Method for distributing key using public key cryptographic technique and on-line updating of the public key
A technology of key distribution and public key cryptography, which is applied in the field of key distribution and public key online update, and can solve problems such as large security risks, threats to system security, and perfect forward secrecy without keys.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037]The key distribution center has a pair of public-private key pair x and Px, and the communication entity should obtain the public key Px of the key distribution center before communication and store it locally. When the first entity A and the second entity B need to conduct secure communication, the communication session key is obtained through a key distribution protocol.
[0038] see Figure 5 , the steps of the key distribution method utilizing public key cryptography of the present invention are as follows:
[0039] 1) The first entity A generates a pair of temporary public-private key pair a and Pa, and sends a key request message to the key distribution center, and the key request message contains the temporary public key Pa of the first entity A;
[0040] 2) After the key distribution center receives the key request message sent by the first entity A, it generates the communication session key k between the first entity A and the second entity B, and the key dist...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com