Block-chain-based key management method, device and storage medium in CCN

A key management and blockchain technology, applied in the field of blockchain-based key management and computer-readable storage media, can solve problems such as user misconduct, hidden safety hazards, and excessive overhead, to ensure authenticity and integrity characteristics, solve the risk of users doing evil, and avoid the effect of a single point of failure

Active Publication Date: 2018-12-18
PEKING UNIV SHENZHEN GRADUATE SCHOOL
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, based on the "endorsement" method, it is inevitable that some users will do evil, authenticate illegal users, and cause security risks
In addition, revoking a user requires all members to reach an agreement, which is too expensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block-chain-based key management method, device and storage medium in CCN
  • Block-chain-based key management method, device and storage medium in CCN
  • Block-chain-based key management method, device and storage medium in CCN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0089] figure 1 The basic architecture of the blockchain-based key management system in the present invention is shown. refer to figure 1 , the system is divided into three layers from top to bottom, among which, the top layer (marked by the area surrounded by an oval) is the blockchain layer, which is composed of each independent trust domain administrator as a consensus node, which is used to store user A hash of the public key to guarantee the authenticity of the user's public key. The middle layer (marked by a triangle) is the user public key layer, which is used to verify the public key of the next layer; the bottom layer (marked by a square) is the device and application key layer.

[0090] In order to avoid a single point of failure, the present invention uses the blockchain composed of trust domain administrators as the starting point of trust, and each trust domain administrator serves as a consensus node. The blockchain is used to store the public key hashes of us...

Embodiment 2

[0152] refer to Figure 5 , which shows a flow chart of the steps of a blockchain-based key management method in a CCN of the present invention, which may specifically include:

[0153] Step 501, the user creates an authentication transaction, which includes the user's public key hash and user signature;

[0154] Step 502, the user sends the authentication transaction to the trust domain administrator of the trust domain where the user is located to apply for authentication, wherein the user refers to an ordinary node in the trust domain;

[0155] Step 503, the user receives the block height of the authentication transaction sent by the trust domain administrator, and writes the block height and transaction hash together into a public key bag;

[0156] In an alternative embodiment of the present invention, refer to Figure 6 , the above method also includes the following steps:

[0157] Step 504, the user creates a revocation transaction, the revocation transa...

Embodiment 3

[0161] refer to Figure 7 , which shows a flow chart of the steps of a blockchain-based key management method in a CCN of the present invention, which may specifically include:

[0162] Step 701, the trust domain administrator receives the authentication transaction sent by the user;

[0163] Step 702, judging whether the authentication transaction is legal;

[0164] Specifically, the judging whether the authentication transaction is legal includes:

[0165] The trust domain administrator verifies the user signature in the authentication transaction, and judges whether the user is a legal user in the trust domain, and if so, determines that the authentication transaction is legal; if not, confirms that the authentication transaction is illegal.

[0166] Step 703, when it is determined that the authentication transaction is legal, the trust domain administrator signs the authentication transaction, and broadcasts the signed authentication transaction to the block...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a key management method based on a block chain in a CCN. The method comprises the following steps: a user creates an authentication transaction, wherein the authentication transaction comprises a user's public key hash and a user's signature; the user sends the authentication transaction to the trust domain administrator of the trust domain to which the user belongs for authentication application; the user receives the block height of the authentication transaction sent by the trusted domain administrator and writes the block height into the public keypackage together with the transaction hash. Based on the scheme, the invention realizes a decentralized key management mode, and adopts a block chain to store the public key hash of a user in a trustdomain, thereby effectively ensuring the authenticity and integrity of the user's public key. The embodiment of the invention also provides a key management device based on a block chain in a CCN anda computer-readable storage medium.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a block chain-based key management method, device and computer-readable storage medium in CCN. Background technique [0002] Content-Centric Networking (CCN) is a new information-centric network architecture system that provides content-based security design principles. This is completely different from the traditional IP network based on channel security (users and hosts need to encrypt communication channels at the application layer or session layer through SSL / TLS to ensure that data cannot be eavesdropped during transmission). CCN builds data authentication into the network layer, and the publisher binds and signs the content and content name together. In this way, each CCN package carries a digital signature binding content and name, and in order to verify the signature of a data package, the application can obtain the corresponding public key. However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06Q40/04
CPCG06Q40/04H04L9/3236H04L9/3239H04L9/3247H04L2209/56
Inventor 雷凯齐竹云楼君俊章奇超
Owner PEKING UNIV SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products