Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for selecting one client to generate a key for multiple clients and multiple servers

A multi-server, multi-client technology, applied in the field of information security, can solve the problems of increasing the burden of the key server, low flexibility, and no solution, and achieve the effect of improving security and flexibility

Active Publication Date: 2019-05-28
JUZIX TECH SHENZHEN CO LTD
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, for the key service system, generally a key server generates the key, and then distributes the generated key to the key user, which will inevitably increase the burden on the key server, and because a single Generated by the key server, all key generation rules are specified and maintained by the key server itself, and the flexibility is not high
[0003] For the above-mentioned problems existing in the existing key system, no effective solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for selecting one client to generate a key for multiple clients and multiple servers
  • Method and device for selecting one client to generate a key for multiple clients and multiple servers
  • Method and device for selecting one client to generate a key for multiple clients and multiple servers

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0107] In this example, a key management method is provided based on secure two-party computing that generates keys through the client and is kept by multiple servers, that is, a single client generates a private key and splits it into multiple components for delivery. To multiple servers and multiple clients, use multiple servers and multiple clients to calculate signatures through two-party MPC; refresh multiple server and multiple client components through backup private keys, and refresh multiple Server and multiple client components.

[0108] Operations such as key generation, use, storage, backup, recovery, and refresh in this situation are explained as follows:

[0109] 1) generate:

[0110] Such as image 3 As shown, the following steps may be included:

[0111] S1: The client and the key server complete two-way authentication through KYC, and issue authentication materials to complete the registration process;

[0112] S2: Client 1 generates a complete private key...

example 2

[0143] In this example, a key management method based on secure multi-party computing is provided that generates keys through the client and is kept by multiple servers. Multiple clients and multiple key servers, use multiple clients and multiple key servers to calculate signatures through MPC, refresh multiple clients and multiple key server components by backing up private keys, refresh multiple clients through MPC with multiple key server components.

[0144] Operations such as key generation, use, storage, backup, recovery, and refresh in this situation are explained as follows:

[0145]1) generate:

[0146] Such as Figure 8 As shown, the following steps may be included:

[0147] S1: The client and the key server complete two-way authentication through KYC, and issue authentication materials to complete the registration process;

[0148] S2: Client 1 generates a complete private key SK, and generates a related public key PK based on the private key SK. Split the priv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for selecting one client to generate a secret key for multiple clients and multiple servers, which are applied to a secret key management system, and the method comprises the following steps: a first client generates a complete target private key and generates a target public key according to the target private key, and the first client is one client in Nclients; The first client splits the target private key into 2N parts of key components and generates a public key component for each key component in the 2N parts of key private keys to obtain 2N parts of public key components; And the first client sends the 2N key components, the 2N public key components and the target public key to the N clients and the N key servers in a one-to-one correspondence manner through a security channel established between the clients and the key servers. Through the mode, the problem that the safety and flexibility of an existing key management system are low is solved, and the technical effect of effectively improving the safety and flexibility of the key management system is achieved.

Description

technical field [0001] The present application belongs to the technical field of information security, and in particular relates to a method and device for selecting a client to generate keys for multiple clients and multiple servers. Background technique [0002] At present, for the key service system, generally a key server generates the key, and then distributes the generated key to the key user, which will inevitably increase the burden on the key server, and because a single Generated by the key server, all key generation rules are specified and maintained by the key server itself, and the flexibility is not high. [0003] For the above-mentioned problems existing in the existing key system, no effective solution has been proposed yet. Contents of the invention [0004] The purpose of this application is to provide a method and device for selecting a client to generate keys for multiple clients and multiple servers, which can improve the security and flexibility of k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 颜泽谢翔傅志敬孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More