Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for negotiating group cipher

A group and key technology, applied in the field of communication, can solve problems such as increasing time delay, increasing system traffic, increasing algorithm complexity, etc., to achieve the effect of improving real-time performance and reducing communication traffic

Inactive Publication Date: 2009-04-01
HUAWEI TECH CO LTD +1
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0036] The disadvantages of the above scheme are: the algorithm of key agreement is generated by recursive calling, which increases the complexity of the algorithm; the number of communication rounds of key agreement increases with the number of participants, the above scheme not only increases the delay, It also increases the communication volume of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for negotiating group cipher
  • Method and device for negotiating group cipher
  • Method and device for negotiating group cipher

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] This embodiment provides a method for negotiating a group key. When the total number of users in the group is odd, see figure 2 , the method includes:

[0078] Step 201: The user generates a public value according to the secret index, and exchanges the public value with two adjacent users on the left and two adjacent users on the right;

[0079] Step 202: After receiving the public values ​​sent by four adjacent users, the user generates an intermediate value according to the secret index in the received intermediate message and its own secret index, and broadcasts the intermediate message carrying the intermediate value;

[0080] Step 203: After receiving the intermediate message from other users, the user verifies whether the intermediate value in the received intermediate message is correct. After the verification is passed, generates a session key according to the intermediate value of other users and its own intermediate value, and uses the session key key as the...

Embodiment 2

[0135] see Figure 7 , this embodiment provides a device for negotiating a group key, including:

[0136] The information interaction module 701 is configured to generate a public value according to the secret index, exchange public values ​​with two neighboring devices on the left and two neighboring devices on the right, and perform information interaction with other devices;

[0137] The intermediate value generation module 702 is used to extract the secret index in the public value received by the information interaction module 701, generate an intermediate value according to the secret index in the public value and the secret index of the device itself, and notify the information interaction module 701 to broadcast the intermediate value the intermediate message;

[0138] The group key generation module 703 is used to verify the intermediate value in the intermediate message received by the information interaction module 701. After the verification is passed, generate a ...

Embodiment 3

[0140] see Figure 8 , this embodiment provides a device for negotiating a group key, including:

[0141] The information interaction module 801 is configured to generate a public value according to the secret index, exchange public values ​​with two neighboring devices on the left and two neighboring devices on the right, and perform information interaction with other devices;

[0142] The intermediate value generation module 802 is used to extract the secret index in the public value received by the information interaction module 801, generate an intermediate value according to the secret index in the public value and the secret index of the device itself, and broadcast the intermediate value through the information interaction module 801 the intermediate message;

[0143] The session key generation module 803 is used to verify the intermediate value in the intermediate message received by the information interaction module 801. After the verification is passed, generate a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for negotiating group keys and equipment thereof, which belongs to the communication field. In the method, each subscriber in the group generates the same group keys by information interaction with other subscribers based on bilinear pairings mapping of elliptical curve by the method of selecting negotiating group keys according to the parity of total number of subscribers in the group. The equipment can be three types, wherein, one equipment comprises an information interaction module, an intermediate value generating module and a group key generating module; another equipment comprises an information interaction module, an intermediate value generating module, a conversation key generating module, a new intermediate value generating module and a group key generating module; and the third equipment comprises an information interaction module, an intermediate value generating module, a conversation key decoding module and an intermediate value encrypting module. The method and the equipment have small number of communication rounds during the process of key negotiation, thereby improving the immediacy of communication. Furthermore, the rounds number of key negotiation is independent of the number of members, so that the communication volume of the key negotiation is reduced.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for negotiating a group key. Background technique [0002] Ad Hoc network is a network with multi-hop, self-organization and dynamic topology changes. Nodes move frequently, power reserve is limited, and the trust relationship between nodes and wireless transmission links are relatively fragile. These characteristics make the Ad Hoc network The design of the group key agreement protocol is quite different from traditional schemes. In an Ad Hoc network, in order to ensure communication security, it is usually necessary to encrypt messages before transmission. Since the symmetric cryptosystem has advantages in efficiency, the use of group shared keys can greatly reduce the complexity of message processing. . At the same time, the Ad Hoc network is also a dynamic peer-to-peer group, which lacks a fixed trusted third-party support. Therefore, the group session key used...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06H04L12/28
CPCH04L9/0833H04L9/3073
Inventor 马春波李建华吴越刘亚
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products