Wireless self-organizing network cryptographic key updating and repealing method

A wireless self-organization, network key technology, applied in the public key and key distribution of secure communication, can solve the problems of providing keys, irrevocable, unable to provide individual authentication, etc., to improve efficiency, reduce calculation and communication volume Effect

Inactive Publication Date: 2008-09-24
BEIHANG UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that it needs to distribute passwords in a physical way; there is no mechanism to provide keys to devices that join later, and it cannot revoke the keys of members who leave early; it cannot provide individual authentication; and it requires devices to have considerable computing power. Capability, because each round of key negotiation includes multiple modular exponentiation operations, so it is not suitable for wireless ad hoc network environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless self-organizing network cryptographic key updating and repealing method
  • Wireless self-organizing network cryptographic key updating and repealing method
  • Wireless self-organizing network cryptographic key updating and repealing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0054] The cipher used in this embodiment is an elliptic curve cipher, and the threshold cipher technology used in threshold segmentation is the polynomial threshold cipher proposed by Shamir.

[0055] In the construction phase of the entire network, there is a key initialization link, in which the password designer sets security parameters to build a trusted key center TA. And the devices participating in the initialization are divided into two types: common devices and server devices, and are initialized separately.

[0056] The initialization process is as figure 1 shown, including the following steps:

[0057] Step 1: Build a trusted key center TA, and set security parameters according to network security requirements, including: elliptic curve E, h mapping functions F 1 , F 2 ,...,F h , the private key seed matrix SSK and the public key seed matrix ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to updating and repealing methods for a wireless self-organized network key. During the network operation stage, a device can apply for key updating to a plurality of servers of the network without the support of a credible authentication center. The successful responses which are equal or more than the number of thresholds are obtained so as to carry out key updating successfully and to realize automatic repealing of the key. A public key with an elliptical curve combination is combined with a threshold password so as to improve the efficiencies of key management and network device authentication; the support of the credible authentication center is needed only at the initialization stage of the key when the method is used. During the network operation stage, the device can automatically carry out key updating without the credible authentication center, thus reducing the calculation and communications volume between the device authentication and the key negotiation process.

Description

technical field [0001] The invention belongs to the field of network security, relates to a key management method, in particular to a distributed network key initialization, update and revocation method. Background technique [0002] Wireless ad hoc network is a wireless network with no center, self-organization, multi-hop routing, dynamic topology and resource constraints. Before wireless ad hoc network is widely used, security issues are the key issues that need to be solved. Its characteristics of no center and self-organization make its security problem more difficult to solve than traditional wireless networks. Device key management is the foundation of identity authentication and the foundation of network security. [0003] Elliptic curve composite public key is a key management method. Let the elliptic curve equation on the prime number field F(p) be formula (1). [0004] E:y 2 =(x 3 +ax+b)modp (1) [0005] The set of all solutions of equation (1) on the field F...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/30H04L12/28
Inventor 刘淳刘建伟丁文锐刘朝晖
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products