Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-leakage group key negotiation system and method in group communication

A group communication and key negotiation technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as incomplete side channel key leakage, achieve no hardware support, high practicability, and use convenient effect

Active Publication Date: 2018-07-06
HUBEI UNIV OF TECH
View PDF10 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, domestic and foreign researchers have proposed solutions to the above problems, including forward secure cryptosystem, key isolation, secret sharing, intrusion rebound, etc., but none of these solutions fully solve the key leakage problem of side channel attacks; In addition, there are various means and methods of side-channel attacks. Most of the traditional methods can only be protected against specific existing types of attacks. For new attack methods, only after-the-fact countermeasures can be taken. Therefore, there is a broad definition of building keys The general theoretical model that the system and keys still maintain security when there is a limited leak in the attack has become one of the important problems in modern cryptography to solve the leak problem. It is of great theoretical and practical significance to study and design an anti-leakage cryptographic scheme.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-leakage group key negotiation system and method in group communication
  • Anti-leakage group key negotiation system and method in group communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0034] please see figure 1 , an anti-leakage group key negotiation system in group communication provided by the present invention, the system has n users, and all users share a password pw; Random oracle; protocol participants are networked devices participating in the protocol; the adversary is a probabilistic polynomial time algorithm, through which to simulate various attacks that may occur in the network; random oracle simulates the adversary's possible attacks in the network through communication with the adversary information obtained.

[0035] please s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-leakage group key negotiation system and method in group communication. The system comprises n users. All users share the same password pw. The system has a continuouspost-event leakage prevention security model. The system specifically comprises protocol participants, an opponent and a random oracle. The protocol participants are online devices participating in aprotocol. The opponent is a probability polynomial time algorithm through which various attacks possibly occur in a network are simulated. The random oracle communicates with the opponent to simulateinformation possibly obtained by the opponent in the network. According to the system and the method, the system is initialized; each protocol participant carries out automatic computing; each protocol participant carries out combined computing; and each protocol participant generates a common session key. According to the system and the method, under the condition that leakage attacks are resisted, a group key is negotiated, so the system and the method have relatively high practicability; and a high quality key negotiation protocol based on password authentication is provided, so the efficiency of the scheme is improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a group key negotiation system and method against leakage in group communication, in particular to the characteristics of the group communication field, the needs of users for security, and the needs of convenience and efficiency. A group key agreement system and method based on password authentication with anti-leakage attack capability. Background technique [0002] With the extensive application of online collaborative work, video conference, grid computing, online games, online teaching and other services, group communication services on public networks are increasing day by day. In these applications, the number of group members may reach tens or hundreds. In the case of a large number of group members, a crucial issue is how to ensure the security of communication among group members, and the core of this problem is how to exchange keys safely and efficiently be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0838H04L9/3226
Inventor 阮鸥王清平王子豪黄雄波杨阳廖雅晴汤赛怡
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products