Unlock instant, AI-driven research and patent intelligence for your innovation.

Trust management method based on distributed secret sharing in large-scale Internet of Things scene

A technology of secret sharing and trust management, which is applied in the field of trust management based on distributed secret sharing, which can solve the problems of increased security maintenance costs, inability of participants to dynamically update effectively, high number of secret holders, etc., and achieve the effect of eliminating dependence

Active Publication Date: 2021-01-29
UNIV OF SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Although the Shamir scheme can make the number of secret holders higher than the threshold, it relies on a trusted third party, which is equivalent to requiring additional equipment for assistance, and the equipment is more likely to become an attack target. With the establishment of a trusted third party , the c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust management method based on distributed secret sharing in large-scale Internet of Things scene
  • Trust management method based on distributed secret sharing in large-scale Internet of Things scene
  • Trust management method based on distributed secret sharing in large-scale Internet of Things scene

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only part of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0051] Such as figure 1 As shown, the present invention is a trust management method based on distributed secret sharing in a large-scale Internet of Things scenario. Initially there are n (n=t) participants with their own identities, they use Algorithm 1: initial parameter generation algorithm to jointly negotiate a secret s with a threshold of t and keep their own messages to restore the secret. Newly joined participants can use Algorithm 2: The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a trust management method based on distributed secret sharing in a large-scale Internet of Things scene, which comprises the following steps that: n participants with own identifiers are initialized on a network, n is equal to t, and the participants jointly negotiate a secret s with a threshold of t by using an initial parameter generation algorithm and reserve own messagesfor recovering the secret; when a new participant exists, the newly added participant selects t bits from the added participants to help to generate a message by using a participant adding algorithm,the secret s and the threshold t are not changed, and in order to prevent leakage, one disturbance needs to be negotiated between every two participants; and when the number of the participants is greater than t, the participants are allowed to exit by using the participant exit algorithm, and the message of each participant is changed after exit, but the secret s and the threshold t are kept unchanged, so that the exit person cannot recover s even if trying to participate in secret recovery.

Description

technical field [0001] The invention relates to the field of network and information security, in particular to a trust management method based on distributed secret sharing in a large-scale Internet of Things scene. Background technique [0002] In the large-scale Internet of Things, the computing resources and power consumption of nodes vary greatly, and their scale and complexity are relatively high. Therefore, the hierarchical mode is a more reasonable management method. In this mode, the status of each top management node is equal, and there is no online third-party manager. Therefore, it is necessary to design a trust management mechanism that does not rely on an online trusted third party, so that each top management node can work together in the Build trust with each other without the involvement of online third parties. [0003] 1) Shamir threshold secret sharing algorithm [0004] In the Shamir threshold secret sharing algorithm, there are n blocks in total. When...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/08
CPCH04L9/0838H04L9/085H04L9/0869H04L67/12
Inventor 苗付友周星灿于跃黄文超熊焰
Owner UNIV OF SCI & TECH OF CHINA