Uni-directional function tree multicast key management method based on cipher sharing

A secret sharing, one-way function technology, applied in key distribution, to achieve the effect of enhancing attack resistance, small update overhead, and reducing the possibility of interception and cracking

Inactive Publication Date: 2008-11-19
ZHEJIANG UNIV
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with unicast key management, forward secrecy, backward secrecy and collusion cracking are unique security issues of multicast key management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Uni-directional function tree multicast key management method based on cipher sharing
  • Uni-directional function tree multicast key management method based on cipher sharing
  • Uni-directional function tree multicast key management method based on cipher sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The present invention is applicable to any application scenario requiring multicast key management.

[0077] In the elaboration of the specific implementation, the symbol s→{m}: x means that the sender s sends the message x to the member m, and the symbol {x} K Indicates that the message x is encrypted with the key K.

[0078] 1. Generation of key hierarchy tree

[0079] figure 2 and image 3 Respectively represent the key hierarchy tree and the blind key hierarchy tree created by the group controller with 8 group members using the method provided in the present invention. leaf node k 1 , k 2 ..., k 8 Corresponding to the private key K shared by group members and group controllers 1 , K 2 ,...,K 8 ;K i (i=1,2,...,8) is in member m i When joining a group, the private key of the member is generated through a key exchange protocol (such as the Diffie-Hellman key exchange protocol) with the group controller. middle node k 1-2 , k 3-4 , k 5-6 , k 7-8 , k 1-...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a one-way function tree multicast key management method base on secret sharing. The present multicast protocol lacks safety mechanism to suffice the safety requirement of the multicast application. During the key updating transmission, the invention uses the key to encrypt a blind key to realize the transmission; the process includes generating a key hierarchy tree and a blind key hierarchy tree, generating, distributing and recovering a group key, a group member joining in, a group member laving and a periodical key updating. The detail method of generating blind key hierarchy tree is that: each node of the blind key hierarchy tree uses the corresponding key K to obtain a blind key S through a function S=g(K); wherein, the function g is a one-way function. The one-way function tree multicast key management method of the invention can perform key updating by only transmitting the blind key S and sharing the secret share through the method of secret sharing, thereby avoids transmitting the true key to perform key updating, reduces the possibility of key being captured or cracked, and increases the anti-attack ability with higher safety.

Description

technical field [0001] The invention belongs to the technical field of multicast key management, and relates to a one-way function tree multicast key management method based on secret sharing, in particular to a method for multicast key management combined with one-way function and secret sharing. Background technique [0002] With the rapid popularization and explosive development of the Internet, many new applications have emerged on the Internet, many of which are high-bandwidth multimedia applications, such as network video conferencing, network audio / video broadcasting, video on demand, stock market release, multimedia remote education etc. Multicast technology is a new technology produced to meet the needs of this application. Multicast transmission improves data transmission efficiency and reduces the possibility of network congestion. However, the current multicast protocol lacks an effective security mechanism to meet the security requirements of multicast applica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L12/18H04L29/06
Inventor 陈惠芳谢磊金煦席国宝
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products