Unlock instant, AI-driven research and patent intelligence for your innovation.

Distribution type dynamic secret key management method

A technology of dynamic keys and management methods, applied in the field of distributed dynamic key management, can solve the problems of inability to share network network keys, unfavorable for network expansion, and no processing method for newly added network users.

Inactive Publication Date: 2009-10-14
HUAWEI TECH CO LTD +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The technical approach is deficient in that it does not provide a process for issuing subkeys for new users
This method not only greatly increases the computing overhead of network users and the entire system, but also imposes a heavy burden on the entire distributed network and users in the network; moreover, this method does not include the processing method for new network users, It is impossible for new users to join the network to share the network key in the network, and it is not conducive to the further expansion of the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distribution type dynamic secret key management method
  • Distribution type dynamic secret key management method
  • Distribution type dynamic secret key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The core idea of ​​the present invention is: according to the (t, n) threshold secret sharing principle, the network key is split into a plurality of sub-keys and stored by each user in the network respectively, and the sub-keys obtained by more than or equal to t Legal users form a sub-key recovery set, and the sub-key recovery set can recover the network key according to the sub-keys of each legal user in the set; when a new user joins the network, also according to the (t, n) threshold secret sharing principle , the subkey issuance set consisting of more than or equal to t legitimate users issues subkeys to new users.

[0068]The network key management method introduced in the specific embodiments of the present invention can not only distribute sub-keys to users who initially form the network, issue sub-keys to new users who join the network, but also can obtain sub-keys for all users in the network. The user updates the subkey, and the user who obtains the subkey i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed dynamic key management method. When the network is initialized, the trusted center distributes subkeys and subkey generation bases to each user who initially forms the network, and generates a network key; the method The following steps are also included: A. Determine the subkey issuing user, and a new user joining the network requests the subkey issuing user to issue a subkey; B. The subkey issuing user selects t users who obtain the subkey to form a subkey C. Each user in the subkey issuance set uses its own subkey to issue the main part of the subkey and the subpart of the subkey to the new user. This method uses the (t, n) threshold secret sharing principle to realize the distribution of sub-keys for the users who initially formed the network in the distributed network, issue sub-keys for new users who join the network through the round-trip hop-by-hop method, and provide The process of updating sub-keys by all legitimate users in the network also proposes a solution for multi-key sharing.

Description

technical field [0001] The invention relates to network security technology, in particular to a distributed dynamic key management method. Background technique [0002] Mobile ad hoc network (MANET, Mobile Ad hoc Network) is a special distributed mobile network without wired infrastructure support; it is a base station-free, multi- Jump, temporary autonomous network system. MANET has the characteristics of rapid establishment, flexibility, and freedom from wired network constraints. It is mainly used in special or emergency environments such as military battlefields, flood fighting and rescue, and no wiring, and has characteristics that general communication networks do not have, such as: network self-organization, dynamic network topology, limited wireless transmission bandwidth, and vulnerability to attack. Due to the wide application of MANET, it has become a research hotspot in the field of wireless communication, but a perfect security mechanism is an important prere...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/14H04L9/08
Inventor 姚军曾贵华
Owner HUAWEI TECH CO LTD