Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous routing method on basis of bilinear pairings

A bilinear pairing and routing technology, applied in the field of network communication, can solve the problem of large amount of public key operation, and achieve the effect of reducing the amount of operation, short key and less amount of operation

Inactive Publication Date: 2013-05-01
WUXI NANLIGONG TECH DEV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide an anonymous routing method based on bilinear pairing for the problem of large amount of public key calculation in the existing anonymous routing protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous routing method on basis of bilinear pairings
  • Anonymous routing method on basis of bilinear pairings
  • Anonymous routing method on basis of bilinear pairings

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The specific implementation manners of the present invention will be described in detail below with reference to the accompanying drawings.

[0022] The present invention first proposes an anonymous key agreement protocol based on bilinear pairing: for the reason P The resulting cyclic addition group has order q , are of the same order q The cyclic multiplicative group of , For a bilinear map, the private key generator (PKG) randomly selects a master key , calculate the public key , and choose a secure hash function and a key derivation function g, PKG public system parameters { , ,q, ,P, , , g}.

[0023] For any user A, whose identity is , PKG calculates its private key And send this private key to A securely, is the public key of A, and . For another user V, its public-private key pair is . V and A negotiate a session key without revealing the identities of V and A. The process is as follows:

[0024] Step 1: V chooses a random numbe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous routing method on the basis of bilinear pairings and belongs to the technical field of network communication. The routing method comprises three stages: a routing request stage, a routing response stage and a data transmission stage. The routing method has the advantages: the bilinear pairings are applied to an establishing process for the anonymous routing, so that the public key operand is greatly reduced under the condition of ensuring the anonymity and safety, and the problems that the present anonymous routing protocol contains a large amount of public key operand and great energy consumption and the routing establishing is delayed are solved.

Description

technical field [0001] The invention belongs to the technical field of network communication, and in particular relates to an anonymous routing method based on bilinear pairing. Background technique [0002] The Ad Hoc network originated from the US military's packet wireless network PRNet (Packet Radio Network), which is a multi-hop temporary autonomous system composed of a group of mobile terminals with wireless transceivers. Ad Hoc network nodes can move at will, the status of nodes is equal, the network topology changes dynamically, no infrastructure is required, rapid deployment, no control center is required, and it has strong invulnerability. In order to keep the communication parties from being exposed, a variety of anonymous routing protocols have been proposed, such as SDAR, ANODR, MASK and AnonDSR, but they introduce a large number of public key operations, which consume a lot of energy and increase the time for routing establishment. In order to reduce the energ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04W12/04H04W40/24H04W12/041
CPCY02B60/50Y02D30/70
Inventor 李千目刘振徐阳侯君
Owner WUXI NANLIGONG TECH DEV