Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method for multicast communication source

An authentication method and communication technology, applied in the field of network communication, can solve the problems of increasing message calculation overhead, increasing message length, performance constraints, etc.

Inactive Publication Date: 2011-07-06
SOUTHEAST UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The signature mechanism based on the public key can provide strong security features. However, it requires the sender to show the personal digital certificate to the recipient, which will increase the length of the message and the calculation overhead of certificate verification. At the same time, the recipients in the group also Need to store digital certificates of other group members
Since the signature mechanism based on the public key needs to increase the receiver's storage overhead and calculation overhead, and increase the length of the message, its performance is greatly restricted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for multicast communication source
  • Authentication method for multicast communication source
  • Authentication method for multicast communication source

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Such as figure 1 In the schematic diagram of the multicast communication security mechanism shown, the group administrator is the security center of the entire system, a network entity trusted by both the sender and the receiver, and is responsible for the management and distribution of multicast security materials.

[0030] The multicast communication problem can be defined as follows: a multicast group is created by a group administrator, its members include senders and receivers, and a network entity can register as a sender or receiver. To implement this method, all senders and receivers have established security associations with the group administrator before joining the group, and the multicast communication process is divided into different stages. Therefore, the multicast communication signature mechanism can be defined as follows:

[0031] (1) Let S j is the sender authorized by the group administrator during phase j. When the receiver receives a message fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method of a multicast communication source, belonging to the network communication field. The method essentially comprises the following steps of: establishment of a multicast group, registration of group members, key distribution and message signaling at j time during the multicast phase; wherein, the establishment of the multicast group comprises the steps of: establishing an elliptic curve T by a group administrator and calculating a fist prime number at the phase, randomly selecting a fist base point G and establishing the self public-private key pairs; the registration of group members comprises the steps: a network entity applies towards the group administrator to register to be a message sender and a message receiver; key distribution at j time during the multicast phase is the public-private key pairs generation process of the sender authorized by the group administrator; and message signaling relates to that the message sender generates a digital signature and sends the digital signature to the message receiver. The invention can effectively reduce the storing cost and the cost of authentication calculation of the message receiver.

Description

technical field [0001] The invention relates to an authentication method of a communication source, in particular to an authentication method of a multicast communication source, which belongs to the field of network communication. Background technique [0002] With the gradual saturation of traditional voice services, the development of Internet multimedia data services will become an inevitable trend of network development in the future. Many current multimedia data services such as multi-party conferences and video multicast require the use of multicast technology. For different applications, various standard organizations in the world have launched multicast technologies for IPv4, IPv6 and application layers respectively. Since the multicast technology can greatly reduce the number of data transmissions, it greatly facilitates the needs of group communication. [0003] Network security is particularly important in multicast communication. In multicast communication, o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06H04L12/18
Inventor 万长胜胡爱群
Owner SOUTHEAST UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More