Method for updating distributed cipher key based on AVL tree

An AVL tree and update method technology, which is applied to key distribution, can solve the problems of unbalanced one-way function tree and reduce system storage overhead, etc., and achieve the effect of small update resource consumption and small number of stored keys

Active Publication Date: 2008-09-03
TSINGHUA UNIV
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Based on the balance characteristic and rotation operation of AVL tree, this method can effectively solve the problem of unbalanced one-way function tree on the basis of maintaining the distributed performance of one-way function logic key tree, thereby reducing the storage cost of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for updating distributed cipher key based on AVL tree
  • Method for updating distributed cipher key based on AVL tree
  • Method for updating distributed cipher key based on AVL tree

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] The update method of embodiment 1 is as Figure 7 to Figure 11 As shown, this example shows in detail figure 2 The key tree on the left in the center is out of balance during the update process, and the balance is restored by the method of the present invention, and finally the key update process of the entire key tree is completed.

[0062] The key update process of this embodiment includes the following steps:

[0063] 1) The user node U to be newly added 8 , U 9 , U 10 Form a subkey tree; such as Figure 7 shown;

[0064] 2) Will figure 2 The leaving user node U in 2 , U 3 , U 4 , U 6 mark-to-leave user node set, figure 2 The node indicated by the dotted line in the middle;

[0065] 3) There are nodes to leave in the user node set, so first insert the subkey tree into the original key tree, such as Figure 8 As shown, the subkey tree is inserted into the shallowest node 3 of the original key tree to form a new key tree;

[0066] 4) Put U 2 , U 3 , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a distributed group key updating method based on the AVL tree, belonging to the computer network security field. The method comprises: subkey tree forming step, subkey tree combining step, AVL rotating step; if newly formed key tree is loss of balance, rotating the new key tree in the AVL mode until recovering the balance; selecting the leaf nodes at the far left of the subtree whose all of the leaf nodes are newly jointed nodes of the new key tree as the triggering node; initiating the key updating process of the whole key tree. The invention effectively solves key tree unbalance problem in the key management plan completely based on the one-way function tree due to the perfect balance ability of AVL tree and reduces the storage spending of the users.

Description

technical field [0001] The invention belongs to the field of computer network security, in particular to the technology of multicast key management scheme. Background technique [0002] With the increasingly wide application of multicast technology in video conferencing and online games, the security issues of multicast have gradually emerged. Encrypting transmitted data is the most important means to ensure data security. For a multicast system, how to manage the keys used to encrypt data is a core issue. Key management is a complicated process, including key generation, key storage, key transmission, and key update. [0003] First, a multicast system needs to generate keys corresponding to each other between data sources and group members. Who and how to generate the key involves a division of labor and mutual trust among system members. After the key is generated, how to transmit the key to the required users is a key issue. Since the key is related to the security o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/18
Inventor 戴琼海尔桂花邓独
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products