Contribution type group key management method depending on sequential exponentiations

A management method and a modulo index technology, applied in the field of network communication security, can solve problems such as large time consumption, reduce the single point failure problem, solve the effect of independence and complete forward secrecy

Inactive Publication Date: 2019-02-05
兰州世达电子工程技术有限公司
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

time consuming

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Contribution type group key management method depending on sequential exponentiations
  • Contribution type group key management method depending on sequential exponentiations
  • Contribution type group key management method depending on sequential exponentiations

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In this embodiment, the key tree introduced into the join tree is a binary tree, and the logical tree structure is as follows figure 1 . N M and N J Indicates the number of members in the main tree and the joining tree, C J Indicates the capacity to join the tree. Such as figure 1 shown.

[0067] Such as figure 2 As shown, the leaving tree is introduced, and the members to be leaving are moved to the leaving tree, and the overhead is reduced by introducing the leaving tree. The leaving tree is a weight tree composed of members' leaving probabilities, and the positions of members in the leaving tree are determined according to their leaving probabilities. The greater the probability of leaving, the closer the member's position is to the root of the tree.

[0068] 1. Member Joining Change Process

[0069] When the group members change, in order to ensure communication security, it is necessary to change the key group, and the new members join the following steps...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a contribution type group key management method in security group communication. The method comprises signature and authentication of group members, own contribution of the group members to generation and management of keys, and independence and full forward security of the keys. A key tree is organized into a tree topology structure including a main tree, a join tree andan exit tree; the join tree is used as a cache region for accepting new members; and when the join tree reaches a certain height or members exit, members in the join tree are moved and merged into themain tree in batches. New members joins to a root part of the join tree, so that time complexity when the members join is reduced, and an approximate progressive upper bound of member join time costis reduced to O(1). when members exit, the exit tree is introduced, and the exiting members are moved to the exit tree, so that average cost is reduced, and an approximate progressive upper bound is reduced to O(1). According to the invention, when secret communication is carried out among mobile group equipment in a network environment, security communication among the group equipment can be ensured; calculation and communication energy consumption is relatively low; and the contribution type group key management method has good flexibility, security and practicality.

Description

technical field [0001] The invention relates to a method for managing security group secret keys in a group communication network environment, in particular to a method for managing group secret keys of a contribution type binary tree relying on a modulus index, and belongs to the field of network communication security. Background technique [0002] In secure group communication, data security and data integrity are often associated with group keys, and dynamic key management technology has become the most basic content in group communication security mechanisms. In a multicast group, since members are always changing dynamically, in order to prevent new members from obtaining past communication content and leaving members from obtaining future communication content, it is necessary to update the group key in real time, which requires group members to jointly negotiate a key Key management methods for establishment and renewal. [0003] At present, important group key mana...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0836H04L9/0891
Inventor 曹震寰顾梦鹤王一卜温绍业沙宝红王红娟
Owner 兰州世达电子工程技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products