Method and nodes for controlling network security
A network security, node technology, applied in the field of information security, can solve the problem of CA's private key security and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] In the embodiment of the present invention, the network adopts a fully distributed authentication method, wherein, in the network, each node is peer-to-peer, and can freely exit or join the network. In the fully distributed authentication method, the CA master key The public key PK in CA Inform all nodes in the network that the private key SK in the CA master key CA Through the Shamir polynomial threshold encryption scheme, each node can obtain SK CA A part of the key, that is, each node has the same key as SK CA A corresponding first subkey, and each node generates a public-private key pair pk for itself i / sk i . Each node has a node certificate generated by CA, and each node has a copy of all other node certificates in the network.
[0021] Among them, the Shamir polynomial threshold encryption scheme is as follows:
[0022] There are n nodes in the network, the threshold value of the Shamir polynomial threshold encryption scheme is the first threshold t, and a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 