Asymmetric group key negotiation method based on block chain

A group key negotiation and group key technology, which is applied to key distribution, can solve the problems of indetermination of access rights of group members, high information sensitivity, and reduction of calculation and communication traffic.

Active Publication Date: 2019-09-20
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF10 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the key calculation process for the existing group key agreement method, the calculation and communication load is too large. In the identity authentication process, it is easy to expose personal identity information, and the information is highly sensitive, and it is impossible to determine the access of group members. For technical issues such as permissions, the present invention proposes a block chain-based asymmetric group key negotiation method, which uses block chain decentralized anonymous authentication to prevent potential safety hazards caused by entrusting third-party authentication and protect personal privacy Not to be leaked; the use of blockchain distributed computing method can make group key calculation and communication more balanced, prevent network bottlenecks and single-point collapse problems caused by excessive calculation and communication load of a single terminal node, and at the same time reduce as much as possible The calculation and communication volume of each node; the traceability of blockchain transaction records and other characteristics can be used to track and pursue malicious network nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric group key negotiation method based on block chain
  • Asymmetric group key negotiation method based on block chain
  • Asymmetric group key negotiation method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] In the case of complex group communication and information sharing, multiple communication parties need to authenticate the communication members, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, while multiple communication parties need to be authenticated, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only authorized members can share information. In view of this application background, the present invention proposes a blockchain-based asymmetric group key agreement method, such as figure 1 As shown, the steps are as follows: ① The members participating in the group key negotiation first perform parameter initialization, respectively generate their own public / private key pairs, and obtain their own registration information, and then arrange them according to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an asymmetric group key negotiation method based on a block chain. The asymmetric group key negotiation method comprises the following steps: generating and registering keys of terminal members of a group; enabling the key generation center to arrange the terminal members into an annular set with identifiers according to the IP addresses, the public keys and the registration identification information of the terminal members, broadcast messages among the terminal members and store broadcast information of left and right neighbor nodes of the terminal members; and enabling the terminal member on the initiating node in the annular set to package the message composed of the group key parameters to the first block and transmit the message to the terminal member on the right adjacent node of the first block, carrying out circulation sequentially until the terminal member on the left adjacent node of the initiating node is reached, and calculating a group encryption key and a group decryption key, namely carrying out group key self-verification verification. Security information exchange and security information transmission between group members are achieved through the block chain technology, the asymmetric group key negotiation function and the performance advantage of the block chain technology are achieved, and group key negotiation is more flexible, efficient and practical.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a block chain-based asymmetric group key agreement method. Background technique [0002] Group key agreement is one of the methods to ensure the secure exchange of information within a group, and is widely used, such as secure multi-party computing, secure resource sharing, and distributed collaborative computing. Multiple mobile devices share information with each other through wireless communication. During the information sharing process, secret information is easily stolen by illegal entities. The asymmetric group key agreement method is one of the key technologies to ensure secure information exchange and transmission between groups. The group encryption key and group decryption key are calculated online between the groups, and then the group encryption key and the group decryption key are used. The key is used for encrypted communication of information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0825H04L9/0838H04L9/32H04L63/0407H04L63/065H04L63/08H04L67/10H04W84/18
Inventor 张启坤王锐芳朱亮李永娇袁俊岭李志刚张彦华蔡增玉张然李健勇甘勇
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products