Hierarchical dynamic group key negotiation method based on privacy protection

A technology for group key negotiation and privacy protection, applied in the field of hierarchical dynamic group key negotiation based on privacy protection, which can solve problems such as reducing computing and communication overhead, exposing personal identity information, and inability to flexibly protect sensitive data. , to achieve the effect of improving security, protecting personal privacy, and ensuring reliability

Active Publication Date: 2021-09-03
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the technical problems that personal identity information is easily exposed and sensitive data cannot be flexibly protected during the identity authentication process of the existing group key agreement method, the present invention proposes a layered dynamic group key agreement method based on privacy protection, The identity authentication technology using hidd

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical dynamic group key negotiation method based on privacy protection
  • Hierarchical dynamic group key negotiation method based on privacy protection
  • Hierarchical dynamic group key negotiation method based on privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] In the case of complex multi-party communication, the authentication center CA in the group needs to authenticate the terminal members of the communication, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, while communicating entities with multi-party authentication, it is necessary to protect the privacy of personal identities. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only members who comply with the authority policy can communicate. Aiming at this application background, the present invention provides a hierarchical dynamic group key agreement method based on privacy protection, such as figure 1 As shown, the steps are as follows: ① The terminal members participating in the group key negotiation first perform parameter initialization and generate their own public / private key pairs respectively; ② The hi...

Embodiment 2

[0126] A privacy-preserving hierarchical dynamic group key agreement method, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is provided. In this embodiment, for the convenience of example description, a 3-layer group is set up for group key negotiation, each group has 10 members, and the entity set of these 10 members is expressed as S={S 1 ,S 2 ,...,S 10},S 1 ={u 1,1 , u 1,2 ,...,u 1,10},S 2 ={u 2,1 , u 2,2 ,...,u2,10}, S 3 ={u 3,1 , u 3,2 ,...,u 3,10}, the entity set of terminal members is expressed as The identity set of corresponding group members is expressed as The authentication center CA defines the attribute set of all terminal members as ATTR={A 1 ,A 2 ,A 3}, the ordered attribute set corresponding to group members is The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help understand the specific implementati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a hierarchical dynamic group key negotiation method based on privacy protection, which comprises the following steps of: initializing protocol parameters in a group key agreement network domain, generating public/private key pairs of an authentication center and terminal members, performing identity authentication of hidden attributes by the terminal members, and after the authentication is successful, carrying out group key agreement on the terminal members. The terminal member calculates an encryption key and a decryption key according to the attribute weight of the terminal member, verifies the consistency of the keys, and can also apply for attribute change from the authentication center to participate in group key negotiation of a high layer or a low layer. According to the method, the identity authentication technology with hidden attributes is adopted, leakage of personal privacy information can be avoided during identity authentication. Meanwhile, the threshold permission is set according to the attribute weights, group communication is participated in with different confidentialities, the reliability of data communication is improved, and a double-authentication mechanism of identity authentication and attribute weight matching is adopted, so that the reliability of data communication is improved. The safety of the system is improved to a great extent, and the group key negotiation is more flexible, efficient and practical.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a privacy protection-based layered dynamic group key negotiation method. Background technique [0002] With the continuous and in-depth development of technologies such as big data, artificial intelligence and the Internet of Things, it provides convenience for people's daily life and provides impetus for the development of the country and society. The core of these technologies is secure resource sharing, information exchange and transmission among multi-party entities. At the same time, the exchange and processing of a large amount of data has also brought a series of security risks. How to ensure that the data is not leaked during the exchange of a large amount of data, and how to ensure that the identity information of the communication entity is not leaked, this poses a challenge to information security technology. a huge challenge. [0003] As a link, the Int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0838H04L9/0861H04L9/3247
Inventor 刘书如朱亮张平原高歌王锐芳袁俊岭李健勇张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products