Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Pair-based combined hierarchical non-interactive key negotiation method

A technology of key negotiation and hierarchical key, applied in the field of communication, can solve the problems of non-conformance, impracticality, inability to expand more layers well, etc., to achieve the effect of end-to-end security

Active Publication Date: 2020-04-14
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Gennaro et al. (2008) established two non-interactive hierarchical key agreement schemes, but they are only safe for any number of leaf node key leaks. And they cannot be well extended to Many more levels, which do not even conform to the generalized IBNIKA (Kenneth, 2009) level definition extension.
[0009] (2) Under the bilinear mapping, Guo et al. (2011) tried to propose an effective HIB-NIKA. But we found that it is not as safe as they claim
However, the complex computational load of multi-line pairs is unacceptable for applications in resource-constrained environments, so it is impractical and undesirable to use multi-line pairs to construct HIB-NIKA in wireless ad hoc networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pair-based combined hierarchical non-interactive key negotiation method
  • Pair-based combined hierarchical non-interactive key negotiation method
  • Pair-based combined hierarchical non-interactive key negotiation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] The purpose of the present invention is to ensure the credibility and confidentiality of instant messaging.

[0041] In the following, the present invention will be described with specific embodiments of the key generation and key negotiation of users of four different levels and inheritance relationships of A, B, C, and D in a three-layer hierarchical system domain, wherein user A is the first Layer user, identified as ID 1 . The identity of the second lay...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pair-based combined hierarchical non-interactive key negotiation method. The method comprises an overall scheme design and a negotiation algorithm design. The method specifically comprises the following steps: S1, registering: the PKG generates system parameters, and generates and distributes corresponding private keys for the first layer of nodes in the domain; S2, intermediate node key distribution: each intermediate node obtains its exclusive CPK private key table from the PKG distribution; S3, extracting of node keys: each intermediate node generates a CPK key component by using the own CPK private key table, and the CPK key component is combined with the hierarchical identity key to form an own node key; S4, establishing of initialization of a session channel, initiating of a communication party and completing of calculation of a session key; S5, formal communication between two parties: a receiving party calculates the session key and decrypts the communication content. The two parties can directly establish an encryption channel without additional communication for key agreement. Public key sharing is achieved through the CPK tables, and the leaf nodes only need to store the two CPK public key tables and do not need to interact with the other communication party in advance to obtain public key information of the nodes.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a pair-based combined hierarchical non-interaction key negotiation method. Background technique [0002] Currently, key agreement is a fundamental security function that enables two nodes to negotiate a shared key to protect their communication. Because sensor nodes in mobile ad hoc networks (MANETs) have limited power and processing and storage capabilities, key agreement should have the following properties: [0003] No interaction: Nodes can compute the same shared secret without interaction so energy and bandwidth consumption can be significantly reduced. [0004] ·Identity-based: Each node only needs to know its own private key and the identity of the other party to calculate the shared secret key, which minimizes the interaction required to effectively establish communication. [0005] Hierarchical structure: The scheme is to distribute the responsibility of key gen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0861H04L9/0847
Inventor 王小峰邢倩倩王宝生郭佳朴李鹏坤刘文正
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products