Supercharge Your Innovation With Domain-Expert AI Agents!

Multicast cryptographic key distribution method and updating method based on unicast conversation cryptographic key

A session key and multicast key technology, which is applied in the branch office to provide special service devices, data exchange details, security devices, etc., can solve the problem of low efficiency of multicast key distribution

Inactive Publication Date: 2009-01-14
CHINA IWNCOMM
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The present invention provides a method for distributing multicast keys based on unicast session keys in order to solve the problem of low efficiency of multicast key distribution based on unicast session keys in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast cryptographic key distribution method and updating method based on unicast conversation cryptographic key
  • Multicast cryptographic key distribution method and updating method based on unicast conversation cryptographic key
  • Multicast cryptographic key distribution method and updating method based on unicast conversation cryptographic key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] see figure 1 , the present invention is based on the multicast key distribution method of unicast session key and specifically comprises the following steps:

[0077] 1) Establish system parameters, the system parameters are: set (G 1 , +) and (G 2 , ·) is a cyclic group with both orders p, p is a prime number, and satisfies G 1 The Diffie-Hellman calculation problem in is a difficult problem; let P be G 1 Generator of ; let e be G 1 and G 2 The bilinear transformation on , that is, e: G 1 ×G 1 →G 2 ;Let h( ) be a one-way hash function;

[0078] This step is only to establish the system parameters during the first application, after the establishment, this step is not required in the subsequent repeated application;

[0079] 2) The base station performs security authentication and unicast session key USK negotiation with each terminal, and each terminal i shares a unicast session key USK with the base station i , the unicast session integrity verification key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a multicast cipher key distributing method and updating method thereof based on single broadcast session cipher key. The distribution method includes the following steps: 1) base stations constructing multicast cipher key distribute packets; 2) the base station performing broadcast multicast cipher key distribution packet to all terminals; 3) terminals acquiring multicast session cipher key by calculating. The present invention solves the problem that the multicast cipher key distribution efficiency based on single broadcast session cipher key in the existing technology is low, and provides a multicast cipher key distribution method based on single broadcast session cipher key.

Description

field of invention [0001] The invention relates to a method for distributing a multicast key based on a unicast session key and an updating method thereof. Background technique [0002] The issue of network security has received extensive attention from both industry and academia. Relatively speaking, the security problem of wireless network is far more serious than that of wired Ethernet. The IEEE (Institute of Electrical and Electronics Engineers) of the United States formulated the 802.11 and 802.16 series of standards to enhance the security of wireless local area networks and wireless metropolitan area networks, and provide secure access from mobile terminals MT to base stations BS. China also promulgated in May 2003 The national standard for wireless LAN GB15629.11 is usually called WAPI (Wireless Local Area Network Authentication and Privacy Infrastructure) protocol. Broadband wireless multimedia (BWM) network integrates data communication and broadcast communicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/18
CPCH04W12/04H04W12/10H04L63/065H04L9/0833H04L9/0844H04W88/08H04L9/0891H04W12/041H04W12/0471H04W12/106H04W12/108
Inventor 庞辽军曹军铁满霞
Owner CHINA IWNCOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More