Scatter method and system for single asymmetrical secret key pair, single-stage asymmetrical secret key pair and multistage asymmetrical secret key pair

A key pair, decentralized technology, applied in key distribution, can solve the problem that asymmetric keys cannot be dispersed

Active Publication Date: 2015-12-16
BEIJING JN TASS TECH
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The traditional key distribution system only supports the symmetric key system, that is, only the symmetric key can be distributed, and the asymmetric key used in the public key cryptosystem cannot be distributed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Scatter method and system for single asymmetrical secret key pair, single-stage asymmetrical secret key pair and multistage asymmetrical secret key pair
  • Scatter method and system for single asymmetrical secret key pair, single-stage asymmetrical secret key pair and multistage asymmetrical secret key pair
  • Scatter method and system for single asymmetrical secret key pair, single-stage asymmetrical secret key pair and multistage asymmetrical secret key pair

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0092] Such as figure 1 As shown, it is a single key pair dispersion method described in a specific embodiment of the present invention, which specifically includes the following steps:

[0093] Step a1: Take the parent key FK as the key, hash factor ZF=0, and perform the dispersal function S() operation on the known dispersal factor SF to obtain the child key SK. The calculation process is as follows:

[0094] SK=S(FK, SF) formula (1)

[0095] Key distribution algorithms include but are not limited to the following functions:

[0096] a1.1 encrypt the dispersion factor;

[0097] a1.2 Decipher the dispersion factor;

[0098] a1.3 Perform hash operations on the dispersion factors;

[0099] a1.4 Compound operatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a scatter method and system for a single asymmetrical secret key pair, a single-stage asymmetrical secret key pair and a multistage asymmetrical secret key pair. The method has flexibility and a superior and subordinate relation the same as those of a symmetric key method. All subordinate (including the subordinate of the subordinate and until the most subordinate) secret key pairs of any key pair can be computed as required. Since a scatter algorithm and superior and subordinate relation are predetermined, just an exclusive private key and a Hash factor are required to be kept. The invention provides an asymmetrical secret key scatter method used in an ECC public key cryptography system. The asymmetrical secret key scatter method is mainly characterized in that a scatter secret key pair can be computed just by a main secret key pair MK (d,P) and a scatter factor; the method can be used for secret key scatter of an elliptic curve cryptography (ECC) algorithm and a secret key pair SK(d, P) is acquired after the scatter is performed; the method can be used for a domestic cryptographic algorithm SM2; multistage secret key scatter is supported; the storage amount of secret key pairs can be greatly reduced and secret key pair storage and management difficulty can be greatly reduced when the method is used on occasions with a large asymmetrical secret key data size.

Description

technical field [0001] The invention relates to a method for dispersing single, single-level and multi-level key pairs and a system thereof, belonging to the field of information security. Background technique [0002] The key is the key data in the cryptographic algorithm. In the symmetric key system, for the convenience of use, storage and management, it is usually necessary to use a decentralized algorithm to generate the key actually used. The main method of the key distribution algorithm includes the master key (MK) and the distribution factor (SF), use the master key to perform a specific cryptographic operation S() on the distribution factor, and assemble the distribution key SK according to the needs, namely: SK=S(MK,SF). [0003] In the occasions where many keys are required to be used, a distributed method is usually used to generate many distributed keys SK1, SK2, ..., SKn, where the distribution factor can be predicted, such as a string of numbers (employee numb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30
Inventor 闫鸣生陈虎李国张钊
Owner BEIJING JN TASS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products