An asymmetric group key negotiation method based on permissioninformation exchange

A group key negotiation and information exchange technology, which is applied in the field of asymmetric group key negotiation, can solve the problem of inability to exchange group information with access rights

Active Publication Date: 2019-01-22
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the technical problem that group members cannot exchange group information with different sensitivities according to the access rights of different

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An asymmetric group key negotiation method based on permissioninformation exchange
  • An asymmetric group key negotiation method based on permissioninformation exchange
  • An asymmetric group key negotiation method based on permissioninformation exchange

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] like figure 1 As shown, an asymmetric group key agreement based on authority information exchange, the steps are as follows: ①The members participating in the group key agreement first initialize the parameters, and then generate their own public / private key pairs; ②The terminal Each member registers and authenticates through the attributes they have, and obtains the group authority key parameters of the corresponding attributes; ③The group key negotiation sender selects the attribute authority that can be shared with the attribute corresponding to the attribute according to the confidentiality of its broadcast message Group authority key parameters and broadcast these parameters; ④After receiving the broadcast from the initiator of the key negotiation, the remaining members calculate and analyze their own key parameters with these group authority keys, and calculate the group key; ⑤Group encryption After the key negotiating members calculate the group key, they each ve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an asymmetric group key negotiation method based on permission information exchange, which takes attributes of terminal members as right parameters, and each terminal member sends its attribute set and hash value signature of the attribute set to a key generation center. The key generation center verifies the signature of the attribute set hash column value of the terminal member. If the authentication is passed, the member obtains the right key parameter corresponding to the attribute; based on the sensitivity of the exchanged information, encrypting and broadcasting the information to be broadcast to the group members with the right key parameter corresponding to the specific attribute and the selected random key factor; a member with the access right of the sensitive information calculates a decryption key of the broadcast ciphertext information by using a key parameter corresponding to the access right, and obtains the corresponding plaintext information by decrypting the broadcast ciphertext through the decryption key, so as to realize the secret information sharing among the group members with the specific right. The invention can prevent unauthorized members from participating in group key negotiation and protect personal privacy.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an asymmetric group key negotiation method based on authority information exchange, through the authority authentication of group members and the calculation of group keys, group members with specific authority can be realized exchange of security information and transmission of security information between them. Background technique [0002] Group-oriented multicast communication has a wide range of applications, such as secret file sharing, video conferencing, and multi-party secure computing. Group communication on an open, trustless Internet requires secure exchange and secure transmission of information. Group key negotiation is to calculate the group session key online between groups, and then use the session key to carry out group encrypted communication. It is one of the key technologies to ensure secure information exchange and transmission between ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L29/06
CPCH04L9/0618H04L9/083H04L9/0838H04L9/0863H04L63/0442H04L63/083
Inventor 张启坤袁俊岭李志刚王锐芳王冰丽李永娇张俊松甘勇
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products