码迷,mamicode.com
首页 > 其他好文 > 详细

QKD网络的中继方案

时间:2020-03-29 10:29:51      阅读:111      评论:0      收藏:0      [点我收藏+]

标签:img   use   figure   generated   sed   security   bsp   info   string   

源自:ITU-T标准中的密钥管理相关(Key management)

Alternative scheme of key relay

A key relay scheme to share a key between the originating node and destinating node is illustrated in Figure 3. The KeyAB is generated between KMA-A and KMA-B. The KeyAB is relayed from KMA-B to KMA-C by OTP encryption with the KeyBC. It is relayed from KMA-C to KMA-D by OTP encryption with KeyCD and finally supplied to KSA-D. 

技术图片

Figure 3 - Scheme of key relaying from point to point in Recommendation draft ITU-T Y.3800 (case 1) 

In case 2 which is illustrated in Figure 4, a random bit string KeyRN which is generated locally at KMA-A is used for key relay from KMA-A to KMA-D.

技术图片

Figure 4 - Scheme of key relaying from point to point in Recommendation draft ITU-T Y.3800 (case 2)

There are two problems for the schemes case 1 and case 2 of key relaying from point to point in real application. One is that the XOR ciphertext key and the corresponding decryption key may coexist on one relay node, which has a security risk. The other is that the network has complex KMA links between nodes, which results in implementation difficulty. To help alleviate the above problems, two modified schemes of key relaying will be described in the following.

QKD网络的中继方案

标签:img   use   figure   generated   sed   security   bsp   info   string   

原文地址:https://www.cnblogs.com/Limer98/p/12590983.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!