Group key management method supporting user identity authentication

A technology for user identity authentication and group key, applied in user identity/authority verification, public key for secure communication, and key distribution

Active Publication Date: 2017-01-04
WUHAN UNIV
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention mainly solves the problems of data source authentication and key management in the multicast system, and provides a group key management method supporting user identity authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group key management method supporting user identity authentication
  • Group key management method supporting user identity authentication
  • Group key management method supporting user identity authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0025] The present invention mainly solves the problems of data source authentication and key management in the multicast system, and provides a simpler and more convenient public-private key system. The present invention provides a group key management method that supports user identity authentication, Including the three roles of trusted third party, message sender, and message receiver. Users in each multicast system can have two roles of message sender and message receiver. Through the UHPS algorithm, the public-private key algorithm and a set of key upd...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a group key management method supporting user identity authentication. The method comprises steps that comprises steps that an information sender, an information receiver and a trusted third party participating in identity verification and key management are included; the trusted third party is responsible for establishing an integral key system and managing the identity information of users; the information sender is used for acquiring an identity voucher disclosed by the data receiver from the trusted third party, carrying out encryption in combination with the private key pair data, utilizing the private information to realize data signature and then sending the data after signature to a whole multicast system, and the information receiver is used for carrying out decryption and source verification through utilizing a public key and the private key data. Compared with a traditional key scheme, key management pressure and key leakage possibility are greatly reduced.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a group key management method supporting user identity authentication, in particular to a group key management method based on a hash proof system supporting user identity authentication. Background technique [0002] The concept of multicast comes from Steve Deering's doctoral dissertation in 1988. It was first used in audio and video conferencing. Later, with the improvement of network bandwidth utilization and the resolution of important problems such as router forwarding restrictions, it was also extended to be used in some common network group communication fields such as data forwarding, real-time data transmission, and simulation applications. , such as discussion groups, multiplayer games, media feeds, and online auctions. Compared with traditional unicast and broadcast methods, multicast has the advantages of small load, less bandwidth occupation, and high av...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L29/06
CPCH04L9/0833H04L9/3033H04L9/3073H04L9/3249H04L63/0442H04L63/065
Inventor 宋伟湛昭豪彭智勇杨先娣
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products