Authenticating Ad Hoc group cipher key negotiation protocol

A technology of group keys and protocols, applied in the public key and key distribution of secure communication, can solve problems such as inability to guarantee security services

Inactive Publication Date: 2008-02-06
SHANGHAI UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method needs to dynamically select a group of key servers, but this method cannot guarantee the ability to continue to provide security services when the key server is attacked (after being copied)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticating Ad Hoc group cipher key negotiation protocol
  • Authenticating Ad Hoc group cipher key negotiation protocol
  • Authenticating Ad Hoc group cipher key negotiation protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] specific implementation

[0064] A preferred embodiment of the present invention is described in detail as follows in conjunction with accompanying drawing: the Ad Hoc group key agreement protocol that can be authenticated is:

[0065] 1. Negotiation initialization phase (IKA Initial key Agreement)

[0066] It can be seen from FIG. 1 that the height of the key tree proposed by the present invention is two layers, the root node has more than two children, and the first leaf node has more than two children. Before each key agreement, each Ad Hoc group must elect a group control node responsible for organizing the order of key agreement. The key agreement process is as follows:

[0067] First, each member chooses a random number r i , b i ∈[1,q-1] and a key x i ; Then, publish the public key y i and parameter c i , τ i : c i = H ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to an Ad Hoc group cipher key negotiation which is capable of being authenticated, and drafting the cryptographic key protocol through the method which is based on a code tree. The present invention adopts a threshold cryptographic key and a Contributory type cryptographic key negotiation; and adopts the tree-shaped method when transmitting, not only increasing the flexibility and the efficiency, but the invention is more suitable for the situations whose communication environment is execrable; and the invention adopts authenticates the whole negotiation process through utilizing the Schonorr signature method, increasing the safety performance of the system. The result produced by the present invention is simple and safe, and the invention has a function of error resistance.

Description

technical field [0001] The invention relates to an authenticable group key negotiation protocol, in particular to an authenticable Ad Hoc (Ad Hoc Network Ad Hoc Network) group key negotiation protocol. Background technique [0002] Ad hoc network (Ad Hoc) is formed by a group of autonomous wireless mobile nodes or terminals combined with each other, which is independent of fixed infrastructure and adopts distributed management. No center, self-organization, limited bandwidth and energy are its salient features. [0003] Due to the lack of fixed infrastructure support, the Ad Hoc network can only transmit information through wireless channels through mutual cooperation between nodes, so the Ad Hoc network presents the characteristics of a distributed network spanning multiple operating systems. Many distributed and collaborative applications such as shared tools such as video teleconferencing require secure multicasting. However, if the traditional security mechanism is sim...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08
Inventor 刘同佩孙平陈毅文张日华张保峰
Owner SHANGHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products