An Identity-Based Lagrangian Interpolation Key Management Method
A key management and identity technology, which is applied in the identity authentication protocol between nodes and the field of key management protocol using Lagrangian interpolation, can solve the problems of short lifespan and high computing cost, and achieve reduced computing cost and high efficiency Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0037] In this embodiment, the Init algorithm is designed and completed. The purpose of the Init algorithm is: the base station makes the ID I have (sk I , para)ID R have (sk R , para). Including but not limited to the following steps (expressed in a table):
[0038]
[0039] The protocol flow of this embodiment is as follows figure 2 shown.
[0040] The steps in Embodiment 1 are described as follows:
[0041](1) Step 100: The base station generates a group G with a generator g, and takes a prime number q.
[0042] (2) Step 102: The base station generates two random secret numbers a and b, and a, b∈Z q (Z q is the integer addition group of modulo q), and obtains the Lagrange interpolation polynomial L(x)=a+bxmodq, x∈R (R represents a real number, and this formula is a prototype, and the following steps 106 and 108 introduce specific parameters).
[0043] (3) Step 104: the base station calculates the corresponding public key. pk 1 =g a , pk 2 =g b ∈G. and pu...
Embodiment 2
[0047] In this embodiment, the KeyGen algorithm is designed and completed. The purpose of this stage is: to realize the generation of shared key k I and the corresponding ciphertext c. Including but not limited to the following steps (expressed in a table):
[0048]
[0049] The protocol flow of this embodiment is as follows image 3 shown.
[0050] The steps and the protocol flowchart in Embodiment 2 are described as follows:
[0051] (1) Step 110: ID I Randomly generate a secret number r∈Z q , and calculate c 1 =g r ∈G,c 2 = pk 1 r ∈G,c 3 = c 1 skI ∈G, so that the corresponding ciphertext c=(c 1, c 2, c 3 ).
[0052] (2) Step 112: Calculate the shared key
Embodiment 3
[0054] In this embodiment, the RVerify algorithm is designed and completed. The purpose of this stage is to realize whether the verification has been tampered with by the attacker. Including but not limited to the following steps (expressed in a table):
[0055] steps
content
114
The receiver verifies that the received data has not been tampered with.
[0056] The protocol flow of this embodiment is as follows Figure 4 shown.
[0057] The steps in Embodiment 3 and the protocol flow chart are described as follows:
[0058] (1) Step 114: ID R verify
[0059] c 2 Is it equal to (here means c 3 power of exponent and c 1 multiplied to the power of the exponent).
[0060] if equal id R Return True otherwise return False. The reason for the existence of the above equation is that
[0061]
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


