Hypergraph-model-based multicast key management method

A technology of multicast key and management method, applied in the field of centralized key management scheme

Inactive Publication Date: 2014-05-07
UNIV OF SCI & TECH BEIJING
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Managing these keys is a challenging problem, especially when group members join and leave frequently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hypergraph-model-based multicast key management method
  • Hypergraph-model-based multicast key management method
  • Hypergraph-model-based multicast key management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Below in conjunction with example the present invention will be further described.

[0047] (1) Establishment phase

[0048] There is a trusted group control center GC responsible for group access control and key management, and the GC distributes keys for group members and maintains the relationship between member keys. First, the GC builds a key hypergraph. Members of the security group are GC, u 1 , u 2 , u 3 , u 4 , u 5 , u 6 , u 7 , u 8 , u 9 Corresponding to the vertices of the key hypergraph, the hyperedge E 1 (K 1 )={u 1 , u 2 , u 3 , u 4},E 2 (K 2 )={u 5 , u 6},E 3 (K 3 )={u 7 , u 8 , u 9} represents a set of group members, and these members share the subgroup key K 1 , K 2 , K 3 . Given a key hypergraph H, the set of hyperedges (secure subgroups) intersects in pairs at the vertex GC. GC randomly selects a key K 0 , as the master key of the security group, and securely distribute the master key to all members. Group members are au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of security related application of key management in an information security technology, in particular to a centralized key management method, which comprises (1) an establishment stage, (2) the addition of a member to key hypergraph updating and (3) the quitting of the member from the key hypergraph updating. When the member is added, three key updating messages are required by a hypergraph-based key management scheme and are given by formulae shown in the description. In the scheme, a hypergraph theory is utilized to effectively reduce a key storage space of a key server, the key storage space of the group member and server encryption overhead in the addition of the group member, ensure the forward security and backward security of a security group and achieve high extensibility.

Description

technical field [0001] The invention relates to the security-related application field of key management in information security technology, in particular to a centralized key management scheme. Background technique [0002] An effective multicast key management scheme is the basis of secure multicast. Multicast communication must ensure that legal members can receive multicast data, and at the same time ensure that illegal entities cannot receive multicast data. At the same time, multicast communication should provide security services such as authentication, integrity check and data confidentiality. These security mechanisms typically rely on encryption with one or more keys. Managing these keys is a challenging problem, especially when group members join and leave frequently. [0003] At present, researchers have proposed some multicast key management schemes, which are mainly divided into three categories: ①Centralized group key management protocols, such as literatur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 周贤伟丁颜程志密曾文璐
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products