Safe and efficient SM9 multi-party key distribution method and device

A key distribution and efficient technology, applied in the field of information security, can solve the problems of IBC system single point failure and system paralysis

Active Publication Date: 2019-07-05
WUHAN UNIV
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the IBC system has a single point of failure problem
Since KGC undertakes the entire key distribution fun

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and efficient SM9 multi-party key distribution method and device
  • Safe and efficient SM9 multi-party key distribution method and device
  • Safe and efficient SM9 multi-party key distribution method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0044] The present invention proposes a safe and efficient SM9 multi-party key distribution method, and a specific description is given below.

[0045] 1. Symbols and definitions

[0046] KA i , KA j : Multi-party key distribution participant;

[0047] q: greater than 2 191 large prime number;

[0048] G 1 , G 2 : Additive cyclic group of order q;

[0049] P 1 , P 2 : Additive cyclic group G 1 , G 2 generator of

[0050] [k]P:G 1 , G 2 k times the element P in

[0051] h 1 : by {0,1} * arrive A secure cryptographic hash function for ;

[0052] ID: User ID;

[0053] P pub-s : system master public key; ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and efficient SM9 multi-party key distribution method and device. The method comprises the following steps: 1) jointly generating a system main public key by Tau participants; and 2) jointly generating a user private key by the Tau participants. According to the system, the main public key and the user private key are generated by the Tau participants in a combined mode, the system does not depend on a single KGC any more, the problem of single-point failure under a single KGC system is effectively avoided, the safety of SM9 key distribution is improved, the stability of a password system is enhanced, and the system has the advantages of being high in safety, high in efficiency and the like.

Description

technical field [0001] The invention relates to information security technology, in particular to a safe and efficient SM9 multi-party key distribution method and device. Background technique [0002] In order to overcome the certificate management and maintenance problems of public key cryptography, Identity-Based Cryptography (IBC) came into being. The user uses the identity as the public key, and KGC generates a private key for the user according to the identity, and no longer uses the public key certificate. However, the IBC system has a single point of failure. Since KGC undertakes the entire key distribution function, once KGC is compromised by a malicious adversary or fails to operate normally, the system will be paralyzed. [0003] In order to overcome the drawbacks of excessive centralization of power, more and more applications have begun to be implemented in a distributed context. For example, secure multi-party computing, distributed digital signatures, etc. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/14H04L9/30
CPCH04L9/0819H04L9/0863H04L9/0869H04L9/14H04L9/3066
Inventor 何德彪张佳妮冯琦王婧陈泌文
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products