Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network multicast information encryption method against conspiracy attack

A technology of collusion attack and information encryption, which is applied in wireless communication, secure communication devices, broadcast service distribution, etc., can solve the problems of complex calculation and huge communication volume, and achieve reduction of calculation, calculation energy consumption and communication energy consumption Effect

Inactive Publication Date: 2012-10-24
盐城市鹤业实业投资有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, many attribute-based encryption schemes have been applied to multicast broadcast encryption, but their schemes cannot be applied to low-energy environments (such as wireless sensor networks) due to the complexity of calculation and the large amount of communication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network multicast information encryption method against conspiracy attack
  • Network multicast information encryption method against conspiracy attack
  • Network multicast information encryption method against conspiracy attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] (1) Parameter establishment stage

[0017] Choose an elliptic curve group G 0 , to build a bilinear map ê: G 0 ×G 0 →G 1 , g is G 0 Generator on , p is G 0 any point. We secretly choose a q∈Z as the secret factor, and the key MK is g q . For each attribute i, there are three public keys PK i 、PK i’ and PK i” , where PK i Represents possession of attribute i, PK i’ Represents no attribute i, and PK i” Represents dispensable for attribute i. PK i =(PK i1 =g ti , PK i2 =ê(g,g) qti ), PK i’ =(PK i’1 =g ti ’, PK i’2 =ê(g,g) qti '), PK i” =(PK i”1 =g ti ", PK i”2 =ê(g,g) qti ")(t i is the hash function H(i)) on attribute i. The public key PK of the whole system is (G 0 , G 1 ,g,p,ê(g,g) q , PK i , PK i’ , PK i” ).

[0018] (2) Key extraction stage

[0019]For each node u, its public key PK u for g u , which is a public value. If encryption is required, it can be broadcast across the network for use by other nodes. The private key of no...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network multicast information encryption method against conspiracy attack, which keeps ciphertext length unchanged, shortens the cost for node encryption and decryption and has application prospect without changing the security. The security of an encryption scheme of the invention is based on the complicacy of calculating elliptic curve bilinear map in mathematics, andthe key to reduce the computational energy consumption of a system is to reduce the bilinear map operation number. The bilinear operation can be completed in advance through a pre-treatment method and released in the form of a public key, the encryption and decryption process only involves a small amount of bilinear operation. Assuming the bilinear map is that: e: G0 *G0 -> G1, wherein g is an element generated on a G0 group, the order of the group is q, the public key with the attribute of i is as follows: PKi=(PKil,PKi2), wherein PKil=gti, PKi2=e (g,g)q.ti,ti=H(i), and H(i) is the Hash function value to i. When in encryption and decryption, the scheme of the invention only needs to carry out simple multiply operation.

Description

technical field [0001] The invention relates to encryption of multicast information in a low energy consumption environment for information network, especially wireless sensor network key management, and belongs to the technical field of computer and information security. Background technique [0002] Wireless sensor network is a hot research topic nowadays, because of its own characteristics, it is extremely difficult to implement multicast broadcast encryption in wireless sensor network. Due to the small size and non-renewable nature of wireless sensor nodes, the battery energy they carry is very limited, and the multicast broadcast encryption with high energy consumption is not suitable. And because it is arranged in dangerous areas such as the wild, it is often easily destroyed and captured, and some simple symmetric encryption cannot guarantee the security of wireless sensor networks. [0003] Encrypted energy consumption in wireless sensor networks is divided into thr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/28H04W4/06H04W12/02H04W12/04H04W12/03H04W12/122
Inventor 杨庚唐强李大伟曹晓梅祁正华陈燕俐
Owner 盐城市鹤业实业投资有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products