会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明授权
    • Quantum key distribution method and apparatus
    • 量子密钥分发方法及装置
    • US07864958B2
    • 2011-01-04
    • US11454632
    • 2006-06-16
    • Keith Alexander HarrisonWilliam John MunroLiqun Chen
    • Keith Alexander HarrisonWilliam John MunroLiqun Chen
    • H04K1/00
    • H04L9/0858G06F7/588
    • A quantum key distribution (QKD) method involves the sending of random data from a QKD transmitter to a QKD receiver over a quantum signal channel, and the QKD transmitter and receiver respectively processing the data transmitted and received over the quantum signal channel in order to seek to derive a common random data set. This processing is effected with the aid of messages exchanged between QKD transmitter and receiver over an insecure classical communication channel. The processing concludes with a check, effected by an exchange of authenticated messages over the classical communication channel, that the QKD transmitter and receiver have derived the same random data set. At least some of the other messages exchanged during processing are exchanged without authentication and integrity checking. A QKD transmitter and QKD receiver are also disclosed.
    • 量子密钥分配(QKD)方法涉及通过量子信道从QKD发射机向QKD接收机发送随机数据,并且QKD发射机和接收机分别处理通过量子信号信道发送和接收的数据,以便寻找 以得出公共随机数据集。 借助于在不安全的经典通信信道上在QKD发射机和接收机之间交换的消息来实现该处理。 该处理结束于通过经典通信信道的认证消息交换实现的检验,即QKD发射机和接收机已经导出相同的随机数据集。 在处理期间交换的至少一些其他消息被交换,而不进行认证和完整性检查。 还公开了QKD发射机和QKD接收机。
    • 9. 发明授权
    • Cryptographic method and apparatus
    • 密码方法和装置
    • US07574596B2
    • 2009-08-11
    • US10831549
    • 2004-04-22
    • Liqun ChenMartin SadlerKeith Alexander Harrison
    • Liqun ChenMartin SadlerKeith Alexander Harrison
    • G06F9/00
    • H04L9/3073H04L9/083H04L9/0847
    • First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.
    • 要由第一方发送给第二方的第一数据使用至少使用第二数据生成的散列值形成的加密密钥串进行加密,以及用作第一方的标识的信任方共享的秘密。 第二数据包括例如用作第二方的标识符的一个或多个条件以及通过对第一数据进行散列而产生的散列值元素。 加密的第一数据和加密密钥串对第二方可用,该第二方通过对相应的解密密钥的请求将加密密钥串转发到信任方。 可信方基于加密密钥串中包含的数据执行至少一个检查,并且如果该至少一个检查令人满意,则向第二方提供解密密钥。