A New Secure Anonymous Communication Method Based on Public-Private Key Cryptography Mechanism

An anonymous communication, public and private key technology, applied in the field of information security, can solve the problem of inability to resist data tampering attacks of relay routing nodes, and achieve the effects of improving message forwarding efficiency and anonymous communication efficiency, reducing computational complexity, and high security.

Active Publication Date: 2022-03-29
杭州后量子密码科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The certificateless onion routing protocol proposed by Fiore et al. in 2016 has greatly improved the calculation load of the relay router and achieved a higher data transmission rate, but the data packet structure it uses cannot resist the data tampering attack of the relay routing node.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A New Secure Anonymous Communication Method Based on Public-Private Key Cryptography Mechanism
  • A New Secure Anonymous Communication Method Based on Public-Private Key Cryptography Mechanism
  • A New Secure Anonymous Communication Method Based on Public-Private Key Cryptography Mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] 1. The link establishment process is described as follows:

[0030] The first step: when the user ID A When wanting to establish an anonymous communication link with the destination node D, first randomly select L=3 onion routing nodes in the public list managed by KGC, and obtain the long-term public key QUOTE pk of the onion routing node at the same time i (i=1,2,3)pk i (i=1,2,3) and the long-term public key pk of destination node D D .

[0031] Step 2: User ID A First generate the destination node D and three onion routing nodes R respectively i (i=1,2,3) Temporary public-private key pair (X D ,Y D ) and (X i ,Y i ) (i=1,2,3). Based on these ephemeral private keys and the long-term public key of the onion routing node, the user ID A Run the DH key exchange algorithm to generate and destination node D and three routing nodes R i (i=1,2,3) shared temporary session key K D and K i (i=1,2,3).

[0032] Step 3: User ID A Locally generate a link establishment...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a new secure anonymous communication protocol based on a public-private key cryptographic mechanism, which aims to change the current situation of frequent leakage of user's private information in the current communication network and protect the user's privacy. The technical point is to design a new encapsulation format for anonymous communication data packets based on onion routing technology and public-private key cryptography, build a secure anonymous communication link, and implement a secure anonymous communication protocol. In this protocol, session data and Authentication data is treated differently, which reduces the number of encryption layers of session data, reduces the amount of calculation, and effectively improves the forwarding efficiency of anonymous information. The invention has the anonymity of communication and the confidentiality and integrity of anonymous messages, and can realize fast and safe anonymous message transmission.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to using Diffie-Hellman (DH) key exchange algorithm, onion routing technology and public-private key encryption mechanism as the basis of communication protocol. Background technique [0002] How to protect the privacy of users in the public network and enable users to realize fast, secure and secret communication in the open communication environment is one of the key issues in the field of information security that needs to be decrypted urgently. However, since network devices need to know certain information about users to complete routing and message forwarding functions, user identities cannot be completely hidden. Therefore, anonymous communication hides important information from untrusted parties and discloses appropriate information to authorized or trusted parties. [0003] Onion routing technology plays a vital role in anonymous communication networks, not onl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/40
CPCH04L9/0819H04L9/085H04L9/083H04L9/3013H04L63/0421H04L63/0478H04L63/12
Inventor 李凤银刘中兴崔璨王伊蕾
Owner 杭州后量子密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products