A method and device for key distribution and reconstruction based on mobile Internet

A key distribution, mobile Internet technology, applied in key distribution, can solve problems such as implementation in the Internet environment

Inactive Publication Date: 2021-06-22
HENAN NORMAL UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In response to the above problems, this patent has carried out theoretical and methodological research in the following aspects: combining game theory, information theory, and cryptographic algorithms, on the basis of mobile Internet communication networks, it aims at anti-collusion methods for rational key sharing protocols, network communication methods, and key encapsulation mechanisms To study and improve key theories such as ciphers, design a computable anti-collusion equilibrium method, construct an anti-collusion game model of the protocol, and prevent participants from colluding to attack; construct a communication game model of a cryptographic protocol, and make up for the fact that the cryptographic protocol constructed under the broadcast communication network cannot be used in mobile networks. Due to the defects in the implementation of the Internet environment, the present invention provides a method and device for key distribution and reconstruction based on the mobile Internet, researches the key encapsulation mechanism suitable for verifiable random functions, and designs rational keys that do not require public key infrastructure Share the protocol to ensure the fairness and delivery of computing in the mobile Internet environment; finally, use the provable security theory to analyze and prove the security of the protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for key distribution and reconstruction based on mobile Internet
  • A method and device for key distribution and reconstruction based on mobile Internet
  • A method and device for key distribution and reconstruction based on mobile Internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The principle of the present invention is as follows,

[0091]With the increasing proportion of the application of mobile Internet and cryptographic protocols in national production and life, the research of this program will greatly improve the security and usability of mobile Internet, which can be used to solve the problem of encryption in the mobile Internet environment. It provides a new solution to the key sharing problem, provides a theoretical basis and technical basis for enriching and improving rational cryptographic protocols, and has a far-reaching impact on national economic and social development. The network topology of the rational key sharing scheme in the mobile Internet environment is as follows: figure 1 shown.

[0092] This patent first studies the identity-based key encapsulation mechanism suitable for verifiable random functions, and designs a rational key sharing protocol that does not require public key infrastructure, so that the technical sol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a key distribution and reconstruction method based on the mobile Internet, which includes the following steps: S1, constructing an identity-based key encapsulation model and a verifiable random function; S2, distributing the key; S3, The key is reconstructed. Design a computable anti-collusion equilibrium method, construct an anti-collusion entropy game model of the protocol, and prevent participants from colluding to attack; construct a communication game model of a cryptographic protocol, and make up for the defect that the cryptographic protocol constructed under the broadcast communication network cannot be implemented in the mobile Internet environment ; study the key encapsulation mechanism suitable for verifiable random functions, design a rational key sharing protocol without public key infrastructure, and ensure the fairness and delivery of computing in the mobile Internet environment; finally, use the provable security theory to analyze the protocol Conduct security analysis and proof.

Description

technical field [0001] The present invention relates to the technical field of mobile Internet security, in particular to a method and device for key distribution and reconstruction based on mobile Internet Background technique [0002] Key sharing is an important research content in the field of network security, and it is also the cornerstone of many security protocols. In classical key sharing protocols, it is assumed that some participants are honest and others are malicious. The honest person always abides by the agreement, and the malicious person can deviate from the agreement at will. In reality, it is very dangerous to base the security of a protocol on assuming and relying on someone to be honest. Common sense tells us that even people who are considered honest by ordinary people will cheat, and even conspire with others to cheat. There are two types of classic key sharing algorithms, under certain conditions, one is a scheme involving trusted parties. The othe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04W12/0431
CPCH04W12/04
Inventor 张恩刘亚鹏孙林王英杰朱文焌代丽萍张淑堃彭杰
Owner HENAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products