Group key managing method based on Chinese remainder theorem

A Chinese remainder theorem and group key technology, applied in the field of communication network security, can solve the problems of low security, insufficient security of secret channels, and high delay in key update, so as to improve security and shorten update time. Delay time, effect of security assurance

Inactive Publication Date: 2012-10-24
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In practical applications, the security of covert channels is not fully guaranteed, so these methods are less secure
Moreover, when the group key is updated in this method, the transmission of related data must depend on the successful transmission of previous data, so the key update delay is high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group key managing method based on Chinese remainder theorem
  • Group key managing method based on Chinese remainder theorem
  • Group key managing method based on Chinese remainder theorem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] One, the symbol and mathematical theory explanation that the present invention applies

[0029] 1. Explanation of relevant symbols

[0030] General group key manager GKS: responsible for the generation, distribution and update of subgroup keys of SKS subgroups, and the generation, distribution and update of group keys of the entire group;

[0031] Subgroup key manager SKS for group i i : responsible for the generation, distribution and update of subgroup keys of group i, as well as the distribution and update of group keys;

[0032] GM: group member;

[0033] K: group key shared by group members;

[0034] k i : The subgroup key of the i-th group, only the members of the i-th group hold it;

[0035] N: the number of group members;

[0036] n: the number of subgroup members;

[0037] m xy : the number of secrets held by the yth member of the xth group;

[0038] {P}:m xy The generative library of , that is, a library containing an infinite number of non-repeating...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a group key managing method based on Chinese remainder theorem. The method comprises the steps of: dividing a group into a plurality of subgroups, managing member subgroups by a subgroup key manager, managing SKS subgroups by a total group key manager; providing the member information for the subgroup key manager by the group members; allocating the subgroup keys to the member subgroups by the subgroup key manager, and allocating the subgroup keys of the SKS subgroups by the total key manager; after the subgroup keys are allocated, allocating the group keys by the total group key manager and the subgroup key manager; carrying out precalculation on the public data in the updating interval by the subgroup key manager, and updating the subgroup keys by the subgroup key manager after the group members are changed; after the subgroup keys are completely updated, updating the group keys by the subgroup key manager; in the whole process of the group communication, continuously updating the subgroup keys in a updating mode by the SKS subgroup based on time. The invention has the advantages of high safety, low updating cost and little updating delay, and can be usedfor large-scale group communication system.

Description

technical field [0001] The invention belongs to the technical field of communication network security, in particular to a group key management method. Members in the group share a group key, and use the group key to encrypt communication messages when communicating, so that communication messages are transmitted in the form of ciphertext in public channels, thereby achieving the confidentiality of communication information. Background technique [0002] Multicast technology is more and more widely used in the network, and group communication based on multicast is widely used in remote video conferencing, billing TV and online games, etc. Due to the increasingly serious security threats on the Internet and the security problems exposed by multicast group communication itself, multicast applications must consider ensuring the security of group communication. The basic approach to securing communication among group members is for group members to share a group key that is not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30
Inventor 李晖付晓红吕锡香王博洋
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products