[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106911474A - A kind of quantum key encryption method and device based on service attribute - Google Patents

A kind of quantum key encryption method and device based on service attribute Download PDF

Info

Publication number
CN106911474A
CN106911474A CN201710325356.6A CN201710325356A CN106911474A CN 106911474 A CN106911474 A CN 106911474A CN 201710325356 A CN201710325356 A CN 201710325356A CN 106911474 A CN106911474 A CN 106911474A
Authority
CN
China
Prior art keywords
business
quantum key
key
amount
resource
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710325356.6A
Other languages
Chinese (zh)
Other versions
CN106911474B (en
Inventor
陈智雨
王栋
高德荃
李国春
赵子岩
吴冰
童文
肖磊
葛冰玉
史睿
白东霞
李伯中
刘识
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Original Assignee
State Grid Corp of China SGCC
State Grid Information and Telecommunication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, State Grid Information and Telecommunication Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN201710325356.6A priority Critical patent/CN106911474B/en
Publication of CN106911474A publication Critical patent/CN106911474A/en
Application granted granted Critical
Publication of CN106911474B publication Critical patent/CN106911474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种基于业务属性的量子密钥加密方法及装置,基于业务属性的量子密钥加密方法包括:获取各个业务的待加密数据;确定总量子密钥量资源及各个业务的业务属性;将总量子密钥量资源分配给各个业务,得到各个业务的量子密钥量资源;根据各个业务的量子密钥量资源和业务属性,确定各个业务的最优量子密钥更新频率;利用各个业务的最优量子密钥更新频率更新各个业务的量子密钥,并利用更新后的量子密钥对各个业务的待加密数据进行加密。在本申请中,通过以上方式能够提高数据的安全性和保密性。

This application provides a quantum key encryption method and device based on business attributes. The quantum key encryption method based on business attributes includes: obtaining data to be encrypted for each business; determining the total amount of quantum key resources and the business of each business Attributes; allocate the total quantum key amount resources to each business, and obtain the quantum key amount resources of each business; determine the optimal quantum key update frequency of each business according to the quantum key amount resources and business attributes of each business; The optimal quantum key update frequency of each service is used to update the quantum key of each service, and the data to be encrypted of each service is encrypted by using the updated quantum key. In this application, the security and confidentiality of data can be improved through the above methods.

Description

一种基于业务属性的量子密钥加密方法及装置A Quantum Key Encryption Method and Device Based on Business Attributes

技术领域technical field

本申请涉及通信安全领域,特别涉及一种基于业务属性的量子密钥加密方法及装置。The present application relates to the field of communication security, in particular to a quantum key encryption method and device based on business attributes.

背景技术Background technique

人类文明的不断进步及科学技术日新月异的发展,使通信方式也在不断向更文明、更先进、更智能化的方向发展。今天,伴随着计算技术和通信技术的飞速发展,人类社会已步入信息化的时代。在信息化的时代里,信息在政治、经济、军事、科技等人类生活的各个领域里都占有至关重要的位置。而与此同时,随着信息科学和技术的不断发展,尤其是互联网和无线网络的出现,信息泄露问题也日益受到人们的关注。对个人而言,信息泄露将直接导致个人的隐私、经济利益及科研成果等遭到侵犯和损失;对国家而言,这将导致政治、经济、科技、军事等领域的重大损失,尤其在军事领域,信息泄露将严重威胁国家的安全。With the continuous progress of human civilization and the rapid development of science and technology, communication methods are also developing in a more civilized, advanced and intelligent direction. Today, with the rapid development of computing technology and communication technology, human society has entered the information age. In the information age, information occupies a vital position in all fields of human life such as politics, economy, military affairs, and science and technology. At the same time, with the continuous development of information science and technology, especially the emergence of the Internet and wireless networks, the issue of information leakage has attracted increasing attention. For individuals, information leakage will directly lead to violations and losses of personal privacy, economic interests, and scientific research results; for countries, this will lead to major losses in the fields of politics, economy, technology, and military affairs, especially in military affairs. In the field, information leakage will seriously threaten national security.

由上可见,信息科学以及通信领域所面临的一个至关重要的问题就是如何进一步提高信息的安全性和保密性。It can be seen from the above that how to further improve the security and confidentiality of information is a crucial issue faced by the field of information science and communication.

发明内容Contents of the invention

为解决上述技术问题,本申请实施例提供一种基于业务属性的量子密钥加密方法及装置,以达到提高数据的安全性和保密性的目的,技术方案如下:In order to solve the above technical problems, the embodiment of this application provides a quantum key encryption method and device based on business attributes, so as to achieve the purpose of improving data security and confidentiality. The technical solution is as follows:

一种基于业务属性的量子密钥加密方法,包括:A quantum key encryption method based on business attributes, including:

获取各个业务的待加密数据;Obtain the data to be encrypted for each business;

确定总量子密钥量资源及各个所述业务的业务属性;Determine the total amount of quantum key resources and the business attributes of each of the services;

将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源;Allocating the total quantum key amount resources to each of the services to obtain the quantum key amount resources of each of the services;

根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率;Determine the optimal quantum key update frequency for each of the services according to the quantum key resources and service attributes of each of the services;

利用各个所述业务的最优量子密钥更新频率更新各个所述业务的量子密钥,并利用更新后的量子密钥对各个所述业务的待加密数据进行加密。The optimal quantum key update frequency of each of the services is used to update the quantum keys of each of the services, and the data to be encrypted of each of the services is encrypted using the updated quantum keys.

优选的,确定总量子密钥量资源,包括:Preferably, determining the total amount of quantum key resources includes:

从量子密钥生成设备中读取量子密钥实时成码率;Read the real-time coding rate of the quantum key from the quantum key generation device;

对所述量子密钥实时成码率和预设时长进行相乘运算,得到所述总量子密钥量资源。The real-time coding rate of the quantum key is multiplied by the preset time length to obtain the total quantum key resource.

优选的,各个所述业务的业务属性包括:业务数据资产等级和数据传输速率;Preferably, the service attributes of each service include: service data asset level and data transmission rate;

确定各个所述业务的业务属性,包括:Determine the business attributes of each said business, including:

在预设业务数据资产等级库中查询各个所述业务的业务数据资产等级;Query the business data asset level of each said business in the preset business data asset level database;

从各个所述业务所使用的虚拟专用网络中读取各个所述业务的数据传输速率。The data transmission rate of each of the services is read from the virtual private network used by each of the services.

优选的,将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源,包括:Preferably, the total quantum key amount resources are allocated to each of the services to obtain the quantum key amount resources of each of the services, including:

对各个所述业务的业务数据资产等级进行高低排序,得到排序结果;Sorting the business data asset levels of each of the services described above to obtain the sorting results;

利用所述排序结果确定各个所述业务的密钥分配权重;Using the sorting result to determine the key distribution weight of each of the services;

利用关系式一将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源,Si为第i个业务的量子密钥量资源,Wi为第i个业务的密钥分配权重,i为不小于1且不大于n的整数,n为不小于1的整数,W1+W2+W3+...+Wn为各个所述业务的密钥分配权重之和,S为所述总量子密钥量资源。Use relation one Distribute the total quantum key amount resources to each of the services to obtain the quantum key amount resources of each of the services, Si is the quantum key amount resource of the i -th business, Wi is the i-th business's Key distribution weight, i is an integer not less than 1 and not greater than n, n is an integer not less than 1, W1+W2+W3+...+Wn is the sum of the key distribution weights of each of the services, and S is The total amount of quantum key resources.

优选的,根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率,包括:Preferably, the optimal quantum key update frequency for each of the services is determined according to the quantum key quantity resources and service attributes of each of the services, including:

利用关系式二计算各个所述业务的最优量子密钥更新频率,fi为第i个业务的最优量子密钥更新频率,Vi为第i个业务的数据传输速率,Si为第i个业务的量子密钥量资源,Qi为第i个业务的数据传输阈值。use relation two Calculate the optimal quantum key update frequency of each of the services, fi is the optimal quantum key update frequency of the i -th business, V i is the data transmission rate of the i-th business, S i is the i-th business's Quantum key resources, Q i is the data transmission threshold of the i-th business.

一种基于业务属性的量子密钥加密装置,包括:A quantum key encryption device based on business attributes, including:

获取模块,用于获取各个业务的待加密数据;An acquisition module, configured to acquire the data to be encrypted of each business;

第一确定模块,用于确定总量子密钥量资源及各个所述业务的业务属性;A first determination module, configured to determine the total quantum key amount resources and the service attributes of each of the services;

分配模块,用于将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源;An allocation module, configured to allocate the total quantum key amount resources to each of the services, and obtain the quantum key amount resources of each of the services;

第二确定模块,用于根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率;The second determining module is used to determine the optimal quantum key update frequency of each of the services according to the quantum key resources and service attributes of each of the services;

加密模块,用于利用各个所述业务的最优量子密钥更新频率更新各个所述业务的量子密钥,并利用更新后的量子密钥对各个所述业务的待加密数据进行加密。An encryption module, configured to update the quantum key of each of the services by utilizing the optimal quantum key update frequency of each of the services, and use the updated quantum key to encrypt the data to be encrypted of each of the services.

优选的,所述第一确定模块包括:Preferably, the first determination module includes:

第一读取单元,用于从量子密钥生成设备中读取量子密钥实时成码率;The first reading unit is used to read the real-time coding rate of the quantum key from the quantum key generation device;

第一计算单元,用于对所述量子密钥实时成码率和预设时长进行相乘运算,得到所述总量子密钥量资源。The first calculation unit is configured to multiply the real-time coding rate of the quantum key and the preset time length to obtain the total quantum key resource.

优选的,各个所述业务的业务属性包括:业务数据资产等级和数据传输速率;Preferably, the service attributes of each service include: service data asset level and data transmission rate;

所述第一确定模块包括:The first determination module includes:

查询单元,用于在预设业务数据资产等级库中查询各个所述业务的业务数据资产等级;A query unit, configured to query the service data asset levels of each of the services in the preset service data asset level library;

第二读取单元,用于从各个所述业务所使用的虚拟专用网络中读取各个所述业务的数据传输速率。The second reading unit is configured to read the data transmission rate of each of the services from the virtual private network used by each of the services.

优选的,所述分配模块包括:Preferably, the allocation module includes:

排序单元,用于对各个所述业务的业务数据资产等级进行高低排序,得到排序结果;a sorting unit, configured to sort the business data asset levels of each of the businesses, and obtain the sorting results;

确定单元,用于利用所述排序结果确定各个所述业务的密钥分配权重;a determining unit, configured to determine the key distribution weights of each of the services by using the sorting results;

分配单元,用于利用关系式一将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源,Si为第i个业务的量子密钥量资源,Wi为第i个业务的密钥分配权重,i为不小于1且不大于n的整数,n为不小于1的整数,W1+W2+W3+...+Wn为各个所述业务的密钥分配权重之和,S为所述总量子密钥量资源。Allocation unit for utilizing the relation a Distributing the total quantum key amount resources to each of the services to obtain the quantum key amount resources of each of the services, Si is the quantum key amount resource of the i -th business, Wi is the i-th business's Key distribution weight, i is an integer not less than 1 and not greater than n, n is an integer not less than 1, W1+W2+W3+...+Wn is the sum of the key distribution weights of each of the services, and S is The total amount of quantum key resources.

优选的,所述第二确定模块包括:Preferably, the second determination module includes:

第二计算单元,用于利用关系式二计算各个所述业务的最优量子密钥更新频率,fi为第i个业务的最优量子密钥更新频率,Vi为第i个业务的数据传输速率,Si为第i个业务的量子密钥量资源,Qi为第i个业务的数据传输阈值。The second calculation unit is used to utilize the relation two Calculate the optimal quantum key update frequency of each of the services, fi is the optimal quantum key update frequency of the i -th business, V i is the data transmission rate of the i-th business, S i is the i-th business's Quantum key resources, Q i is the data transmission threshold of the i-th business.

与现有技术相比,本申请的有益效果为:Compared with the prior art, the beneficial effects of the present application are:

在本申请中,通过获取各个业务的待加密数据;确定总量子密钥量资源及各个所述业务的业务属性;将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源;根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率;利用各个所述业务的最优量子密钥更新频率更新各个所述业务的量子密钥,并利用更新后的量子密钥对各个所述业务的待加密数据进行加密,实现数据的加密。由于量子密钥是基于量子力学测量原理的量子态观测上的安全密钥,安全性高,因此采用量子密钥加密数据能够确保通信的无条件安全性,能够提高数据的安全性和保密性。In this application, by obtaining the data to be encrypted for each business; determining the total quantum key amount resources and the business attributes of each said business; allocating said total quantum key amount resources to each of said businesses, each The quantum key amount resources of the business; according to the quantum key amount resources and business attributes of each of the business, determine the optimal quantum key update frequency of each of the business; use the optimal quantum key of each of the business The update frequency updates the quantum key of each of the services, and uses the updated quantum key to encrypt the data to be encrypted of each of the services to realize data encryption. Since the quantum key is a security key for quantum state observation based on the measurement principle of quantum mechanics, it has high security. Therefore, using quantum key to encrypt data can ensure the unconditional security of communication and improve the security and confidentiality of data.

进一步的,根据各业务的量子密钥量资源和业务属性,确定各个业务的最优量子密钥更新频率,达到自适应调整各个业务的量子密钥更新频率的目的,以提高量子密钥的使用效率,确保电力量子保密通信网络高效安全的运行。Further, according to the quantum key resources and business attributes of each business, the optimal quantum key update frequency of each business is determined, so as to achieve the purpose of adaptively adjusting the quantum key update frequency of each business, so as to improve the use of quantum keys Efficiency, to ensure the efficient and safe operation of the power quantum secure communication network.

附图说明Description of drawings

为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present application. For those skilled in the art, other drawings can also be obtained based on these drawings without any creative effort.

图1是本申请提供的基于业务属性的量子密钥加密方法的一种流程图;Fig. 1 is a kind of flowchart of the quantum key encryption method based on business attribute provided by the present application;

图2是本申请提供的基于业务属性的量子密钥加密方法的一种子流程图;Fig. 2 is a sub-flow chart of the quantum key encryption method based on business attributes provided by the present application;

图3是本申请提供的基于业务属性的量子密钥加密方法的另一种子流程图;Fig. 3 is another sub-flow chart of the business attribute-based quantum key encryption method provided by the present application;

图4是本申请提供的基于业务属性的量子密钥加密方法的再一种子流程图;Fig. 4 is another sub-flow chart of the quantum key encryption method based on business attributes provided by the present application;

图5是本申请提供的基于业务属性的量子密钥加密装置的一种逻辑结构示意图。Fig. 5 is a schematic diagram of a logical structure of a service attribute-based quantum key encryption device provided by the present application.

具体实施方式detailed description

下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

实施例一Embodiment one

请参见图1,其示出了本申请提供的基于业务属性的量子密钥加密方法的一种流程图,可以包括以下步骤:Please refer to Fig. 1, which shows a flow chart of the business attribute-based quantum key encryption method provided by the present application, which may include the following steps:

步骤S11:获取各个业务的待加密数据。Step S11: Obtain the data to be encrypted of each service.

步骤S12:确定总量子密钥量资源及各个所述业务的业务属性。Step S12: Determine the total amount of quantum key resources and the service attributes of each of the services.

由于各个业务的执行目的不同,因此各个业务具有不同的业务属性。但是由于业务属性为业务本身的属性,因此在业务确定的情况下,可以确定出业务的业务属性。Since the execution purposes of each business are different, each business has different business attributes. However, since the business attribute is the attribute of the business itself, when the business is determined, the business attribute of the business can be determined.

步骤S13:将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源。Step S13: Allocating the total quantum key resource to each of the services to obtain the quantum key resource of each service.

步骤S14:根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率。Step S14: Determine the optimal quantum key update frequency for each of the services according to the quantum key amount resources and service attributes of each of the services.

由于密钥更新频率决定了对数据加密的安全程度,因此需要根据各个业务的量子密钥量资源和业务属性,实时的调整各个业务的量子密钥更新频率即确定各个业务的最优量子密钥更新频率。基于此,由于各个业务的业务属性直接制约着业务的数据的传输,因此需要确定与各个业务的业务属性相适配的最优量子密钥更新频率。Since the key update frequency determines the security level of data encryption, it is necessary to adjust the quantum key update frequency of each business in real time according to the quantum key resources and business attributes of each business to determine the optimal quantum key for each business update frequency. Based on this, since the service attributes of each service directly restrict the transmission of service data, it is necessary to determine the optimal quantum key update frequency that is compatible with the service attributes of each service.

步骤S15:利用各个所述业务的最优量子密钥更新频率更新各个所述业务的量子密钥,并利用更新后的量子密钥对各个所述业务的待加密数据进行加密。Step S15: Utilize the optimal quantum key update frequency of each of the services to update the quantum keys of each of the services, and use the updated quantum keys to encrypt the data to be encrypted of each of the services.

在本实施例中,由于加密使用的量子密钥是按照最优量子密钥更新频率更新得到的,因此数据加密的安全程度相对较高,加密后的数据的安全性和加密性会相应提高。In this embodiment, since the quantum key used for encryption is updated according to the optimal update frequency of the quantum key, the security level of data encryption is relatively high, and the security and encryption of encrypted data will be improved accordingly.

需要说明的是,各个业务均有一个默认密钥更新频率,在确定出各个业务的最优量子密钥更新频率后,可以首先比较各个业务的默认密钥更新频率和最优量子密钥更新频率,在两者不同时,将默认密钥更新频率调整为最优量子密钥更新频率,在两者相同时,直接使用默认密钥更新频率即可。It should be noted that each business has a default key update frequency. After determining the optimal quantum key update frequency for each business, you can first compare the default key update frequency and the optimal quantum key update frequency for each business , when the two are different, adjust the default key update frequency to the optimal quantum key update frequency, and when the two are the same, just use the default key update frequency.

当然,也可以在确定出最优量子密钥更新频率之后,不进行比较各个业务的默认密钥更新频率和最优量子密钥更新频率的操作,直接将默认密钥更新频率替换为最优量子密钥更新频率,使用最优量子密钥更新频率即可。Of course, after determining the optimal quantum key update frequency, it is also possible to directly replace the default key update frequency with the optimal quantum key update frequency without comparing the default key update frequency of each business with the optimal quantum key update frequency. Key update frequency, just use the optimal quantum key update frequency.

在本申请中,通过获取各个业务的待加密数据;确定总量子密钥量资源及各个所述业务的业务属性;将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源;根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率;利用各个所述业务的最优量子密钥更新频率更新各个所述业务的量子密钥,并利用更新后的量子密钥对各个所述业务的待加密数据进行加密,实现数据的加密。由于量子密钥是基于量子力学测量原理的量子态观测上的安全密钥,安全性高,因此采用量子密钥加密数据能够确保通信的无条件安全性,能够提高数据的安全性和保密性。In this application, by obtaining the data to be encrypted for each business; determining the total quantum key amount resources and the business attributes of each said business; allocating said total quantum key amount resources to each of said businesses, each The quantum key amount resources of the business; according to the quantum key amount resources and business attributes of each of the business, determine the optimal quantum key update frequency of each of the business; use the optimal quantum key of each of the business The update frequency updates the quantum key of each of the services, and uses the updated quantum key to encrypt the data to be encrypted of each of the services to realize data encryption. Since the quantum key is a security key for quantum state observation based on the measurement principle of quantum mechanics, it has high security. Therefore, using quantum key to encrypt data can ensure the unconditional security of communication and improve the security and confidentiality of data.

进一步的,根据各业务的量子密钥量资源和业务属性,确定各个业务的最优量子密钥更新频率,达到自适应调整各个业务的量子密钥更新频率的目的,以提高量子密钥的使用效率,确保电力量子保密通信网络高效安全的运行。Further, according to the quantum key resources and business attributes of each business, the optimal quantum key update frequency of each business is determined, so as to achieve the purpose of adaptively adjusting the quantum key update frequency of each business, so as to improve the use of quantum keys Efficiency, to ensure the efficient and safe operation of the power quantum secure communication network.

在本实施例中,上述确定总量子密钥量资源的具体过程可以参见图2,可以包括以下步骤:In this embodiment, the above-mentioned specific process of determining the total quantum key amount resources can be referred to in FIG. 2, which may include the following steps:

步骤S21:从量子密钥生成设备中读取量子密钥实时成码率。Step S21: Read the real-time coding rate of the quantum key from the quantum key generation device.

步骤S22:对所述量子密钥实时成码率和预设时长进行相乘运算,得到所述总量子密钥量资源。Step S22: Multiply the quantum key real-time coding rate and the preset time length to obtain the total quantum key resources.

在本实施例中,上述各个所述业务的业务属性具体可以包括,但不局限于为以下几种:业务数据资产等级和数据传输速率。In this embodiment, the service attributes of the above-mentioned services may specifically include, but are not limited to, the following types: service data asset level and data transmission rate.

在各个所述业务的业务属性具体包括:业务数据资产等级和数据传输速率的情况下,确定各个所述业务的业务属性的具体过程可以参见图3,可以包括以下步骤:In the case where the service attributes of each of the services specifically include: service data asset level and data transmission rate, the specific process of determining the service attributes of each of the services can be referred to in FIG. 3 , and may include the following steps:

步骤S31:在预设业务数据资产等级库中查询各个所述业务的业务数据资产等级。Step S31: query the business data asset level of each business in the preset business data asset level database.

步骤S32:从各个所述业务所使用的虚拟专用网络中读取各个所述业务的数据传输速率。Step S32: Read the data transmission rate of each of the services from the virtual private network used by each of the services.

在本实施例中,将所述总量子密钥量资源分配给各个所述业务可以采用平均分配的方式,具体为:将所述总量子密钥量资源除以业务的总个数,得到各个业务的量子密钥量资源。In this embodiment, the allocation of the total quantum key amount resources to each of the services may be in an even distribution manner, specifically: dividing the total quantum key amount resources by the total number of services, Get the quantum key resources of each business.

当然,将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源,也可以采用与业务属性相关联的方式,将总量子密钥量资源按照业务属性自使用分配给各个业务,具体可以参见图4,可以包括以下步骤:Of course, the total quantum key resource is allocated to each of the services to obtain the quantum resource of each business, and the total quantum key resource can also be associated with the business attribute. According to the self-use of business attributes, it is allocated to each business. For details, please refer to Figure 4, which may include the following steps:

步骤S41:对各个所述业务的业务数据资产等级进行高低排序,得到排序结果。Step S41: Sort the business data asset levels of each business to obtain the sorting result.

步骤S42:利用所述排序结果确定各个所述业务的密钥分配权重。Step S42: Using the sorting result to determine the key distribution weight of each of the services.

步骤S43:利用关系式一将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源。Step S43: Using relational formula 1 Allocating the total quantum key amount resources to each of the services to obtain the quantum key amount resources of each of the services.

其中,Si为第i个业务的量子密钥量资源,Wi为第i个业务的密钥分配权重,i为不小于1且不大于n的整数,n为不小于1的整数,W1+W2+W3+...+Wn为各个所述业务的密钥分配权重之和,S为所述总量子密钥量资源。Among them, S i is the quantum key resource of the i-th business, Wi is the key distribution weight of the i-th business, i is an integer not less than 1 and not greater than n, n is an integer not less than 1, W1+ W2+W3+...+Wn is the sum of the key distribution weights of each service, and S is the total quantum key resource.

在本实施例中,由于业务数据资产等级表征了业务数据的重要性,因此利用业务数据资产等级分配量子密钥量资源,能够保证重要的业务数据的更安全的加密。其中,业务数据资产等级越高,业务的密钥分配权重越大,相应的,业务分配得到的量子密钥量资源越多。In this embodiment, since the business data asset level represents the importance of the business data, the use of the business data asset level to allocate quantum key resources can ensure more secure encryption of important business data. Among them, the higher the level of business data assets, the greater the weight of the key distribution of the business, and correspondingly, the more resources of the quantum key amount allocated to the business.

基于图4示出的量子密钥量资源的分配方式,由于对于业务数据资产等级高的业务,密钥更新频率也较高。因此可以采用各个业务的密钥量资源的倒数即作为计算密钥更新频率的权重参数之一;Based on the distribution method of quantum key amount resources shown in FIG. 4 , since the key update frequency is relatively high for services with high level of service data assets. Therefore, the reciprocal of the key resources of each business can be used, that is, As one of the weight parameters for calculating the key update frequency;

以及,按照时分(即业务的运行按照时间分隔来进行业务操作)的方式更新密钥,因此数据传输率Vi的快慢决定线路所传输的业务数据量。假设某业务的传输数据量达到数据传输阈值Qi时密钥更新,则该业务对应的密钥更新周期T为 And, the key is updated in a time-division manner (that is, the operation of the service is performed according to the time-separated operation), so the speed of the data transmission rate V i determines the amount of service data transmitted by the line. Assuming that the key is updated when the amount of transmitted data of a service reaches the data transmission threshold Q i , the key update period T corresponding to the service is

联合以上两个因素,量子密钥更新频率(次/秒)为 Combining the above two factors, the quantum key update frequency (times/second) is

基于上述内容,根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率的具体过程可以为:利用关系式二计算各个所述业务的最优量子密钥更新频率,fi为第i个业务的最优量子密钥更新频率,Vi为第i个业务的数据传输速率,Si为第i个业务的量子密钥量资源,Qi为第i个业务的数据传输阈值。Based on the above content, according to the quantum key resources and business attributes of each of the services, the specific process of determining the optimal quantum key update frequency of each of the services can be as follows: using the relationship formula 2 Calculate the optimal quantum key update frequency of each of the services, fi is the optimal quantum key update frequency of the i -th business, V i is the data transmission rate of the i-th business, S i is the i-th business's Quantum key resources, Q i is the data transmission threshold of the i-th business.

当然,各个业务的业务属性除了可以包括业务数据资产等级和数据传输速率之外,还可以包括:业务优先级、数据重要性、传输实时性、数据块大小、数据传输准确性等。因此本实施例并不限定仅根据各个业务的量子密钥量资源和业务数据资产等级和数据传输速率,来确定各个业务的最优量子密钥更新频率,还可以根据各个业务的量子密钥量资源、业务优先级、数据重要性、传输实时性、数据块大小、数据传输准确性等其他业务属性来确定各个业务的最优量子密钥更新频率。具体确定过程则需要根据具体的业务属性来确定。Of course, the business attributes of each business may not only include business data asset level and data transmission rate, but also include: business priority, data importance, real-time transmission, data block size, data transmission accuracy, etc. Therefore, this embodiment is not limited to determine the optimal quantum key update frequency of each business only based on the quantum key amount resources of each business, the business data asset level and the data transmission rate, and can also be based on the quantum key amount of each business Resources, business priority, data importance, real-time transmission, data block size, data transmission accuracy and other business attributes are used to determine the optimal quantum key update frequency for each business. The specific determination process needs to be determined according to the specific business attributes.

实施例二Embodiment two

与上述方法实施例相对应,本实施例提供了一种基于业务属性的量子密钥加密装置,请参见图5,基于业务属性的量子密钥加密装置包括:获取模块11、第一确定模块12、分配模块13、第二确定模块14和加密模块15。Corresponding to the above method embodiment, this embodiment provides a quantum key encryption device based on business attributes, please refer to FIG. 5 , the quantum key encryption device based on business attributes includes: an acquisition module 11, a first determination module 12 , an allocation module 13 , a second determination module 14 and an encryption module 15 .

获取模块11,用于获取各个业务的待加密数据。The acquiring module 11 is configured to acquire the data to be encrypted of each service.

第一确定模块12,用于确定总量子密钥量资源及各个所述业务的业务属性。The first determination module 12 is configured to determine the total amount of quantum key resources and the service attributes of each of the services.

分配模块13,用于将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源。The allocation module 13 is configured to allocate the total quantum key resource to each of the services, and obtain the quantum key resource of each service.

第二确定模块14,用于根据各个所述业务的量子密钥量资源和业务属性,确定各个所述业务的最优量子密钥更新频率。The second determination module 14 is configured to determine the optimal quantum key update frequency for each of the services according to the quantum key resources and service attributes of each of the services.

加密模块15,用于利用各个所述业务的最优量子密钥更新频率更新各个所述业务的量子密钥,并利用更新后的量子密钥对各个所述业务的待加密数据进行加密。The encryption module 15 is configured to use the optimal quantum key update frequency of each of the services to update the quantum keys of each of the services, and use the updated quantum keys to encrypt the data to be encrypted of each of the services.

在本实施例中,第一确定模块12具体可以包括:第一读取单元和第一计算单元。In this embodiment, the first determining module 12 may specifically include: a first reading unit and a first calculating unit.

第一读取单元,用于从量子密钥生成设备中读取量子密钥实时成码率。The first reading unit is used to read the real-time coding rate of the quantum key from the quantum key generating device.

第一计算单元,用于对所述量子密钥实时成码率和预设时长进行相乘运算,得到所述总量子密钥量资源。The first calculation unit is configured to multiply the real-time coding rate of the quantum key and the preset time length to obtain the total quantum key resource.

在本实施例中,上述各个所述业务的业务属性具体可以包括:业务数据资产等级和数据传输速率。In this embodiment, the service attributes of the above-mentioned services may specifically include: service data asset level and data transmission rate.

在各个所述业务的业务属性具体可以包括:业务数据资产等级和数据传输速率的情况下,所述第一确定模块12具体包括:查询单元和第二读取单元。In the case that the service attributes of each service may specifically include: service data asset level and data transmission rate, the first determining module 12 specifically includes: a query unit and a second reading unit.

查询单元,用于在预设业务数据资产等级库中查询各个所述业务的业务数据资产等级。The query unit is configured to query the service data asset class of each service in the preset service data asset class library.

第二读取单元,用于从各个所述业务所使用的虚拟专用网络中读取各个所述业务的数据传输速率。The second reading unit is configured to read the data transmission rate of each of the services from the virtual private network used by each of the services.

在本实施例中,上述分配模块13具体可以包括:排序单元、确定单元和分配单元。In this embodiment, the allocation module 13 may specifically include: a sorting unit, a determination unit, and an allocation unit.

排序单元,用于对各个所述业务的业务数据资产等级进行高低排序,得到排序结果。The sorting unit is configured to sort the service data asset levels of each of the services from high to low to obtain a sorting result.

确定单元,用于利用所述排序结果确定各个所述业务的密钥分配权重。A determining unit, configured to determine key distribution weights for each of the services by using the sorting result.

分配单元,用于利用关系式一将所述总量子密钥量资源分配给各个所述业务,得到各个所述业务的量子密钥量资源,Si为第i个业务的量子密钥量资源,Wi为第i个业务的密钥分配权重,i为不小于1且不大于n的整数,n为不小于1的整数,W1+W2+W3+...+Wn为各个所述业务的密钥分配权重之和,S为所述总量子密钥量资源。Allocation unit for utilizing the relation a Distribute the total quantum key amount resources to each of the services to obtain the quantum key amount resources of each of the services, Si is the quantum key amount resource of the i -th business, Wi is the i-th business's Key distribution weight, i is an integer not less than 1 and not greater than n, n is an integer not less than 1, W1+W2+W3+...+Wn is the sum of the key distribution weights of each of the services, and S is The total amount of quantum key resources.

上述第二确定模块14具体可以包括:第二计算单元,用于利用关系式二计算各个所述业务的最优量子密钥更新频率,fi为第i个业务的最优量子密钥更新频率,Vi为第i个业务的数据传输速率,Si为第i个业务的量子密钥量资源,Qi为第i个业务的数据传输阈值。The above-mentioned second determination module 14 may specifically include: a second calculation unit, configured to use the relational expression 2 Calculate the optimal quantum key update frequency of each of the services, f i is the optimal quantum key update frequency of the i-th business, V i is the data transmission rate of the i-th business, S i is the i-th business's Quantum key resources, Q i is the data transmission threshold of the i-th business.

需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置类实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。It should be noted that each embodiment in this specification is described in a progressive manner, and each embodiment focuses on the differences from other embodiments. For the same and similar parts in each embodiment, refer to each other, that is, Can. As for the device-type embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and for related parts, please refer to part of the description of the method embodiments.

最后,还需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。Finally, it should also be noted that in this text, relational terms such as first and second etc. are only used to distinguish one entity or operation from another, and do not necessarily require or imply that these entities or operations, any such actual relationship or order exists. Furthermore, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article, or apparatus comprising a set of elements includes not only those elements, but also includes elements not expressly listed. other elements of or also include elements inherent in such a process, method, article, or device. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.

为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本申请时可以把各单元的功能在同一个或多个软件和/或硬件中实现。For the convenience of description, when describing the above devices, functions are divided into various units and described separately. Of course, when implementing the present application, the functions of each unit can be implemented in one or more pieces of software and/or hardware.

通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到本申请可借助软件加必需的通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例或者实施例的某些部分所述的方法。It can be known from the above description of the implementation manners that those skilled in the art can clearly understand that the present application can be implemented by means of software plus a necessary general-purpose hardware platform. Based on this understanding, the essence of the technical solution of this application or the part that contributes to the prior art can be embodied in the form of software products, and the computer software products can be stored in storage media, such as ROM/RAM, disk , CD, etc., including several instructions to make a computer device (which may be a personal computer, server, or network device, etc.) execute the methods described in various embodiments or some parts of the embodiments of the present application.

以上对本申请所提供的一种基于业务属性的量子密钥加密方法及装置进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。The above is a detailed introduction to a quantum key encryption method and device based on business attributes provided by this application. In this paper, specific examples are used to illustrate the principle and implementation of this application. The description of the above embodiments is only for To help understand the method and its core idea of this application; at the same time, for those of ordinary skill in the art, according to the idea of this application, there will be changes in the specific implementation and application scope. In summary, the content of this specification It should not be construed as a limitation of the application.

Claims (10)

1. a kind of quantum key encryption method based on service attribute, it is characterised in that including:
Obtain the be-encrypted data of each business;
It is determined that the service attribute of total quantum key amount resource and each business;
Each described business is given by total quantum key amount resource allocation, the quantum key amount money of each business is obtained Source;
Quantum key amount resource and service attribute according to each business, determine the optimal quantum key of each business Renewal frequency;
The quantum key of each business is updated using the optimal amount sub-key update frequency of business each described, and using more Quantum key after new is encrypted to the be-encrypted data of business each described.
2. method according to claim 1, it is characterised in that it is determined that total quantum key amount resource, including:
Quantum key is read from quantum key generation equipment in real time into code check;
Multiplication operation is carried out into code check and preset duration in real time to the quantum key, total quantum key amount resource is obtained.
3. method according to claim 1 and 2, it is characterised in that the service attribute of each business includes:Business number According to asset level and message transmission rate;
Determine the service attribute of each business, including:
The business datum asset level of each business is inquired about in pre-set business data assets grade storehouse;
The message transmission rate of each business is read from the VPN that business each described is used.
4. method according to claim 3, it is characterised in that by total quantum key amount resource allocation to described in each Business, obtains the quantum key amount resource of each business, including:
Business datum asset level to business each described carries out height sequence, obtains ranking results;
The encryption key distribution weight of each business is determined using the ranking results;
Using relational expression oneEach institute is given by total quantum key amount resource allocation Business is stated, the quantum key amount resource of each business, S is obtainediIt is i-th quantum key amount resource of business, Wi is i-th The encryption key distribution weight of individual business, i is not less than the 1 and no more than integer of n, and n is the integer not less than 1, W1+W2+W3+...+ Wn is the encryption key distribution weight sum of each business, and S is total quantum key amount resource.
5. method according to claim 4, it is characterised in that quantum key amount resource and industry according to each business Business attribute, determines the optimal amount sub-key update frequency of each business, including:
Using relational expression twoCalculate the optimal amount sub-key update frequency of each business, fiIt is i-th industry The optimal amount sub-key update frequency of business, ViIt is i-th message transmission rate of business, SiIt is i-th quantum key amount of business Resource, QiIt is i-th data transfer threshold value of business.
6. a kind of quantum key encryption device based on service attribute, it is characterised in that including:
Acquisition module, the be-encrypted data for obtaining each business;
First determining module, the service attribute for determining total quantum key amount resource and each business;
Distribute module, for giving each described business by total quantum key amount resource allocation, obtains each business Quantum key amount resource;
Second determining module, for quantum key amount resource and service attribute according to each business, determines described in each The optimal amount sub-key update frequency of business;
Encrypting module, the quantum of each business is updated for the optimal amount sub-key update frequency using business each described Key, and the be-encrypted data of business each described is encrypted using the quantum key after renewal.
7. device according to claim 6, it is characterised in that first determining module includes:
First reading unit, for reading quantum key from quantum key generation equipment in real time into code check;
First computing unit, for carrying out multiplication operation into code check and preset duration in real time to the quantum key, obtains described Total quantum key amount resource.
8. the device according to claim 6 or 7, it is characterised in that the service attribute of each business includes:Business number According to asset level and message transmission rate;
First determining module includes:
Query unit, for inquiring about business datum assets of each business etc. in pre-set business data assets grade storehouse Level;
Second reading unit, the number for reading each business from the VPN that business each described is used According to transmission rate.
9. device according to claim 8, it is characterised in that the distribute module includes:
Sequencing unit, height sequence is carried out for the business datum asset level to business each described, obtains ranking results;
Determining unit, the encryption key distribution weight for determining each business using the ranking results;
Allocation unit, for utilizing relational expression oneTotal quantum key amount is provided Each business is distributed in source, obtains the quantum key amount resource of each business, SiIt is i-th quantum key of business Amount resource, Wi is i-th encryption key distribution weight of business, and i is not less than the 1 and no more than integer of n, and n is whole not less than 1 Number, W1+W2+W3+...+Wn is the encryption key distribution weight sum of each business, and S is total quantum key amount resource.
10. device according to claim 9, it is characterised in that second determining module includes:
Second computing unit, for utilizing relational expression twoCalculate the optimal amount sub-key update of each business Frequency, fiIt is i-th optimal amount sub-key update frequency of business, ViIt is i-th message transmission rate of business, SiIt is i-th The quantum key amount resource of business, QiIt is i-th data transfer threshold value of business.
CN201710325356.6A 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes Active CN106911474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710325356.6A CN106911474B (en) 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710325356.6A CN106911474B (en) 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes

Publications (2)

Publication Number Publication Date
CN106911474A true CN106911474A (en) 2017-06-30
CN106911474B CN106911474B (en) 2020-07-03

Family

ID=59210528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710325356.6A Active CN106911474B (en) 2017-05-10 2017-05-10 Quantum key encryption method and device based on business attributes

Country Status (1)

Country Link
CN (1) CN106911474B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134669A (en) * 2018-01-11 2018-06-08 北京国电通网络技术有限公司 Towards the quantum key dynamic supply method of power scheduling business and management system
CN109067519A (en) * 2018-07-25 2018-12-21 厦门科华恒盛股份有限公司 A kind of method, system and the relevant apparatus of adjustment amount sub-key update frequency
CN109951452A (en) * 2019-02-26 2019-06-28 北京深思数盾科技股份有限公司 A kind of method and device handling cryptography task
CN110061840A (en) * 2019-03-12 2019-07-26 平安科技(深圳)有限公司 Data ciphering method, device, computer equipment and storage medium
CN110620650A (en) * 2018-06-20 2019-12-27 中国电信股份有限公司 Communication method, system, device and computer readable storage medium
CN111211896A (en) * 2019-12-19 2020-05-29 南京南瑞国盾量子技术有限公司 Integrated quantum key encryption method, system and storage medium suitable for power business
CN113757909A (en) * 2021-11-08 2021-12-07 国网浙江省电力有限公司绍兴供电公司 Air conditioner cluster control method based on quantum encryption technology
CN116232629A (en) * 2022-11-15 2023-06-06 北京连山科技股份有限公司 Multi-link data particle transmission method based on quantum cryptography protection

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179377A (en) * 2006-11-09 2008-05-14 中兴通讯股份有限公司 Cipher key distributing and updating system of multimedia broadcasting service
WO2010151105A1 (en) * 2009-06-24 2010-12-29 Mimos Berhad Method for use in quantum cryptography
CN103840936A (en) * 2014-02-28 2014-06-04 山东量子科学技术研究院有限公司 Reliable encryption transmission system and method of quantum cryptography network
CN104660602A (en) * 2015-02-14 2015-05-27 山东量子科学技术研究院有限公司 Quantum key transmission control method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101179377A (en) * 2006-11-09 2008-05-14 中兴通讯股份有限公司 Cipher key distributing and updating system of multimedia broadcasting service
WO2010151105A1 (en) * 2009-06-24 2010-12-29 Mimos Berhad Method for use in quantum cryptography
CN103840936A (en) * 2014-02-28 2014-06-04 山东量子科学技术研究院有限公司 Reliable encryption transmission system and method of quantum cryptography network
CN104660602A (en) * 2015-02-14 2015-05-27 山东量子科学技术研究院有限公司 Quantum key transmission control method and system

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108134669A (en) * 2018-01-11 2018-06-08 北京国电通网络技术有限公司 Towards the quantum key dynamic supply method of power scheduling business and management system
CN110620650A (en) * 2018-06-20 2019-12-27 中国电信股份有限公司 Communication method, system, device and computer readable storage medium
CN109067519A (en) * 2018-07-25 2018-12-21 厦门科华恒盛股份有限公司 A kind of method, system and the relevant apparatus of adjustment amount sub-key update frequency
CN109951452A (en) * 2019-02-26 2019-06-28 北京深思数盾科技股份有限公司 A kind of method and device handling cryptography task
CN110061840A (en) * 2019-03-12 2019-07-26 平安科技(深圳)有限公司 Data ciphering method, device, computer equipment and storage medium
CN110061840B (en) * 2019-03-12 2022-10-28 平安科技(深圳)有限公司 Data encryption method and device, computer equipment and storage medium
CN111211896A (en) * 2019-12-19 2020-05-29 南京南瑞国盾量子技术有限公司 Integrated quantum key encryption method, system and storage medium suitable for power business
CN113757909A (en) * 2021-11-08 2021-12-07 国网浙江省电力有限公司绍兴供电公司 Air conditioner cluster control method based on quantum encryption technology
CN116232629A (en) * 2022-11-15 2023-06-06 北京连山科技股份有限公司 Multi-link data particle transmission method based on quantum cryptography protection
CN116232629B (en) * 2022-11-15 2023-09-26 北京连山科技股份有限公司 Multi-link data particle transmission method based on quantum cryptography protection

Also Published As

Publication number Publication date
CN106911474B (en) 2020-07-03

Similar Documents

Publication Publication Date Title
CN106911474B (en) Quantum key encryption method and device based on business attributes
Sowmiya et al. Linear elliptical curve digital signature (LECDS) with blockchain approach for enhanced security on cloud server
CN106778314A (en) A kind of distributed difference method for secret protection based on k means
WO2022116491A1 (en) Dbscan clustering method based on horizontal federation, and related device therefor
US20220311754A1 (en) Generating bridge match identifiers for linking identifers from server logs
CN115088005A (en) Securing access to information in content distribution using secure MPC and vector computation
Jayapandian Cloud dynamic scheduling for multimedia data encryption using tabu search algorithm
Manoj et al. Hybrid secure and scalable electronic health record sharing in hybrid cloud
Qin et al. A split-federated learning and edge-cloud based efficient and privacy-preserving large-scale item recommendation model
Balajee et al. A comparative study on efficient cloud security, services, simulators, load balancing, resource scheduling and storage mechanisms
Jia Construction of online social network data mining model based on blockchain
Ramamoorthy et al. Optimized data analysis in cloud using BigData analytics techniques
CN111949998B (en) Object detection and request method, data processing system, device and storage medium
Swami et al. A new secure data retrieval system based on ECDH and hierarchical clustering with Pearson correlation
Sun et al. Differentially private AUC computation in vertical federated learning
Renuga et al. Efficient privacy-preserving data sanitization over cloud using optimal GSA algorithm
Gheid et al. An efficient and privacy-preserving similarity evaluation for big data analytics
Gahane et al. The awareness of decision making process, data governance policies for quality and security of big data with cloud environment and data science
CN114638003A (en) Blockchain-based data storage method and device
Sun et al. Secure grid‐based density peaks clustering on hybrid cloud for industrial IoT
Bakkiam David et al. Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network
Sekar et al. Privacy preserving-aware over big data in clouds using GSA and MapReduce framework
CN114006914B (en) Cloud secure storage method, system, medium and electronic device for file copy
Bagula et al. A Review of Federated Learning: Algorithms
Jiang et al. Set Intersection Computing Based on Privacy Protection of Cloud Platform in Teaching Data State Database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant