Generation and authentication method of self-certified public key of mobile self-organized network

A mobile self-organization, public key technology, applied in the field of network security, can solve the problems of key escrow, large amount of calculation, unrealizable, etc., and achieve the effect of avoiding key escrow, improving the amount of calculation and communication, and reducing storage.

Inactive Publication Date: 2010-05-05
XIDIAN UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the application of the self-authenticated public key system to the mobile ad hoc network still has the following problems: (1) There must be a central server in the network to generate the self-authenticated public key for the user; (2) A secure channel is required to transmit secret information; The self-authenticated public key system has a relatively large amount of calculation; (4) there is a key escrow
Among them, the first two problems are unrealizable in mobile ad hoc networks, and the latter two problems are also unreasonable for such resource-constrained networks, so they need to be avoided as much as possible.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] A, the applied mathematical theory of the present invention

[0033] (A1) Elliptic Curve Cryptosystem ECC

[0034] Let p and q be large prime numbers, GF(q) is a finite field of order q, E is an elliptic curve on GF(q), E(GF(q)) is a cyclic group of order p formed by points on E, P∈ E(GF(q)) is the generator. For the definition of elliptic curve and the selection of security parameters, please refer to the literature: Don Johnson, Alfred Menezes and Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), IJLS, vol.1 issue1 (2001), 36-63.

[0035] (A2) Hash function

[0036] The Hash function is a function that transforms an input message of arbitrary length into an output message of fixed length, and this output is called the Hash value of the message. A secure Hash function should at least meet the following conditions: ①The input length is arbitrary; ②The output length is fixed, at least 128 bits long, in order to resist birthday attacks; ③For each ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a management method of self-certified public key of a mobile self-organized network on the basis of ECC, comprising the following steps: a shared key is distributed to n virtual central nodes by threshold cryptology; a user chooses a secret random number to calculate a public parameter, and identity and the public parameter are sent to a nearby virtual central node A1; A1 contacts with other virtual central nodes and sends the user information to the nodes; each publisher Ai chooses a random secret integer and calculates as well as broadcasts a self-certified public key subblock Qi to other publishers according to the secret integers and parameters published by the user; each publisher Ai calculates a self-certified public key Q, a sub-signature xi and an intermediate quantity Ri and sends (r, I, xi and Ri) to a synthesizer; the synthesizer calculates and synthesizes a signature x after all sub-signatures are qualified after authentication and sends Q and x to the user; the user calculates a secret key s according to the x; and the authenticity of the self-certified public key of the user is verified. The invention has no certificate management, no key escrow and no secure channel, so that the invention is suitable for the safe communication of the mobile self-organization network with limited resource.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a self-authenticated public key, specifically, a method for generating and verifying a self-authenticated public key in a mobile ad hoc network, which can be used to provide security and trust system establishment in a mobile ad hoc network Basic technical support. Background technique [0002] In the public key cryptosystem, in order to ensure that the public key will not be replaced, there are generally three methods: certificate-based, identity-based and self-authentication. The certificate-based method is based on the public key infrastructure (PKI), and there are complex certificate management problems. The identity-based method directly uses the user's identity information as its public key, and there is no certificate storage and management problem, but its disadvantage is that it has key escrow, and the trusted center can know the secret key of all users. Another ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/04H04W84/18H04L9/32H04L9/30H04W12/0433H04W12/06
Inventor 吕锡香李晖张卫东
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products