CN109981270A - Pp file transmission method based on the synchronous destruction technology of quantum key - Google Patents
Pp file transmission method based on the synchronous destruction technology of quantum key Download PDFInfo
- Publication number
- CN109981270A CN109981270A CN201910270998.XA CN201910270998A CN109981270A CN 109981270 A CN109981270 A CN 109981270A CN 201910270998 A CN201910270998 A CN 201910270998A CN 109981270 A CN109981270 A CN 109981270A
- Authority
- CN
- China
- Prior art keywords
- quantum key
- quantum
- memory module
- module
- scramble
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1074—Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
- H04L67/1078—Resource delivery mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Optical Communication System (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of pp file transmission methods based on the synchronous destruction technology of quantum key, belong to quantum communications field, original private file to be encrypted is uploaded to quantum cryptography engineering module by user;Before encrypted transmission, it checks sender and whether the quantum key memory module of recipient is synchronous, it is synchronous then carry out encrypted transmission, it is encrypted in quantum cryptography engineering module using quantum key, obtain cryptograph files, and cryptograph files are sent to recipient's quantum decryption stage die block and are decrypted, obtain original private file.Quantum communications and the disposal password sheet that solution can not be guessed by violence are formed the high safety communicating method of safety by this method.
Description
Technical field
The present invention relates to quantum communications fields, more particularly to a kind of based on the point-to-point of the synchronous destruction technology of quantum key
Document transmission method.
Background technique
Quantum communications refer to a kind of novel communication mode that information transmitting is carried out using entangled quantum effect.Quantum communications
It is the new interdisciplinary that recent two decades grow up, is quantum theory and the new research field that information theory combines.Classics are logical
Letter is compared compared with optical quantum communication, and safety and high efficiency can not all mention in the same breath therewith.This technology becomes and measures in the world at present
The research hotspot of muon physics and information science, China also emitted first quantum communications satellite in 2015, carried out quantum communications and ground
Study carefully.Quantum communications have the characteristic that is perfectly safe not available for conventional communication mode, lead in information securities such as national security, finance
There are great application value and prospect in domain.
Its characteristics are as follows:
1) key of quantum cryptography is truly random, even if stolen taker is intercepted and captured, is also unable to get correct key, therefore
Information can not be cracked;
2) there are two particles of Entangled State in communicating pair hand respectively, the quantum state of one of particle becomes
Change, in addition the quantum state of a side will change at once therewith, and according to quantum theory, macroscopical any observation and interference, all
Quantum state can be changed at once, cause its collapsing, therefore stealer's information as obtained from interference has been destroyed, and non-native letter
Breath.
3) the unknown quantum state efficiently, transmitted can be in Entangled State before being measured, i.e., represent multiple states simultaneously.
With increasing for quantum, the rate journey exponential increase of data is transmitted.
Information networking epoch, information security and concealment are aobvious to be even more important, and data are not pocessed in the transmission,
It is easy to be attacked, important information is stolen by attacker.Therefore various Encryption Algorithm also generate in succession, to prevent the file information
It is trapped.It concealment, the scheme of various private communication channels can be suggested, come in transmission process in order to reach important information simultaneously
Meet the concealment of information.Technique on Quantum Communication is significantly mentioned because its transmission principle determines to have compared to conventional communication mode safety
It rises, is determined that quantum communications will become an emerging strategic commanding elevation of the Future Information communications industry by this feature, China exists
It is in world lead level in the research of Technique on Quantum Communication, is few in number in China new and high technology R&D work field surpass
One of the technology of more international development level, and just from the point of view of research and development situation in recent years, quantum communications are hopeful to realize in a short time
Cross-cutting breakthrough, but because the problems such as technology, construction cost determines that China's quantum communications do not have large-scale promotion application still
Condition.
Disposal password sheet (One-time Pad;It OTP) is one of cryptography Encryption Algorithm.It is with random key
(key) composition plaintext, and only use primary.Theoretically, such password is unbreakable, and its safety is by a gram labor
De Aier Wood Shannon (Claude Elwood Shannon) is proved.Although there is significant limitation, it is wide
General is applied in the advanced encryption algorithms such as SHA-3.
Its characteristics are as follows:
1) to the text encrypted, that is, disposal password sheet, it is necessary to be without specific rule.
2) code book must be at least more isometric than encrypted file.
3) text (code book) to encrypt can only be with once, and when not using, the text to encrypt should will be sold
It ruins, to prevent reusing.
It 4) can not be by Brute Force.
Summary of the invention
For the interaction of data between information age intranet and extranet, the transmission problem of documentation, how to take into account and use just
Victory and Information Security become the problem that numerous users face, and it is synchronous based on quantum key that it is an object of the invention to provide one kind
The pp file transmission method of destruction technology, this method by quantum communications and the disposal password sheet that can not be guessed solution by violence,
Form the high safety communicating method of safety.
To achieve the above object, the pp file transmission side proposed by the present invention based on the synchronous destruction technology of quantum key
Method, which comprises the steps of:
1) original private file to be encrypted is uploaded to quantum cryptography engineering module by user;
2) before encrypted transmission, the synchronous verification module of the first quantum key of starting verification mould synchronous with the second quantum key
The length of the first local quantum key memory module and one-way hash value are sent to recipient by block, sender, sender's
First quantum key memory module and the second quantum key memory module of recipient are compared, if the first quantum key stores
Module is consistent with the second quantum key memory module, carries out encrypted transmission, otherwise carries out the first quantum key memory module and
Two quantum key memory modules are synchronous, until both sides are consistent;
3) the first quantum key scramble module in quantum cryptography engineering module be used for according to original private file size to
First quantum key controls the first quantum key memory module in hinge and sends acquisition size corresponding with original private file
The request message of quantum key;
4) the first quantum key controls hinge and submits to from the truly random quantum key of the first quantum key memory module taking-up
First quantum key scramble module;
5) the first quantum key scramble module generates pseudo random number password, with the received quantum key of password scramble institute,
Length is constant after quantum key scramble, and result is submitted to quantum cryptography engineering by the first quantum key scramble module after the completion of encryption
Module;
6) quantum cryptography engineering module encrypts original private file using the quantum key after scramble, and by password hide to
In encrypted cryptograph files;
7) cryptograph files that encryption obtains are sent to recipient by the first quantum key control hinge;
8) cryptograph files are submitted to the in quantum decryption stage die block by the second quantum key control hinge of recipient
Two quantum key scramble modules;
9) the second quantum key scramble module extracts the password in cryptograph files, and according to the size of cryptograph files to second
Quantum key controls hinge application quantum key;
10) the second quantum key control hinge extracts quantum key from the second quantum key memory module and is committed to second
Quantum key scramble module;
11) the second quantum key scramble module carries out scramble to quantum key using password, after the completion submits to result
Quantum decrypts stage die block, and quantum decryption stage die block is decrypted cryptograph files to obtain original using the quantum key after scramble
Beginning private file.
Further, the first quantum key memory module and the second quantum key memory module synchronizing process be such as in step 2)
Under:
1) size of the first quantum key memory module and hashed value are sent to the second quantum key memory module;
2) it examines the first quantum key memory module and the second quantum key memory module whether identical, then examines if they are the same
Pass through, a point situation is handled if different;
1. the first quantum key memory module and the second quantum key memory module are divided into M if hashed value difference1,
M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value of a submodule is different, then deletes the M of both sidesiHeight
Module turns again to step 1) and repeats to detect;
2. if length of the length of length difference and the first quantum key memory module than the second quantum key memory module
First quantum key memory module and the second quantum key memory module are then divided into M by more L1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value difference of a submodule is then deleted the first quantum key and is deposited
Store up the M of moduleiThe M of a submodule and later L and the second quantum key memory modulei1) a submodule, turns again to
Carry out duplicate test;
3. carrying out step 2. if hashed value and length are all different.
Through the above design, the present invention can be brought the following benefits: it is an object of the invention to provide one kind to be based on
The pp file transmission method of the synchronous destruction technology of quantum key, this method is by quantum communications and the one of solution can not be guessed by violence
Secondary property code book forms the high safety communicating method of safety.
Detailed description of the invention
Fig. 1 is that the present invention is based on the encryption information of quantum cryptography to transmit schematic diagram.
Fig. 2 is that the present invention is based on the pp file transmission method flow diagrams of the synchronous destruction technology of quantum key.
Fig. 3 is quantum key memory module verification flow chart of the present invention.
Fig. 4 is the pp file transmission method timing diagram based on the synchronous destruction technology of quantum key.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings, to the present invention make into
The detailed description of one step.
Referring to Fig.1, the system that the pp file transmission method based on the synchronous destruction technology of quantum key uses includes amount
Son encryption engineering module, quantum key control hinge and quantum decrypt stage die block.
The quantum cryptography engineering module includes the first quantum key scramble module, and the first quantum key scramble module is used for
According to original private file size to the first quantum key control hinge in the first quantum key memory module send obtain with
Original private file corresponds to the request message of the quantum key of size, and the first quantum key scramble module generates pseudo random number
Password carries out scramble to its received quantum key of institute;Quantum cryptography engineering module is using the quantum key after scramble to original hidden
Private file is encrypted, while password is embedded in and is hidden to cryptograph files, and cryptograph files are submitted to the first quantum key
Control hinge.
The quantum key control hinge includes positioned at the first quantum key control hinge of sender and positioned at recipient
The second quantum key control hinge, the first quantum key control hinge include the first quantum key memory module and the first quantum
Key synchronization checks module, and for the first quantum key memory module for storing and managing quantum key, the first quantum key is synchronous
Verification module is used to check and synchronous (referring to Fig. 3) sender with the quantum key of recipient.Second quantum key control
Hinge processed includes the second quantum key memory module verification module synchronous with the second quantum key, the second quantum key memory module
For storing and managing quantum key, the synchronous verification module of the second quantum key is used for the quantum key to recipient and sender
It carries out verification and sends out cryptograph files by the web-transporting device of outer net transmission channel with synchronous first quantum key control hinge
Give the second quantum key control hinge.
The quantum decryption stage die block and quantum cryptography engineering module symmetry, it includes the second amount that quantum, which decrypts stage die block,
Sub-key scramble module, the second quantum key scramble module from cryptograph files for extracting password, and to the second quantum key
The the second quantum key storage module for controlling hinge sends acquisition and the isometric quantum key request message of sender, then passes through
Extracted password carries out scramble to the received quantum key of institute, the quantum key after obtaining scramble;Quantum decrypts stage die block
Cryptograph files are decrypted using the quantum key after scramble, finally obtain original private file.
Wherein outer net transmission channel, that is, wan communication transmission, is provided by Network Provider.
Below with reference to Fig. 1, Fig. 2 and Fig. 4 to the pp file transmission method based on the synchronous destruction technology of quantum key into
Row elaborates, and detailed process is as follows:
1) original private file to be encrypted is uploaded to quantum cryptography engineering module by user;
2) before encrypted transmission, the synchronous verification module of the first quantum key of starting verification mould synchronous with the second quantum key
The length of the first local quantum key memory module and one-way hash value are sent to recipient by block, sender, sender's
First quantum key memory module and the second quantum key memory module of recipient are compared, if the first quantum key stores
Module is consistent with the second quantum key memory module, carries out encrypted transmission, otherwise carries out the first quantum key memory module and
Two quantum key memory modules are synchronous, until both sides are consistent;
3) the first quantum key scramble module in quantum cryptography engineering module be used for according to original private file size to
First quantum key controls the first quantum key memory module in hinge and sends acquisition size corresponding with original private file
The request message of quantum key;
4) the first quantum key controls hinge and submits to from the truly random quantum key of the first quantum key memory module taking-up
First quantum key scramble module;
5) the first quantum key scramble module generates pseudo random number password, with the received quantum key of password scramble institute,
Length is constant after quantum key scramble, and result is submitted to quantum cryptography engineering by the first quantum key scramble module after the completion of encryption
Module;
6) quantum cryptography engineering module encrypts original private file using the quantum key after scramble, and by password hide to
In encrypted cryptograph files;
7) cryptograph files that encryption obtains are sent to recipient by the first quantum key control hinge;
8) cryptograph files are submitted to the in quantum decryption stage die block by the second quantum key control hinge of recipient
Two quantum key scramble modules;
9) the second quantum key scramble module extracts the password in cryptograph files, and according to the size of cryptograph files to second
Quantum key controls hinge application quantum key;
10) the second quantum key control hinge extracts quantum key from the second quantum key memory module and is committed to second
Quantum key scramble module;
11) the second quantum key scramble module carries out scramble to quantum key using password, after the completion submits to result
Quantum decrypts stage die block, and quantum decryption stage die block is decrypted cryptograph files to obtain original using the quantum key after scramble
Beginning private file.
As shown in figure 3, the first quantum key memory module and the second quantum key memory module synchronizing process in step 2)
It is as follows:
1) size of the first quantum key memory module and hashed value are sent to the second quantum key memory module;
2) it examines the first quantum key memory module and the second quantum key memory module whether identical, then examines if they are the same
Pass through, a point situation is handled if different;
1. the first quantum key memory module and the second quantum key memory module are divided into M if hashed value difference1,
M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value of a submodule is different, then deletes the M of both sidesiHeight
Module turns again to step 1) and repeats to detect;
2. if length of the length of length difference and the first quantum key memory module than the second quantum key memory module
First quantum key memory module and the second quantum key memory module are then divided into M by more L1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value difference of a submodule is then deleted the first quantum key and is deposited
Store up the M of moduleiThe M of a submodule and later L and the second quantum key memory modulei1) a submodule, turns again to
Carry out duplicate test;
3. carrying out step 2. if hashed value and length are all different.
Claims (2)
1. the pp file transmission method based on the synchronous destruction technology of quantum key, which comprises the steps of:
1) original private file to be encrypted is uploaded to quantum cryptography engineering module by user;
2) before encrypted transmission, the synchronous verification module of the first quantum key of starting verification module synchronous with the second quantum key,
The length of the first local quantum key memory module and one-way hash value are sent to recipient by sender, and the first of sender
Quantum key memory module and the second quantum key memory module of recipient are compared, if the first quantum key memory module
It is consistent with the second quantum key memory module, encrypted transmission is carried out, the first quantum key memory module and the second amount are otherwise carried out
Sub-key memory module is synchronous, until both sides are consistent;
3) the first quantum key scramble module in quantum cryptography engineering module is used for according to original private file size to first
Quantum key controls the first quantum key memory module in hinge and sends the quantum for obtaining size corresponding with original private file
The request message of key;
4) the first quantum key controls hinge and submits to first from the truly random quantum key of the first quantum key memory module taking-up
Quantum key scramble module;
5) the first quantum key scramble module generates pseudo random number password, with the received quantum key of password scramble institute, quantum
Length is constant after key scramble, and result is submitted to quantum cryptography stage die by the first quantum key scramble module after the completion of encryption
Block;
6) quantum cryptography engineering module encrypts original private file using the quantum key after scramble, and password is hidden to encryption
In cryptograph files afterwards;
7) cryptograph files that encryption obtains are sent to recipient by the first quantum key control hinge;
8) cryptograph files are submitted to the second amount in quantum decryption stage die block by the second quantum key control hinge of recipient
Sub-key scramble module;
9) the second quantum key scramble module extracts the password in cryptograph files, and according to the size of cryptograph files to the second quantum
Cipher controlled hinge application quantum key;
10) the second quantum key control hinge extracts quantum key from the second quantum key memory module and is committed to the second quantum
Key scramble module;
11) the second quantum key scramble module carries out scramble to quantum key using password, and result is submitted to quantum after the completion
Engineering module is decrypted, quantum decryption stage die block is decrypted to obtain original hidden using the quantum key after scramble to cryptograph files
Private file.
2. the pp file transmission method according to claim 1 based on the synchronous destruction technology of quantum key, feature
It is, the first quantum key memory module and the second quantum key memory module synchronizing process are as follows in step 2):
1) size of the first quantum key memory module and hashed value are sent to the second quantum key memory module;
2) it examines the first quantum key memory module and the second quantum key memory module whether identical, then examines if they are the same logical
It crosses, a point situation is handled if different;
1. the first quantum key memory module and the second quantum key memory module are divided into M if hashed value difference1,
M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value of a submodule is different, then deletes the M of both sidesiA submodule
Block turns again to step 1) and repeats to detect;
2. if length is different and the length of the first quantum key memory module than the second quantum key memory module length more than L,
The first quantum key memory module and the second quantum key memory module are then divided into M1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value difference of a submodule then deletes the first quantum key storage mould
The M of blockiThe M of a submodule and later L and the second quantum key memory moduleiA submodule is turned again to and 1) is carried out
Duplicate test;
3. carrying out step 2. if hashed value and length are all different.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270998.XA CN109981270B (en) | 2019-04-04 | 2019-04-04 | Point-to-point file transmission method based on quantum key synchronous destruction technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270998.XA CN109981270B (en) | 2019-04-04 | 2019-04-04 | Point-to-point file transmission method based on quantum key synchronous destruction technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109981270A true CN109981270A (en) | 2019-07-05 |
CN109981270B CN109981270B (en) | 2021-06-22 |
Family
ID=67083127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910270998.XA Active CN109981270B (en) | 2019-04-04 | 2019-04-04 | Point-to-point file transmission method based on quantum key synchronous destruction technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109981270B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596386A (en) * | 2021-08-07 | 2021-11-02 | 施航 | Video monitoring quantum encryption system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101599826A (en) * | 2009-07-10 | 2009-12-09 | 陕西理工学院 | Expandable multi-user quantum key distribution network system and method for distributing key thereof |
US20100027794A1 (en) * | 2005-09-09 | 2010-02-04 | Kabushiki Kaisha Toshiba | Quantum communication system |
CN103501224A (en) * | 2013-09-23 | 2014-01-08 | 长春理工大学 | Asymmetric image encryption and decryption method based on quantum cell neural network system |
WO2014088392A1 (en) * | 2012-12-05 | 2014-06-12 | Mimos Berhad | Method for information reconciliation in quantum key distribution |
CN106452750A (en) * | 2016-10-19 | 2017-02-22 | 长春大学 | Quantum encryption communication method for mobile devices |
CN106530368A (en) * | 2016-10-28 | 2017-03-22 | 陕西师范大学 | Prime-domain multi-threshold progressive secret image preservation and reconstruction method |
US20170264434A1 (en) * | 2016-03-14 | 2017-09-14 | Kabushiki Kaisha Toshiba | Communication device, quantum key distribution system, quantum key distribution method, and computer program product |
CN107517101A (en) * | 2017-10-19 | 2017-12-26 | 浙江工商大学 | Do not require that classical communication person possesses half quantum dialogue method of measurement capability based on single photon |
-
2019
- 2019-04-04 CN CN201910270998.XA patent/CN109981270B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100027794A1 (en) * | 2005-09-09 | 2010-02-04 | Kabushiki Kaisha Toshiba | Quantum communication system |
CN101599826A (en) * | 2009-07-10 | 2009-12-09 | 陕西理工学院 | Expandable multi-user quantum key distribution network system and method for distributing key thereof |
WO2014088392A1 (en) * | 2012-12-05 | 2014-06-12 | Mimos Berhad | Method for information reconciliation in quantum key distribution |
CN103501224A (en) * | 2013-09-23 | 2014-01-08 | 长春理工大学 | Asymmetric image encryption and decryption method based on quantum cell neural network system |
US20170264434A1 (en) * | 2016-03-14 | 2017-09-14 | Kabushiki Kaisha Toshiba | Communication device, quantum key distribution system, quantum key distribution method, and computer program product |
CN106452750A (en) * | 2016-10-19 | 2017-02-22 | 长春大学 | Quantum encryption communication method for mobile devices |
CN106530368A (en) * | 2016-10-28 | 2017-03-22 | 陕西师范大学 | Prime-domain multi-threshold progressive secret image preservation and reconstruction method |
CN107517101A (en) * | 2017-10-19 | 2017-12-26 | 浙江工商大学 | Do not require that classical communication person possesses half quantum dialogue method of measurement capability based on single photon |
Non-Patent Citations (1)
Title |
---|
韩家伟: "量子密钥分发与经典加密方法融合关键技术研究", 《中国博士学位论文全文数据库.基础科学辑》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113596386A (en) * | 2021-08-07 | 2021-11-02 | 施航 | Video monitoring quantum encryption system |
Also Published As
Publication number | Publication date |
---|---|
CN109981270B (en) | 2021-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103795533B (en) | Encryption based on identifier, the method and its performs device of decryption | |
CN110313146A (en) | Fuzziness enhancing | |
CN105743645B (en) | Stream code key generating means, method and data encryption, decryption method based on PUF | |
WO2022083206A1 (en) | File encryption transmission method and apparatus | |
CN109543434B (en) | Block chain information encryption method, decryption method, storage method and device | |
CN101989984A (en) | Electronic document safe sharing system and method thereof | |
CN102185694A (en) | Electronic file encrypting method and system based on fingerprint information | |
CN103236934B (en) | A kind of method of cloud storage security control | |
CN104468664A (en) | Method and device for uploading files to cloud storage system, and method and device for downloading files from cloud storage system | |
CN110138795B (en) | Multi-step mixed encryption and decryption method in communication process | |
CN106533656B (en) | A kind of key multilayer mixing method for encryption/decryption based on WSN | |
CN108234458A (en) | Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher | |
CN115632880B (en) | Reliable data transmission and storage method and system based on state cryptographic algorithm | |
CN109005027A (en) | A kind of random data encryption and decryption method, apparatus and system | |
CN106506453A (en) | Electric power big data transmission method and system based on Rapid matching and integrity detection | |
CN105791258A (en) | Data transmission method, terminal and open platform | |
CN104243493A (en) | Network identity authentication method and system | |
CN102811124B (en) | Based on the system Authentication method of two card trigram technology | |
CN1953366B (en) | Password management method and system for intelligent secret key device | |
CN104735094A (en) | Information separation based data security transmission system and method | |
CN109743162A (en) | A kind of operated using ideal lattice carries out the matched encryption method of identity attribute | |
CN109981270A (en) | Pp file transmission method based on the synchronous destruction technology of quantum key | |
CN108880795A (en) | A kind of block chain security mechanism and device | |
CN111740941A (en) | Industrial scene real-time data file encryption transmission method | |
CN108494554B (en) | Data symmetric encryption method based on double plaintexts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |