Multicast method based on key dynamic negotiation and related device

A dynamic key technology, which is applied in the field of communication, can solve the problem that the key distribution negotiation cannot take into account the balance between the number of distribution keys and the amount of encryption and communication volume, so as to achieve the effect of reducing workload and taking into account the communication volume

Active Publication Date: 2020-12-29
ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD +1
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a multicast method based on dynamic key negotiation and related devices, which are used to solve the problem that the key distribution negotiation in multicast communication cannot take into account the balance between the number of distributed keys, the amount of encryption and the amount of communication, and realizes The balance between the number of keys / parameters, the amount of encrypted calculations, and the amount of data communication, and the on-demand dynamic negotiation of keys

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multicast method based on key dynamic negotiation and related device
  • Multicast method based on key dynamic negotiation and related device
  • Multicast method based on key dynamic negotiation and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] For ease of understanding, see figure 1 Embodiment 1 of a multicast method based on dynamic key negotiation provided by the present application includes:

[0065] Step 101, assign parameter subsets to each receiving node, the parameter subset and the parameters corresponding to each receiving node are complementary sets in the parameter set, the parameter set is composed of the parameters corresponding to each receiving node and public parameters, and each parameter is not equal.

[0066] It should be noted that the parameter set contains public parameters, and the public parameter is the same parameter that each node has. This parameter can be set according to the actual situation; a parameter set with unequal parameters is randomly generated according to the number of receiving nodes, that is, every Each receiving node has corresponding parameters, and the parameter set is composed of the parameters corresponding to each receiving node and the public parameters; the ...

Embodiment 3

[0096] see image 3 , an embodiment three of a multicast method based on dynamic key negotiation provided by the present application, including:

[0097] Step 301, assign parameter subsets to each receiving node, the parameter subset and the parameters corresponding to each receiving node are complementary sets in the parameter set, the parameter set is composed of parameters corresponding to each receiving node and public parameters, and each parameter is not equal.

[0098] Step 301 is the same as the description of step 101 in Embodiment 1, please refer to the description of step 101, and details will not be repeated here.

[0099] Step 302: Determine the target receiving node in each receiving node, select the parameters corresponding to the target receiving node from the parameter set to generate the sending set, and obtain the receiving set according to the sending set, and the receiving set and the sending set are complementary sets in the parameter set.

[0100] Step...

Embodiment 3

[0142] The above is the third embodiment of a multicast method based on dynamic key negotiation provided by the embodiment of this application. The following is an embodiment of a network sending node based on dynamic key negotiation provided by the embodiment of this application. Please refer to Figure 4 ,include:

[0143] The allocation unit 401 is used to allocate parameter subsets to each receiving node. The parameter subsets and the parameters corresponding to each receiving node are complementary sets in the parameter set. The parameter set is composed of parameters corresponding to each receiving node and public parameters, and each None of the parameters are equal.

[0144] The first generation unit 402 is configured to determine a target receiving node in each receiving node, select a parameter corresponding to the target receiving node from the parameter set to generate a sending set, obtain a receiving set according to the sending set, and exchange the receiving se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a multicast method based on key dynamic negotiation and a related device. The method comprises the following steps: allocating a parameter subset to each receiving node; determining a target receiving node in each receiving node, selecting a parameter corresponding to the target receiving node from the parameter set to generate a sending set, and obtaining a receiving set according to the sending set, wherein the receiving set and the sending set to complement each other in the parameter set; establishing an intermediate variable and an encryption key according to the parameter sum of the sending set, the parameter sum of the receiving set, the first prime number and the primitive of the first prime number; encrypting the plaintext data through the encryption key toobtain ciphertext data, and sending the ciphertext data, the intermediate variable, the list of the target receiving nodes, the first prime number and the primitive element to a common channel. The problem that key distribution negotiation in multicast communication cannot give consideration to the balance between the number of distributed keys and the encryption amount and the communication amount is solved, and the balance among the number of keys/parameters, the encryption calculation amount and the data communication amount and on-demand dynamic negotiation of the keys are achieved.

Description

technical field [0001] This application relates to the field of communication technology, in particular to a multicast method and related devices based on dynamic key negotiation. Background technique [0002] In application scenarios such as wireless sensor networks or the Internet of Things, star or tree network structures are usually used. The gateway node in the network structure manages and controls a large number of sensors or terminals. When the gateway node needs to send the same data to other network nodes, one way is to use unicast to send them one by one, and the other way is to use multicast to send them uniformly . In order to prevent data leakage, it is necessary to encrypt the sent data, which involves the issue of key distribution and negotiation. [0003] Suppose there are n receiving nodes, and the gateway node wants to send the same data to k (1≤k≤n) receiving nodes among them. When the specific receiving node cannot be determined before sending, the fir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04L12/761H04L45/16
CPCH04L9/0838H04L9/0869H04L63/0428H04L45/16
Inventor 洪超匡晓云张宇南戴涛杜金燃
Owner ELECTRIC POWER RESEARCH INSTITUTE, CHINA SOUTHERN POWER GRID CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products