Flexible asymmetric group key negotiation method

A group key agreement and group key technology, which is applied in the field of elastic asymmetric group key agreement, can solve the problem that there is no precedent for selective information exchange technology work

Active Publication Date: 2016-10-12
河南招源科技有限公司
View PDF7 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A series of challenging problems need to be solved, including the combined calculation of group dynamic key factor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flexible asymmetric group key negotiation method
  • Flexible asymmetric group key negotiation method
  • Flexible asymmetric group key negotiation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] Group communication members in a complex network environment are often distributed in different security domains and different access rights. In the process of group information exchange, different information has different degrees of confidentiality, and often only specific group members are required to share it. A method of flexible asymmetric group key agreement agreement, such as figure 1 As shown, the steps are as follows: ①The members participating in the group key agreement first initialize the parameters, and then respectively generate their own public / private key pairs; ②Blind their respective group contributions through their respective public / private key pairs Key shares and broadcast these group key shares; ③After the remaining members receive the corresponding broadcast key shares, they will combine and calculate these key shares to obtain the group key; ④The group members calculated by self-verification Whether the group key is correct; ⑤If the calculation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a flexible asymmetric group key negotiation method. The method comprises the steps of carrying out parameter initialization by members participating in group key negotiation, thereby generating public/private key pairs; blinding group contribution key shares through the public/private key pairs, and broadcasting group key shares; after the rest members receive corresponding broadcasting key shares, carrying out combination calculation, thereby obtaining group keys; and verifying whether calculated group keys are correct or not by the group members, encrypting communication information through the group keys if the calculated group keys are correct, and exchanging group security information. According to the method, members in or out of a group can select any one subset object in the group for secret information exchange; an object not selected by an information sender cannot decrypt the shared information; the group members can negotiate an encryption key and a decryption key which are consistent; the group members can verify the correctness of the keys; anonymity of the members participating in group key negotiation can be realized; and the personal private information of the group members can be protected.

Description

Technical field [0001] The invention belongs to the technical field of information security and cryptography, and relates to the key technology of secret information exchange and transmission between group members: a group key agreement method, and particularly relates to a group in a multi-level, three-dimensional information environment A method of flexible asymmetric group key agreement for information exchange and secure transmission. Background technique [0002] Group key agreement is to ensure the security of communication by group members to jointly calculate the group encryption and decryption keys required for communication between groups. It is to ensure that group members distributed in different areas conduct secure collaborative computing through public networks. , Resource sharing, information exchange and other key technologies. With the rapid development of information technology, the network environment of information services is becoming more and more complex,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0833H04L9/0838H04L63/0442H04L63/065
Inventor 张启坤黄艳袁俊岭王锐芳王丽娜
Owner 河南招源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products