Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Homomorphic key generating-sharing method and device

A key generation and homomorphic technology, applied in secure communication devices and key distribution, can solve the problems of key leakage, inability to monitor keys, and inability to control the number or time of reading by the shared person, to prevent ciphertext leakage, The effect of sharing safe and efficient, safe and efficient ciphertext sharing

Active Publication Date: 2016-04-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) In the traditional key splitting technology, the key management center must obtain the complete key and then split it. Improper operations by the operator of the key management center may easily lead to key leakage
[0004] (2) The traditional key sharing technology transmits the key through public key encryption, and lacks an effective third party to monitor the key transfer
With the traditional key sharing technology, users can obtain the encryption key of their own files and distribute it arbitrarily, and the key management center cannot effectively monitor the circulation of the key
[0005] (3) The traditional key sharing technology transmits the key through public key encryption, and the sharer cannot control the reading times or time of the shared person
[0006] (4) The traditional key sharing technology transmits the key through public key encryption, and the sharer cannot cancel the reading right of the sharer
As mentioned in (3), after the shared user stores the key locally, the sharer cannot cancel the read right of the shared user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Homomorphic key generating-sharing method and device
  • Homomorphic key generating-sharing method and device
  • Homomorphic key generating-sharing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0056] Implementation Mode 1: The homomorphic key generation process is as follows:

[0057] Step 1: User U multiplies his master key mk with the file name, and then obtains a string z through a hash function, uses his own homomorphic key to synthesize public key pk to encrypt z, and generates Epk(z), And send its corresponding file name to the key management center KM;

[0058] Step 2: The key management center KM gets the Epk(z) sent by the user, selects a random number lk, encrypts it with the user's public key to generate Epk(lk), calculates Epk(z)*Epk(lk), and sends it to the user , simultaneously storing said lk and the file name described in step 1 correspondingly;

[0059] Step 3: The user U obtains the file encryption key key=z*lk by decrypting the homomorphic synthetic private key sk, and then the user encrypts the file with the encryption key to obtain the encrypted ciphertext;

[0060] Further, the encrypted ciphertext is stored locally by the user or the user se...

Embodiment approach 2

[0062] Embodiment 2: The key sharing process specifically includes:

[0063] This protocol mainly realizes the safe sharing of keys among different users and the control and monitoring of keys by the key management center. Before key sharing, a key must be generated through a key generation protocol, and then it can be shared with other users. Suppose user U wants to share his file f with user U1.

[0064] Protocol description:

[0065] Step 1: User U multiplies his master key mk with the file name, and then obtains the string z through the hash function. User U encrypts z with the homomorphic synthesis public key pk1 of other user U1, and generates Epk1(z ), and send Epk1(z) and the corresponding file name to the key management center, and notify the key management center to share the file with other users U1;

[0066] Step 2: The key management center KM obtains the Epk1(z) sent by the user U and the corresponding file name, and queries the corresponding lk according to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a key generating method, in particular to a homomorphic key generating-sharing method and a homomorphic key generating-sharing device. The invention aims at the problems in prior art and provides the homomorphic key generating-sharing method and the homomorphic key generating-sharing device. Through generating and sharing homomorphic keys, the key exposure due to artificial operation or hacker attack in a key management center is effectively prevented. According to the homomorphic key generating-sharing method and the homomorphic key generating-sharing device disclosed by the invention, a user carries out encryption on z via a user public key pk to generate Epk (z), and sends the Epk (z) and the corresponding shared file name to the key management center; the key management center chooses a random number 1k, encrypts with the user public key pk to generate Epk (1k), calculates Epk (z)*Epk (1k), and sends the Epk (z)*Epk (1k) to the user; and the user decrypts the Epk (z)*Epk (1k) with a user secret key sk to obtain a file encryption key key=z*1k, and then the user encrypts a file with the encryption key to obtain an encrypted ciphertext.

Description

technical field [0001] The invention relates to a method for generating a key, in particular to a method and device for generating and sharing a homomorphic key. Background technique [0002] At present, the traditional key management technology is relatively mature, and its technical status is as follows: [0003] (1) In the traditional key splitting technology, the key management center must obtain the complete key and then split it. Improper operation by the operator of the key management center may easily lead to key leakage. [0004] (2) The traditional key sharing technology transmits the key through public key encryption, and lacks an effective third party to monitor the key transfer. With the traditional key sharing technology, users can obtain the encryption key of their own files and distribute it arbitrarily, and the key management center cannot effectively monitor the circulation of the key. [0005] (3) The traditional key sharing technology transmits the key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0861
Inventor 白健安红章汤殿华任飞何远杭
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products