Unlock instant, AI-driven research and patent intelligence for your innovation.

Fault tolerance key agreement method based on cell group design

A technology of key negotiation and block design, which is applied in the field of information security and can solve problems such as destruction, leaking, and limiting the practical application of key negotiation.

Inactive Publication Date: 2014-02-19
NANJING UNIV OF INFORMATION SCI & TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the fault-tolerance of key negotiation has received a certain degree of attention in recent years, how to achieve high-efficiency fault-tolerance, fast recovery, and ability to resist differential key attacks has not been studied in depth, which will seriously limit the security of encryption. Practical application of key negotiation, and may cause delay, destruction and leakage of high-level sessions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fault tolerance key agreement method based on cell group design
  • Fault tolerance key agreement method based on cell group design
  • Fault tolerance key agreement method based on cell group design

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions provided by the present invention will be described in detail below in conjunction with specific examples. It should be understood that the following specific embodiments are only used to illustrate the present invention and are not intended to limit the scope of the present invention.

[0051] The present invention applies the technology of block group design to the fault-tolerant key agreement method, and applies the technology of block group design to the fault-tolerant key agreement to balance the contribution of each participant to the final common key, and according to the symmetrical balance Structural features of incomplete block designs that perform error-tolerant and error-correcting operations. The application environment of the present invention includes a key generation center (KGC) and several users (ie participants), specifically, such as figure 1 shown, including the following steps:

[0052] 1. Initialization phase:

[0053] Af...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fault tolerance key agreement method based on cell group design. The cell group design technology is applied to key agreement. The double linear mapping and the encryption technique based on an identity are used, so that the key agreement method obtains efficient operation performance and efficient fault tolerance capability and can obtain good expansion performance in a dynamic environment. The method includes the step of constructing symmetrical balance incomplete cell groups and the step of two-round key agreement. By means of the design of the symmetrical balance incomplete cell groups, contributions to the shared key by each participant are balanced, no participants can force pre-selection or forecasting of the key and good safety is achieved. In addition, differential key attack is avoided and even if a vicious participant uses two kinds of different sub-keys, the vicious participant can still be identified and removed. After the vicious participant is removed, an available participant is used for replacing the cancelled vicious participant to rapidly carry out new key agreement and good expansibility is achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a fault-tolerant key negotiation method based on block design. Background technique [0002] With the continuous development of key agreement technology, the fault tolerance of the negotiation method has received more and more attention and research. In practical applications, with the increase of negotiation participants, some malicious participants will inevitably appear. It is possible for a malicious actor to delay or corrupt session key generation, thereby preventing session establishment. Most of the current key agreement methods are based on honest and credible participants. Once there are malicious participants, or some honest and credible participants become malicious participants due to capture attacks (physical attacks) Otherwise, the negotiation will fail, and the session will be delayed or interrupted, which will lead to serious consequences and huge l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 沈剑郑文英孙星明任勇军夏志华
Owner NANJING UNIV OF INFORMATION SCI & TECH