Sender Authenticated Asymmetric Group Key Agreement Method

A sender, asymmetric technology, applied in the field of information security, can solve the problems of the sender's authentication and privacy, low efficiency, etc., and achieve the effect of reducing the calculation cost

Active Publication Date: 2019-09-10
EAST CHINA NORMAL UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing asymmetric group key agreement does not achieve sender authentication and privacy, and the existing identity-based asymmetric group key agreement uses a general transformation to achieve the security of chosen ciphertext attack, which is not efficient high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sender Authenticated Asymmetric Group Key Agreement Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention includes the following entities: user, key generation center (KGC), wherein the user includes group members and users outside the group, and the sender can be any user; it includes the following steps:

[0035] Step 1: Setup

[0036] KGC inputs the security parameters, selects the master key, generates the global parameter Λ of the asymmetric group key agreement method, and publishes the global parameter. details as follows:

[0037] 1) Enter security parameters Choose two cyclic groups G of order q 1 , G 2 , select a set of bilinear maps e: G 1 ×G 2 →G 2 , select a generator P∈G 1 ;

[0038] 2) Select a random number s that satisfies Represents a set of integers between 1 and q-1, the random number is used as the master key, and the public key is set to P pub = sP;

[0039] 3) Select 6 hash functions, l 0 Indicates the length of the identity, l 1 means G 1 The length of the elements, l 2 means G 2 The length of the elements, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sender-authenticated asymmetric group key negotiation method, which comprises the following steps: a setting step, an extracting step, a negotiation step, an encryption key generating step, a decryption key generating step, a signature and encryption step, and a decryption and verification step. The method provided by the invention has the following characteristics of satisfying the confidentiality of messages, the forward security, the sender authenticity and privacy, and the sender dynamism; the calculation cost is reduced because the general transformation is not used.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to an asymmetric group key negotiation method which can be authenticated by a sender. Background technique [0002] Group communication refers to multiple users communicating in one channel. With the development of group-oriented applications such as Internet TV, group communication has more and more application scenarios, and these applications require that data can be sent securely from one entity to a group of recipients. To ensure the security of group communication, it is necessary to consider the confidentiality of messages, forward security, sender authentication and privacy, and sender dynamics. [0003] To satisfy the above security properties, group key agreement and broadcast encryption are widely used. Group key negotiation enables users in the group to establish a shared key, and group users can communicate with each other confidentially and anonymously...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
Inventor 张磊李江涛张元飞
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products