Nothing Special   »   [go: up one dir, main page]

CN109981270A - Pp file transmission method based on the synchronous destruction technology of quantum key - Google Patents

Pp file transmission method based on the synchronous destruction technology of quantum key Download PDF

Info

Publication number
CN109981270A
CN109981270A CN201910270998.XA CN201910270998A CN109981270A CN 109981270 A CN109981270 A CN 109981270A CN 201910270998 A CN201910270998 A CN 201910270998A CN 109981270 A CN109981270 A CN 109981270A
Authority
CN
China
Prior art keywords
quantum key
quantum
memory module
module
scramble
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910270998.XA
Other languages
Chinese (zh)
Other versions
CN109981270B (en
Inventor
宋立军
吴佳楠
卜祥函
陈丽
田甜
刘兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Teachers Institute of Engineering and Technology
Original Assignee
Jilin Teachers Institute of Engineering and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Teachers Institute of Engineering and Technology filed Critical Jilin Teachers Institute of Engineering and Technology
Priority to CN201910270998.XA priority Critical patent/CN109981270B/en
Publication of CN109981270A publication Critical patent/CN109981270A/en
Application granted granted Critical
Publication of CN109981270B publication Critical patent/CN109981270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Optical Communication System (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of pp file transmission methods based on the synchronous destruction technology of quantum key, belong to quantum communications field, original private file to be encrypted is uploaded to quantum cryptography engineering module by user;Before encrypted transmission, it checks sender and whether the quantum key memory module of recipient is synchronous, it is synchronous then carry out encrypted transmission, it is encrypted in quantum cryptography engineering module using quantum key, obtain cryptograph files, and cryptograph files are sent to recipient's quantum decryption stage die block and are decrypted, obtain original private file.Quantum communications and the disposal password sheet that solution can not be guessed by violence are formed the high safety communicating method of safety by this method.

Description

Pp file transmission method based on the synchronous destruction technology of quantum key
Technical field
The present invention relates to quantum communications fields, more particularly to a kind of based on the point-to-point of the synchronous destruction technology of quantum key Document transmission method.
Background technique
Quantum communications refer to a kind of novel communication mode that information transmitting is carried out using entangled quantum effect.Quantum communications It is the new interdisciplinary that recent two decades grow up, is quantum theory and the new research field that information theory combines.Classics are logical Letter is compared compared with optical quantum communication, and safety and high efficiency can not all mention in the same breath therewith.This technology becomes and measures in the world at present The research hotspot of muon physics and information science, China also emitted first quantum communications satellite in 2015, carried out quantum communications and ground Study carefully.Quantum communications have the characteristic that is perfectly safe not available for conventional communication mode, lead in information securities such as national security, finance There are great application value and prospect in domain.
Its characteristics are as follows:
1) key of quantum cryptography is truly random, even if stolen taker is intercepted and captured, is also unable to get correct key, therefore Information can not be cracked;
2) there are two particles of Entangled State in communicating pair hand respectively, the quantum state of one of particle becomes Change, in addition the quantum state of a side will change at once therewith, and according to quantum theory, macroscopical any observation and interference, all Quantum state can be changed at once, cause its collapsing, therefore stealer's information as obtained from interference has been destroyed, and non-native letter Breath.
3) the unknown quantum state efficiently, transmitted can be in Entangled State before being measured, i.e., represent multiple states simultaneously. With increasing for quantum, the rate journey exponential increase of data is transmitted.
Information networking epoch, information security and concealment are aobvious to be even more important, and data are not pocessed in the transmission, It is easy to be attacked, important information is stolen by attacker.Therefore various Encryption Algorithm also generate in succession, to prevent the file information It is trapped.It concealment, the scheme of various private communication channels can be suggested, come in transmission process in order to reach important information simultaneously Meet the concealment of information.Technique on Quantum Communication is significantly mentioned because its transmission principle determines to have compared to conventional communication mode safety It rises, is determined that quantum communications will become an emerging strategic commanding elevation of the Future Information communications industry by this feature, China exists It is in world lead level in the research of Technique on Quantum Communication, is few in number in China new and high technology R&D work field surpass One of the technology of more international development level, and just from the point of view of research and development situation in recent years, quantum communications are hopeful to realize in a short time Cross-cutting breakthrough, but because the problems such as technology, construction cost determines that China's quantum communications do not have large-scale promotion application still Condition.
Disposal password sheet (One-time Pad;It OTP) is one of cryptography Encryption Algorithm.It is with random key (key) composition plaintext, and only use primary.Theoretically, such password is unbreakable, and its safety is by a gram labor De Aier Wood Shannon (Claude Elwood Shannon) is proved.Although there is significant limitation, it is wide General is applied in the advanced encryption algorithms such as SHA-3.
Its characteristics are as follows:
1) to the text encrypted, that is, disposal password sheet, it is necessary to be without specific rule.
2) code book must be at least more isometric than encrypted file.
3) text (code book) to encrypt can only be with once, and when not using, the text to encrypt should will be sold It ruins, to prevent reusing.
It 4) can not be by Brute Force.
Summary of the invention
For the interaction of data between information age intranet and extranet, the transmission problem of documentation, how to take into account and use just Victory and Information Security become the problem that numerous users face, and it is synchronous based on quantum key that it is an object of the invention to provide one kind The pp file transmission method of destruction technology, this method by quantum communications and the disposal password sheet that can not be guessed solution by violence, Form the high safety communicating method of safety.
To achieve the above object, the pp file transmission side proposed by the present invention based on the synchronous destruction technology of quantum key Method, which comprises the steps of:
1) original private file to be encrypted is uploaded to quantum cryptography engineering module by user;
2) before encrypted transmission, the synchronous verification module of the first quantum key of starting verification mould synchronous with the second quantum key The length of the first local quantum key memory module and one-way hash value are sent to recipient by block, sender, sender's First quantum key memory module and the second quantum key memory module of recipient are compared, if the first quantum key stores Module is consistent with the second quantum key memory module, carries out encrypted transmission, otherwise carries out the first quantum key memory module and Two quantum key memory modules are synchronous, until both sides are consistent;
3) the first quantum key scramble module in quantum cryptography engineering module be used for according to original private file size to First quantum key controls the first quantum key memory module in hinge and sends acquisition size corresponding with original private file The request message of quantum key;
4) the first quantum key controls hinge and submits to from the truly random quantum key of the first quantum key memory module taking-up First quantum key scramble module;
5) the first quantum key scramble module generates pseudo random number password, with the received quantum key of password scramble institute, Length is constant after quantum key scramble, and result is submitted to quantum cryptography engineering by the first quantum key scramble module after the completion of encryption Module;
6) quantum cryptography engineering module encrypts original private file using the quantum key after scramble, and by password hide to In encrypted cryptograph files;
7) cryptograph files that encryption obtains are sent to recipient by the first quantum key control hinge;
8) cryptograph files are submitted to the in quantum decryption stage die block by the second quantum key control hinge of recipient Two quantum key scramble modules;
9) the second quantum key scramble module extracts the password in cryptograph files, and according to the size of cryptograph files to second Quantum key controls hinge application quantum key;
10) the second quantum key control hinge extracts quantum key from the second quantum key memory module and is committed to second Quantum key scramble module;
11) the second quantum key scramble module carries out scramble to quantum key using password, after the completion submits to result Quantum decrypts stage die block, and quantum decryption stage die block is decrypted cryptograph files to obtain original using the quantum key after scramble Beginning private file.
Further, the first quantum key memory module and the second quantum key memory module synchronizing process be such as in step 2) Under:
1) size of the first quantum key memory module and hashed value are sent to the second quantum key memory module;
2) it examines the first quantum key memory module and the second quantum key memory module whether identical, then examines if they are the same Pass through, a point situation is handled if different;
1. the first quantum key memory module and the second quantum key memory module are divided into M if hashed value difference1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value of a submodule is different, then deletes the M of both sidesiHeight Module turns again to step 1) and repeats to detect;
2. if length of the length of length difference and the first quantum key memory module than the second quantum key memory module First quantum key memory module and the second quantum key memory module are then divided into M by more L1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value difference of a submodule is then deleted the first quantum key and is deposited Store up the M of moduleiThe M of a submodule and later L and the second quantum key memory modulei1) a submodule, turns again to Carry out duplicate test;
3. carrying out step 2. if hashed value and length are all different.
Through the above design, the present invention can be brought the following benefits: it is an object of the invention to provide one kind to be based on The pp file transmission method of the synchronous destruction technology of quantum key, this method is by quantum communications and the one of solution can not be guessed by violence Secondary property code book forms the high safety communicating method of safety.
Detailed description of the invention
Fig. 1 is that the present invention is based on the encryption information of quantum cryptography to transmit schematic diagram.
Fig. 2 is that the present invention is based on the pp file transmission method flow diagrams of the synchronous destruction technology of quantum key.
Fig. 3 is quantum key memory module verification flow chart of the present invention.
Fig. 4 is the pp file transmission method timing diagram based on the synchronous destruction technology of quantum key.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings, to the present invention make into The detailed description of one step.
Referring to Fig.1, the system that the pp file transmission method based on the synchronous destruction technology of quantum key uses includes amount Son encryption engineering module, quantum key control hinge and quantum decrypt stage die block.
The quantum cryptography engineering module includes the first quantum key scramble module, and the first quantum key scramble module is used for According to original private file size to the first quantum key control hinge in the first quantum key memory module send obtain with Original private file corresponds to the request message of the quantum key of size, and the first quantum key scramble module generates pseudo random number Password carries out scramble to its received quantum key of institute;Quantum cryptography engineering module is using the quantum key after scramble to original hidden Private file is encrypted, while password is embedded in and is hidden to cryptograph files, and cryptograph files are submitted to the first quantum key Control hinge.
The quantum key control hinge includes positioned at the first quantum key control hinge of sender and positioned at recipient The second quantum key control hinge, the first quantum key control hinge include the first quantum key memory module and the first quantum Key synchronization checks module, and for the first quantum key memory module for storing and managing quantum key, the first quantum key is synchronous Verification module is used to check and synchronous (referring to Fig. 3) sender with the quantum key of recipient.Second quantum key control Hinge processed includes the second quantum key memory module verification module synchronous with the second quantum key, the second quantum key memory module For storing and managing quantum key, the synchronous verification module of the second quantum key is used for the quantum key to recipient and sender It carries out verification and sends out cryptograph files by the web-transporting device of outer net transmission channel with synchronous first quantum key control hinge Give the second quantum key control hinge.
The quantum decryption stage die block and quantum cryptography engineering module symmetry, it includes the second amount that quantum, which decrypts stage die block, Sub-key scramble module, the second quantum key scramble module from cryptograph files for extracting password, and to the second quantum key The the second quantum key storage module for controlling hinge sends acquisition and the isometric quantum key request message of sender, then passes through Extracted password carries out scramble to the received quantum key of institute, the quantum key after obtaining scramble;Quantum decrypts stage die block Cryptograph files are decrypted using the quantum key after scramble, finally obtain original private file.
Wherein outer net transmission channel, that is, wan communication transmission, is provided by Network Provider.
Below with reference to Fig. 1, Fig. 2 and Fig. 4 to the pp file transmission method based on the synchronous destruction technology of quantum key into Row elaborates, and detailed process is as follows:
1) original private file to be encrypted is uploaded to quantum cryptography engineering module by user;
2) before encrypted transmission, the synchronous verification module of the first quantum key of starting verification mould synchronous with the second quantum key The length of the first local quantum key memory module and one-way hash value are sent to recipient by block, sender, sender's First quantum key memory module and the second quantum key memory module of recipient are compared, if the first quantum key stores Module is consistent with the second quantum key memory module, carries out encrypted transmission, otherwise carries out the first quantum key memory module and Two quantum key memory modules are synchronous, until both sides are consistent;
3) the first quantum key scramble module in quantum cryptography engineering module be used for according to original private file size to First quantum key controls the first quantum key memory module in hinge and sends acquisition size corresponding with original private file The request message of quantum key;
4) the first quantum key controls hinge and submits to from the truly random quantum key of the first quantum key memory module taking-up First quantum key scramble module;
5) the first quantum key scramble module generates pseudo random number password, with the received quantum key of password scramble institute, Length is constant after quantum key scramble, and result is submitted to quantum cryptography engineering by the first quantum key scramble module after the completion of encryption Module;
6) quantum cryptography engineering module encrypts original private file using the quantum key after scramble, and by password hide to In encrypted cryptograph files;
7) cryptograph files that encryption obtains are sent to recipient by the first quantum key control hinge;
8) cryptograph files are submitted to the in quantum decryption stage die block by the second quantum key control hinge of recipient Two quantum key scramble modules;
9) the second quantum key scramble module extracts the password in cryptograph files, and according to the size of cryptograph files to second Quantum key controls hinge application quantum key;
10) the second quantum key control hinge extracts quantum key from the second quantum key memory module and is committed to second Quantum key scramble module;
11) the second quantum key scramble module carries out scramble to quantum key using password, after the completion submits to result Quantum decrypts stage die block, and quantum decryption stage die block is decrypted cryptograph files to obtain original using the quantum key after scramble Beginning private file.
As shown in figure 3, the first quantum key memory module and the second quantum key memory module synchronizing process in step 2) It is as follows:
1) size of the first quantum key memory module and hashed value are sent to the second quantum key memory module;
2) it examines the first quantum key memory module and the second quantum key memory module whether identical, then examines if they are the same Pass through, a point situation is handled if different;
1. the first quantum key memory module and the second quantum key memory module are divided into M if hashed value difference1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value of a submodule is different, then deletes the M of both sidesiHeight Module turns again to step 1) and repeats to detect;
2. if length of the length of length difference and the first quantum key memory module than the second quantum key memory module First quantum key memory module and the second quantum key memory module are then divided into M by more L1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value difference of a submodule is then deleted the first quantum key and is deposited Store up the M of moduleiThe M of a submodule and later L and the second quantum key memory modulei1) a submodule, turns again to Carry out duplicate test;
3. carrying out step 2. if hashed value and length are all different.

Claims (2)

1. the pp file transmission method based on the synchronous destruction technology of quantum key, which comprises the steps of:
1) original private file to be encrypted is uploaded to quantum cryptography engineering module by user;
2) before encrypted transmission, the synchronous verification module of the first quantum key of starting verification module synchronous with the second quantum key, The length of the first local quantum key memory module and one-way hash value are sent to recipient by sender, and the first of sender Quantum key memory module and the second quantum key memory module of recipient are compared, if the first quantum key memory module It is consistent with the second quantum key memory module, encrypted transmission is carried out, the first quantum key memory module and the second amount are otherwise carried out Sub-key memory module is synchronous, until both sides are consistent;
3) the first quantum key scramble module in quantum cryptography engineering module is used for according to original private file size to first Quantum key controls the first quantum key memory module in hinge and sends the quantum for obtaining size corresponding with original private file The request message of key;
4) the first quantum key controls hinge and submits to first from the truly random quantum key of the first quantum key memory module taking-up Quantum key scramble module;
5) the first quantum key scramble module generates pseudo random number password, with the received quantum key of password scramble institute, quantum Length is constant after key scramble, and result is submitted to quantum cryptography stage die by the first quantum key scramble module after the completion of encryption Block;
6) quantum cryptography engineering module encrypts original private file using the quantum key after scramble, and password is hidden to encryption In cryptograph files afterwards;
7) cryptograph files that encryption obtains are sent to recipient by the first quantum key control hinge;
8) cryptograph files are submitted to the second amount in quantum decryption stage die block by the second quantum key control hinge of recipient Sub-key scramble module;
9) the second quantum key scramble module extracts the password in cryptograph files, and according to the size of cryptograph files to the second quantum Cipher controlled hinge application quantum key;
10) the second quantum key control hinge extracts quantum key from the second quantum key memory module and is committed to the second quantum Key scramble module;
11) the second quantum key scramble module carries out scramble to quantum key using password, and result is submitted to quantum after the completion Engineering module is decrypted, quantum decryption stage die block is decrypted to obtain original hidden using the quantum key after scramble to cryptograph files Private file.
2. the pp file transmission method according to claim 1 based on the synchronous destruction technology of quantum key, feature It is, the first quantum key memory module and the second quantum key memory module synchronizing process are as follows in step 2):
1) size of the first quantum key memory module and hashed value are sent to the second quantum key memory module;
2) it examines the first quantum key memory module and the second quantum key memory module whether identical, then examines if they are the same logical It crosses, a point situation is handled if different;
1. the first quantum key memory module and the second quantum key memory module are divided into M if hashed value difference1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value of a submodule is different, then deletes the M of both sidesiA submodule Block turns again to step 1) and repeats to detect;
2. if length is different and the length of the first quantum key memory module than the second quantum key memory module length more than L, The first quantum key memory module and the second quantum key memory module are then divided into M1, M2……MnA submodule;
The hashed value of each submodule is examined, if MiThe hashed value difference of a submodule then deletes the first quantum key storage mould The M of blockiThe M of a submodule and later L and the second quantum key memory moduleiA submodule is turned again to and 1) is carried out Duplicate test;
3. carrying out step 2. if hashed value and length are all different.
CN201910270998.XA 2019-04-04 2019-04-04 Point-to-point file transmission method based on quantum key synchronous destruction technology Active CN109981270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910270998.XA CN109981270B (en) 2019-04-04 2019-04-04 Point-to-point file transmission method based on quantum key synchronous destruction technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910270998.XA CN109981270B (en) 2019-04-04 2019-04-04 Point-to-point file transmission method based on quantum key synchronous destruction technology

Publications (2)

Publication Number Publication Date
CN109981270A true CN109981270A (en) 2019-07-05
CN109981270B CN109981270B (en) 2021-06-22

Family

ID=67083127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910270998.XA Active CN109981270B (en) 2019-04-04 2019-04-04 Point-to-point file transmission method based on quantum key synchronous destruction technology

Country Status (1)

Country Link
CN (1) CN109981270B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596386A (en) * 2021-08-07 2021-11-02 施航 Video monitoring quantum encryption system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101599826A (en) * 2009-07-10 2009-12-09 陕西理工学院 Expandable multi-user quantum key distribution network system and method for distributing key thereof
US20100027794A1 (en) * 2005-09-09 2010-02-04 Kabushiki Kaisha Toshiba Quantum communication system
CN103501224A (en) * 2013-09-23 2014-01-08 长春理工大学 Asymmetric image encryption and decryption method based on quantum cell neural network system
WO2014088392A1 (en) * 2012-12-05 2014-06-12 Mimos Berhad Method for information reconciliation in quantum key distribution
CN106452750A (en) * 2016-10-19 2017-02-22 长春大学 Quantum encryption communication method for mobile devices
CN106530368A (en) * 2016-10-28 2017-03-22 陕西师范大学 Prime-domain multi-threshold progressive secret image preservation and reconstruction method
US20170264434A1 (en) * 2016-03-14 2017-09-14 Kabushiki Kaisha Toshiba Communication device, quantum key distribution system, quantum key distribution method, and computer program product
CN107517101A (en) * 2017-10-19 2017-12-26 浙江工商大学 Do not require that classical communication person possesses half quantum dialogue method of measurement capability based on single photon

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100027794A1 (en) * 2005-09-09 2010-02-04 Kabushiki Kaisha Toshiba Quantum communication system
CN101599826A (en) * 2009-07-10 2009-12-09 陕西理工学院 Expandable multi-user quantum key distribution network system and method for distributing key thereof
WO2014088392A1 (en) * 2012-12-05 2014-06-12 Mimos Berhad Method for information reconciliation in quantum key distribution
CN103501224A (en) * 2013-09-23 2014-01-08 长春理工大学 Asymmetric image encryption and decryption method based on quantum cell neural network system
US20170264434A1 (en) * 2016-03-14 2017-09-14 Kabushiki Kaisha Toshiba Communication device, quantum key distribution system, quantum key distribution method, and computer program product
CN106452750A (en) * 2016-10-19 2017-02-22 长春大学 Quantum encryption communication method for mobile devices
CN106530368A (en) * 2016-10-28 2017-03-22 陕西师范大学 Prime-domain multi-threshold progressive secret image preservation and reconstruction method
CN107517101A (en) * 2017-10-19 2017-12-26 浙江工商大学 Do not require that classical communication person possesses half quantum dialogue method of measurement capability based on single photon

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
韩家伟: "量子密钥分发与经典加密方法融合关键技术研究", 《中国博士学位论文全文数据库.基础科学辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113596386A (en) * 2021-08-07 2021-11-02 施航 Video monitoring quantum encryption system

Also Published As

Publication number Publication date
CN109981270B (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN103795533B (en) Encryption based on identifier, the method and its performs device of decryption
CN110313146A (en) Fuzziness enhancing
CN105743645B (en) Stream code key generating means, method and data encryption, decryption method based on PUF
WO2022083206A1 (en) File encryption transmission method and apparatus
CN109543434B (en) Block chain information encryption method, decryption method, storage method and device
CN101989984A (en) Electronic document safe sharing system and method thereof
CN102185694A (en) Electronic file encrypting method and system based on fingerprint information
CN103236934B (en) A kind of method of cloud storage security control
CN104468664A (en) Method and device for uploading files to cloud storage system, and method and device for downloading files from cloud storage system
CN110138795B (en) Multi-step mixed encryption and decryption method in communication process
CN106533656B (en) A kind of key multilayer mixing method for encryption/decryption based on WSN
CN108234458A (en) Method, the system of encryption storage and the decryption extraction of a kind of cloud lock cipher
CN115632880B (en) Reliable data transmission and storage method and system based on state cryptographic algorithm
CN109005027A (en) A kind of random data encryption and decryption method, apparatus and system
CN106506453A (en) Electric power big data transmission method and system based on Rapid matching and integrity detection
CN105791258A (en) Data transmission method, terminal and open platform
CN104243493A (en) Network identity authentication method and system
CN102811124B (en) Based on the system Authentication method of two card trigram technology
CN1953366B (en) Password management method and system for intelligent secret key device
CN104735094A (en) Information separation based data security transmission system and method
CN109743162A (en) A kind of operated using ideal lattice carries out the matched encryption method of identity attribute
CN109981270A (en) Pp file transmission method based on the synchronous destruction technology of quantum key
CN108880795A (en) A kind of block chain security mechanism and device
CN111740941A (en) Industrial scene real-time data file encryption transmission method
CN108494554B (en) Data symmetric encryption method based on double plaintexts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant