Group key management method base spherical surface in N dimension

A technology of group key and management method, which is applied in the field of group key management and can solve problems such as increased overhead

Inactive Publication Date: 2009-07-22
SOUTH CHINA UNIV OF TECH
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But when multiple users change at the same time, its overhead will increase greatly with the number of users changing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group key management method base spherical surface in N dimension
  • Group key management method base spherical surface in N dimension
  • Group key management method base spherical surface in N dimension

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0098] A typical secure group communication system architecture is as follows: figure 1 As shown, the system includes a group manager (GroupControl, GC) and four group users U1, U2, U3 and U4. The Group Manager (GC), each user is connected through the Internet.

[0099] Such as figure 2 As shown in , after initialization, the group manager (GC) sets relevant parameters, wherein the parameters in the solid line box are kept secret, and the dotted line box are public parameters. The two-dimensional point A in the figure -1 and A 0 is kept secret, the binary hash function h(·,·) and the large prime number p are public, and the entire process of the embodiment is carried out under the finite field GF(p).

[0100] Such as image 3 As shown, U1 and U2 have formed a group, and now the group is ready to accept U3 to join.

[0101] Among them, U1 is the first user, its joining process: After the group manager (GC) authenticates U1 user, the group manager distributes ID=1 to U1 u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cluster cryptographic key management method based on N-dimensional spherical surface, after initializing, when a new user enters, the cluster manager receives the user and edits a number for the new user, when the user exits, the cluster manager deletes secret information of the exiting user, if the user enters and exits simultaneously, the secret information of the exiting user can be deleted, the new user is received, the cluster manager receives the user and edits a number for the new user, and the secret information of the new user can be received simultaneously, the, the cluster manager selects mapping parameters and maps each user in the cluster and secret information per se into points in the space respectively; the center of the spherical surface composed of points is solved, and the center and the mapping parameters are disclosed, the editing number of the exiting user also can be disclosed; the user in the cluster can solve the corresponding space point based on the editing number per se further to solve the cluster cryptographic key. The invention can effectively reduce the user storage information, the calculation amount, the information quantity when the cryptographic key is updated, and can keep independence with each other between cryptographic keys.

Description

technical field [0001] The invention relates to a group key management method in network security, in particular to a group key management method based on an N-dimensional sphere. Background technique [0002] With the continuous development of the Internet and the popularization of multicast technology applications, group-oriented applications, such as video conferencing, online games, and video-on-demand, are playing an increasingly important role. How to ensure the communication security of these applications is becoming more and more important. Generally speaking, a secure group communication system should not only provide data confidentiality, user authentication, and message integrity, but also have good scalability; and all of this is inseparable from a secure, efficient and Robust group key management system. [0003] The current research results of the group key management system mainly include: GKMP, SL, GDH and its improvements, LKH and its improvements: (assumi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0833
Inventor 杨智敏唐韶华卢伯荣
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products