Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Pair-based Combined Hierarchical Interactionless Key Agreement Method

A key agreement and hierarchical key technology, applied in the field of communication, can solve the problems of inconsistency, impracticality, and inability to expand more levels well, and achieve the effect of avoiding collusion attacks

Active Publication Date: 2022-07-15
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] (1) Gennaro et al. (2008) established two non-interactive hierarchical key agreement schemes, but they are only safe for any number of leaf node key leaks. And they cannot be well extended to Many more levels, which do not even conform to the generalized IBNIKA (Kenneth, 2009) level definition extension.
[0009] (2) Under the bilinear mapping, Guo et al. (2011) tried to propose an effective HIB-NIKA. But we found that it is not as safe as they claim
However, the complex computational load of multi-line pairs is unacceptable for applications in resource-constrained environments, so it is impractical and undesirable to use multi-line pairs to construct HIB-NIKA in wireless ad hoc networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Pair-based Combined Hierarchical Interactionless Key Agreement Method
  • A Pair-based Combined Hierarchical Interactionless Key Agreement Method
  • A Pair-based Combined Hierarchical Interactionless Key Agreement Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be described in detail below. Obviously, the described embodiments are only some, but not all, embodiments of the present invention. Based on the embodiments of the present invention, all other implementations obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present invention.

[0040] The purpose of the present invention is to ensure the credibility and confidentiality of instant communication.

[0041] In the following, the present invention will be described with a specific embodiment of key generation and key negotiation for users with four different levels and inheritance relationships of A, B, C, and D in a three-layer hierarchical structure system domain, where user A is the first Layer user, the identity is ID 1 . The identity of the second layer ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pair-based combined hierarchical non-interaction key negotiation method, which includes overall scheme design and negotiation algorithm design; specifically includes the following steps: S1 registration; PKG generation system parameters, which are generated by the first-layer nodes in the domain And distribute the corresponding private key; S2: intermediate node key distribution; each intermediate node obtains its own CPK private key table from PKG distribution. S3: node key extraction; each intermediate node uses its own CPK private key table to generate a CPK key component, which is combined with the hierarchical identity key to form its own node key. S4: Establish the initialization of the session channel, initiate the communication party and complete the calculation of the session key. S5: The two parties communicate formally; the receiver calculates the session key and decrypts the communication content. The two parties can directly establish an encrypted channel without additional communication for key negotiation. The CPK table is used to realize the sharing of public keys. The leaf node only needs to store two CPK public key tables, and does not need to interact with the communicating party in advance to obtain the public key information of the node.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a pair-based combined hierarchical non-interaction key negotiation method. Background technique [0002] Currently, key agreement is a fundamental security function that enables two nodes to negotiate a shared key to protect their communications. Because sensor nodes in mobile ad hoc networks (MANETs) have limited power and processing storage capabilities, key agreement should have the following properties: [0003] No interaction: Nodes can compute the same shared key without interaction so energy and bandwidth consumption can be significantly reduced. [0004] Identity-based: Each node only needs to know its own private key and the identity of the other party to calculate the shared secret key, which minimizes the interaction required to effectively establish communication. [0005] · Hierarchical structure: The scheme is to distribute the responsibility of key generat...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0838H04L9/0861H04L9/0847
Inventor 王小峰邢倩倩王宝生郭佳朴李鹏坤刘文正
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products