Communication method, device and system based on combined public key cryptography system

A technology of combining public key and communication method, applied in the field of communication method, device and system based on combined public key cryptosystem, can solve the problems of reducing authentication efficiency, large number of interactions between client and server, etc.

Inactive Publication Date: 2014-05-28
HUAWEI TECH CO LTD
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, using the TLS handshake protocol provided by the existing technology for interaction, due to the large number of interactions between the client and the server during the handshake process, and the need to verify the certificate online and calculate the shared key, thereby reducing the authentication efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method, device and system based on combined public key cryptography system
  • Communication method, device and system based on combined public key cryptography system
  • Communication method, device and system based on combined public key cryptography system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0160] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0161] The combined public key cryptography (Combined Public Key, referred to as: CPK) system is an identity-based cryptographic system. The system includes a key generation center that generates the master key of the entire system and the user's private key. The public key of the user in the system The key is its identity. The key generation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a communication method, device and system based on a combined public key cryptography system. The method includes the steps of obtaining a private key of a first node from a secret key generating center through the first node, obtaining identification of a second node according to an adjacent node identification list, calculating a public key of the second node according to the identification of the second node, calculating a shared secret key parameter of the first node according to the secret key of the first node and the public key of the second node, then, calculating a shared secret key of the first node according to the shared secret key parameter of the first node, generating a first secret key verification code corresponding to the shared secret key of the first node, sending shared secret key verification information with the first secret key verification code to the second node, and receiving shared secret key response information from the second node. The calculation steps can be completed offline, the number of times of interaction between the nodes is lowered, and therefore when the first node starts verification, verification can be completed in a quite short period of time, and verification efficiency is improved.

Description

technical field [0001] The present invention relates to communication technology, in particular to a communication method, device and system based on combined public key cryptosystem. Background technique [0002] In the communication technology, in order to realize the confidentiality and integrity of the communication between two communication entities, the prior art proposes a transport layer security (Transport Layer Security, TLS for short) protocol. Specifically, the TLS protocol stack is divided into two layers, the bottom layer is the TLS record protocol, and the upper layer includes the TLS handshake protocol, the TLS password change protocol, and the TLS warning protocol. The TLS record protocol is built on top of TCP, and the connection security it provides has two characteristics: first, confidentiality, using a symmetric encryption algorithm; second, integrity, using a hash-based message authentication code (Hash-based Message Authentication Code) , referred to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08
CPCH04L9/3242H04L9/0841
Inventor 刘新保
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products