Unlock instant, AI-driven research and patent intelligence for your innovation.

Key generation method and system and key distribution method and system based on group

A key generation and key distribution technology, which is applied in the direction of public key for secure communication, can solve problems such as large key update cost, failure to meet customer needs well, lack of pertinence, etc., to achieve encryption The effect of low key update cost and eliminating the risk of forward security and backward security

Inactive Publication Date: 2014-09-24
CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] One is that all users use the same key. The problem with this method is that when users encrypt files, no matter what type of file they use, the same key is used for encryption. This method is not targeted , can not meet the needs of customers very well
The revocation of the group key has a large key update cost with the dynamic changes of members, and there are risks of forward security and backward security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key generation method and system and key distribution method and system based on group
  • Key generation method and system and key distribution method and system based on group
  • Key generation method and system and key distribution method and system based on group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] This embodiment provides a group-based key generation method, such as figure 1 shown, including the following steps:

[0047] S11: Generate a public-private key pair, where the public-private key pair includes a public key and a private key.

[0048] S12: Configure a key pair ID for each public-private key pair.

[0049] S13: Export the public-private key pair, and store the public-private key pair after encrypting the public key.

[0050] In this embodiment, in the step S11, the encryption machine uses the RSA algorithm to generate a public-private key pair. In the step S13, an encryption machine is used to derive the public-private key pair, and the encryption machine encrypts the public key. The encryption machine is a domestically developed host encryption device that has been identified and approved by the national commercial cryptography authority. The encryption machine and the host use TCP / IP protocol communication, so the encryption machine has no special re...

Embodiment 2

[0054] This embodiment provides a group-based key generation system, such as figure 2 shown, including:

[0055] The key generation unit is used to generate a public-private key pair, and the public-private key pair includes a public key and a private key.

[0056] The ID configuration unit is configured to configure a key pair ID for each public-private key pair.

[0057] The key storage unit is used to derive the public-private key pair, and store the public-private key pair after encrypting the public key.

[0058] In the above scheme, when the group key (that is, the public-private key pair) is generated, the key pair ID is generated. This key pair ID is the unique identifier of each key pair. Through this key pair ID, you can easily find Different group keys, when the group members change or the group key changes, the corresponding public-private key pair can be quickly found and updated through the key pair ID, so that the group members can normally encrypt and decryp...

Embodiment 3

[0062] This embodiment provides a group-based key distribution method, such as image 3 shown, including the following steps:

[0063] S21: Receive the key request information sent by the client.

[0064] S22: Determine the intensive use authority of the user terminal.

[0065] S23: Decrypt the stored public-private key pair configured with the key pair ID, encrypt the public-private key pair with the user public key, and send the public-private key pair to the client.

[0066] In this embodiment, the client or SDK requests the group key with its own identity authentication public key; the group key is sent to the client or SDK according to the user's needs as the policy is issued, and the user needs to be authenticated in the process Identity, this process needs to judge the user's group key usage authority, then use the decryption machine to unlock the stored group key, and finally use the user's public key to encrypt the group key and distribute it to the user's local. S...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a key generation method and system and key distribution method and system based on a group. When group keys are generated, key pair IDs are generated, wherein each key pair ID is the unique identification of one key pair, and the different group keys can be conveniently found through the key pair IDs. When members in the group change or the group keys change, corresponding public and private key pairs can be quickly found through the key pair IDs to be updated, and therefore the members in the group can be normally encrypted and decrypted, and members not in the group can not be encrypted or decrypted. After key updating, new group keys can be used for encryption and decryption in time, but the old group keys can not be used any more. Due to the adoption of the scheme, the cost of key updating during the dynamic change of the members in the group is low, and threats to forward security and backward security can be eliminated.

Description

technical field [0001] The present invention relates to the encryption and decryption technology of the communication system, in particular to a group-based key generation method and system and a key distribution method and system. Background technique [0002] With the in-depth development of informatization, the demand for the sharing and application of information resources is increasingly strong, but there are a certain number of business systems that share and use information resources with weak information security capabilities and severe security risks. Information resources contain a large amount of private information such as home address, age, family member relationship, etc. If security issues such as information leakage and abuse occur, it will directly have adverse social impacts, and may even directly threaten social stability and national security. Therefore, it is necessary to strengthen the supporting role of cryptography in protecting basic information reso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30
Inventor 李欣吴昌明
Owner CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY