Key sharing method and device

A key sharing and key technology, which is applied in the field of network information security, can solve problems such as key exposure, reduce confidentiality, and increase key protection costs, so as to ensure correctness and security, and resist administrator deception and member Effects of spoofing attacks

Active Publication Date: 2016-10-12
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF7 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this scheme increases reliability, it increases the chance of key exposure, reduces confidentiality, and increases the cost of key protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key sharing method and device
  • Key sharing method and device
  • Key sharing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] figure 1 It is a schematic flowchart of a key sharing method according to an embodiment of the present invention. Such as figure 1 As shown, the key sharing method mainly includes the following steps:

[0053]Step S1, according to the system preset parameters, using the (t, n) threshold algorithm to decompose the key k into n different sub-keys.

[0054] Step S2, for the above n subkeys k 1 , k 2 ,...,k n Add timestamps and parity bits respectivel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key sharing method and device. The method comprises the steps of decomposing a key k into n mutually different sub-keys by employing a (t, n) threshold algorithm according to preset parameters of a system; adding time stamps and parity check bits to the sub-keys, thereby generating n sub-key interaction information packets; signing the sub-key interaction information packets by employing a second public key and a first private key, thereby generating n signed information packets, and distributing the signed information packets to corresponding sub-key clients; verifying the signed information packets by employing a second private key and a first public key and checking the signed information packets according to the time stamps and the parity check bits, thereby obtaining the sub-keys, and storing the sub-keys in the corresponding sub-key clients; and obtaining the sub-keys stored in at least t sub-key clients, restoring the at least t sub-keys to the key k by employing the (t, n) threshold algorithm, wherein the first private key and the first public key are a mutually matching key pair, and the second private key and the second public key are a mutually matching key pair.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a key sharing method and device. Background technique [0002] With the continuous improvement of the global informatization level, the importance of network and information security is increasing day by day. At present, the network and information security industry has become a key industry that has a survivable and supportive role in all aspects of national security, political stability, economic development, social life, and healthy culture. Network and information security may affect personal work and life, and even affect national economic development, social stability, and national defense security. Therefore, the network and information security industry has a pivotal position and role in the entire industrial layout and even the national strategic pattern. [0003] Modern cryptosystem is an important part of network and information security. Its de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/085
Inventor 赵晖杨乾何燕
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products