A Method for Resilient Asymmetric Group Key Agreement

A group key negotiation and group key technology, applied in the field of elastic asymmetric group key negotiation, can solve the problem that there is no precedent for selective information exchange technology work.

Active Publication Date: 2019-03-08
河南招源科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A series of challenging problems need to be solved, including the combined calculation of group dynamic key factors, the calculation of group dynamic encryption and decryption keys, and selective information exchange technology.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Resilient Asymmetric Group Key Agreement
  • A Method for Resilient Asymmetric Group Key Agreement
  • A Method for Resilient Asymmetric Group Key Agreement

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0061] In a complex network environment, group communication members are often distributed in different security domains and have different access rights. In the process of group information exchange, the degree of confidentiality of different information is different, and often only specific group members are required to share. A method for a resilient asymmetric group key agreement protocol, such as figure 1 As shown, the steps are as follows: ①The members participating in the group key negotiation first initialize the parameters, and then generate their own public / private key pairs; ②Blind their respective group contributions through their respective public / private key pairs key shares, and broadcast these group key shares; ③After receiving the corresponding broadcast key shares, the remaining members combine and calculate these key shares to obtain the group key; ④The group members self-certify the calculated group key shares Whether the group key is correct; ⑤If the grou...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a flexible asymmetric group key negotiation method. The method comprises the steps of carrying out parameter initialization by members participating in group key negotiation, thereby generating public / private key pairs; blinding group contribution key shares through the public / private key pairs, and broadcasting group key shares; after the rest members receive corresponding broadcasting key shares, carrying out combination calculation, thereby obtaining group keys; and verifying whether calculated group keys are correct or not by the group members, encrypting communication information through the group keys if the calculated group keys are correct, and exchanging group security information. According to the method, members in or out of a group can select any one subset object in the group for secret information exchange; an object not selected by an information sender cannot decrypt the shared information; the group members can negotiate an encryption key and a decryption key which are consistent; the group members can verify the correctness of the keys; anonymity of the members participating in group key negotiation can be realized; and the personal private information of the group members can be protected.

Description

technical field [0001] The invention belongs to the technical field of information security and cryptography, and relates to the key technology of secret information exchange and transmission among group members: a group key negotiation method, in particular to a group in a multi-level and three-dimensional information environment A method for elastic asymmetric group key agreement between information exchange and secure transmission. Background technique [0002] Group key negotiation is the group encryption and decryption keys required by group members to jointly calculate the communication between groups in order to ensure communication security. , resource sharing, information exchange and other key technologies. With the rapid development of information technology, the network environment for information services is becoming more and more complex, and the requirements for network security are getting higher and higher, such as multi-layered networks with different leve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0833H04L9/0838H04L63/0442H04L63/065
Inventor 张启坤黄艳袁俊岭王锐芳王丽娜
Owner 河南招源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products