfer stage
As shown in fig. 5, after the handshake between two parties of communication is completed, the two parties can establish a secure channel to perform secure data transmission, and in the data transmission process, each communication uses a shared quantum key to perform check code calculation and comparison on the transmitted message, and verify the identity of the sender, which is specifically implemented as follows:
When Alice and Bob transmit Data, a transmitting end (taking Alice as an example) selects a secret key with a secret key identification of IDEnkey1 from communication secret keys as an encryption secret key, the secret key with a secret key identification of IDEnkey2 is used as a verification secret key, data to be transmitted are encrypted by using Enkey1 to generate ciphertext EEnkey1 (Data), message verification codes of [ UserInfo1, EEnkey1(Data)、IDEnkey1、IDEnkey2 ] are calculated by using Enkey to be MACEnkey2, and UserInfo and EEnkey1(Data)、IDEnkey1、IDEnkey2、MACEnkey2 are transmitted to a receiving end, the receiving end uses EnKey to calculate message verification codes of [ UserInfo, EEnkey1(Data)、IDEnkey1、IDEnkey2 ] and compares the message verification codes with the MACEnkey2, if the comparison is consistent, the Data are complete and come from Alice, and then the receiving end uses Enckey to decrypt EEnkey1 (Data) and acquire plaintext Data.
The quantum key distribution technology based on quantum mechanics ensures that the key cannot be effectively eavesdropped because the quantum state has the characteristics of unclonable, uncertainty and measurement collapse, and therefore the quantum key distribution technology is used in an identity authentication scheme based on a symmetric cipher, and can provide security guarantee for a key sharing process. Meanwhile, as the quantum communication backbone line and the metropolitan area network are built, the coverage range of quantum key distribution is gradually increased, and key sharing among access nodes in the coverage range can be completed by using a quantum key distribution technology, so that as long as users accessing the quantum communication network through the access nodes can complete key sharing and key updating through quantum key distribution services provided by the network, the users can complete identity authentication and safe data transmission based on symmetric keys, the limitation of complexity increase caused by network scale increase is avoided, the convenience of the users is greatly improved, and the running cost is reduced.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
While the foregoing description of the embodiments of the present invention has been presented in conjunction with the drawings, it should be understood that it is not intended to limit the scope of the invention, but rather, it is intended to cover all modifications or variations within the scope of the invention as defined by the claims of the present invention.

Claims (9)

When data transmission is carried out, a data transmitting end selects a key of a first key identifier from a communication key pool as an encryption key, a key of a second key identifier is selected as a check key, the encryption key is used for encrypting data to be transmitted to generate a ciphertext, the check key is used for calculating a message check code containing the ciphertext, the user information of the transmitting end, the first key identifier and the second key identifier, the message check code is transmitted to a receiving end, the receiving end uses the check key for calculating a corresponding message check code containing the ciphertext, the user information of the transmitting end, the first key identifier and the second key identifier and comparing the message check code with the received message check code, if the comparison is consistent, the data is complete and comes from a transmitting party, and then the receiving end uses the encryption key for decrypting the ciphertext to obtain a plaintext.
CN202110891668.XA2021-08-042021-08-04 Method for identity authentication based on quantum keyActiveCN115913521B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110891668.XACN115913521B (en)2021-08-042021-08-04 Method for identity authentication based on quantum key

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110891668.XACN115913521B (en)2021-08-042021-08-04 Method for identity authentication based on quantum key

Publications (2)

Publication NumberPublication Date
CN115913521A CN115913521A (en)2023-04-04
CN115913521Btrue CN115913521B (en)2025-05-09

Family

ID=86490065

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110891668.XAActiveCN115913521B (en)2021-08-042021-08-04 Method for identity authentication based on quantum key

Country Status (1)

CountryLink
CN (1)CN115913521B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN117061100A (en)*2023-08-032023-11-14中国电信股份有限公司技术创新中心Bidirectional authentication system, method, device, equipment and medium
CN117278339B (en)*2023-11-232024-04-09广东广宇科技发展有限公司Data independent transmission verification method based on bidirectional synchronous key pool
CN118054901B (en)*2024-02-232024-08-20应急管理部大数据中心Network communication method and storage device based on key identification quick transfer
CN119232501A (en)*2024-12-022024-12-31浙江蚂蚁密算科技有限公司 A data processing method, device, medium and equipment based on security aspect
CN119892361B (en)*2025-03-282025-08-01安徽国科量子网络有限公司Device for entity authentication by quantum random number and entity authentication method thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108599925A (en)*2018-03-202018-09-28如般量子科技有限公司A kind of modified AKA identity authorization systems and method based on quantum communication network
CN108768632A (en)*2018-05-292018-11-06如般量子科技有限公司A kind of AKA identity authorization systems and method based on pool of symmetric keys and trunking traffic

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108123795B (en)*2016-11-282020-01-10广东国盾量子科技有限公司Quantum key chip issuing method, application method, issuing platform and system
CN110572257B (en)*2019-07-162023-04-14如般量子科技有限公司Identity-based data source identification method and system
CN111245609B (en)*2020-01-172023-02-28南京如般量子科技有限公司Secret sharing and random number based quantum secret communication key distribution and negotiation system and method thereof

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108599925A (en)*2018-03-202018-09-28如般量子科技有限公司A kind of modified AKA identity authorization systems and method based on quantum communication network
CN108768632A (en)*2018-05-292018-11-06如般量子科技有限公司A kind of AKA identity authorization systems and method based on pool of symmetric keys and trunking traffic

Also Published As

Publication numberPublication date
CN115913521A (en)2023-04-04

Similar Documents

PublicationPublication DateTitle
CN115913521B (en) Method for identity authentication based on quantum key
CN113630248B (en)Session key negotiation method
CN110999202A (en)Computer-implemented system and method for highly secure, high-speed encryption and transmission of data
CN112351037B (en)Information processing method and device for secure communication
CN106130716A (en)Cipher key exchange system based on authentication information and method
CN110493177B (en)Method and system for quantum communication service station AKA key negotiation based on asymmetric key pool pair and serial number
CN113612610B (en)Session key negotiation method
CN114765543B (en)Encryption communication method and system of quantum cryptography network expansion equipment
CN114189338B (en) SM9 key secure distribution and management system and method based on homomorphic encryption technology
CN114386020B (en) Quantum-safe fast secondary identity authentication method and system
US20240113885A1 (en)Hub-based token generation and endpoint selection for secure channel establishment
CN114978518B (en)Quantum-resistant computing digital signature method and system based on quantum communication service station
CN116074839A (en)Authentication method for accessing quantum security terminal into quantum security network
CN118659922A (en) Quantum-resistant security enhancement method for open licensing protocols
JP2025506640A (en) Method and structure for establishing a digital identity - Patents.com
JPH08335208A (en) Proxy authentication method and system
CN106230840A (en)A kind of command identifying method of high security
CN112039663B (en)Data transmission method and system
CN111245611B (en)Anti-quantum computation identity authentication method and system based on secret sharing and wearable equipment
CN117034309B (en) User password management method, computer device and storage medium
WO2025025474A1 (en)Bidirectional authentication system, method, and apparatus, device, and medium
CN110784305A (en)Single sign-on authentication method based on careless pseudorandom function and signcryption
CN113987546B (en) A consortium chain system based on identification cryptography
KR20240136961A (en) Emergency recovery transaction of funds in cryptocurrency wallet
CN114710266B (en)Authentication method, quantum key distribution device and quantum cryptographic network

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp