A Privacy-Preserving Hierarchical Dynamic Group Key Agreement Method

A technology for group key negotiation and privacy protection, applied in the field of hierarchical dynamic group key negotiation based on privacy protection, which can solve the problems of exposing personal identity information, reducing computing and communication overhead, and being unable to flexibly protect sensitive data. , to protect personal privacy, improve security, and ensure reliability.

Active Publication Date: 2022-07-15
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the technical problems that personal identity information is easily exposed and sensitive data cannot be flexibly protected during the identity authentication process of the existing group key agreement method, the present invention proposes a layered dynamic group key agreement method based on privacy protection, The identity authentication technology using hidden attributes realizes identity authentication in the identity authentication process of group key negotiation while protecting personal privacy well, and at the same time reduces the calculation and communication overhead of each participant, using identity authentication and attributes Authorization parameters match, avoiding collusion attacks by terminals without authorization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Privacy-Preserving Hierarchical Dynamic Group Key Agreement Method
  • A Privacy-Preserving Hierarchical Dynamic Group Key Agreement Method
  • A Privacy-Preserving Hierarchical Dynamic Group Key Agreement Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0081] In the case of complex multi-party communication, the authentication center CA in the group needs to authenticate the terminal members of the communication, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, it is necessary to protect the privacy of personal identity when communicating entities are authenticated by multiple parties. When information is shared, the confidentiality, integrity and anti-leakage of communication information should also be guaranteed, and members who comply with the permission policy are required to communicate. In view of this application background, the present invention provides a layered dynamic group key negotiation method based on privacy protection, such as figure 1 The steps are as follows: ① the terminal members participating in the group key negotiation first perform parameter initialization to generate their respective public / private key pairs; ② the terminal members ...

Embodiment 2

[0126] A privacy-preserving hierarchical dynamic group key agreement method, such as figure 1 As shown, in order to illustrate the content and implementation method of the present invention, a specific embodiment is given. In this embodiment, for the convenience of illustration, a three-layer group is set for group key negotiation, each group has 10 members, and the entity set of these 10 members is represented as S={S 1 ,S 2 ,…,S 10 },S 1 ={u 1,1 ,u 1,2 ,…,u 1,10 },S 2 ={u 2,1 ,u 2,2 ,…,u2,10 }, S 3 ={u 3,1 ,u 3,2 ,…,u 3,10 }, the entity set of terminal members is expressed as The identity set of the corresponding group members is expressed as The certification center CA defines the attribute set of all terminal members as ATTR={A 1 ,A 2 ,A 3 }, the ordered attribute set corresponding to the group members is The purpose of introducing details in this embodiment is not to limit the scope of the claims, but to help understand the specific implementation met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention proposes a layered dynamic group key negotiation method based on privacy protection. The steps are: initializing the protocol parameters in the group key negotiation network domain, generating public / private key pairs of the authentication center and terminal members, Terminal members perform identity authentication of hidden attributes. After successful authentication, terminal members calculate encryption keys and decryption keys according to their own attribute weights to verify the consistency of the keys. Terminal members can also apply to the authentication center to change attributes to participate in High-level or low-level group key negotiation. The invention adopts the identity authentication technology of hidden attributes, which can avoid the leakage of personal privacy information while performing identity authentication, and set threshold authority according to the attribute weight value, participate in group communication with different confidentiality, and improve the reliability of data communication. The dual authentication mechanism of identity authentication and attribute weight matching greatly improves the security of the system and makes group key negotiation more flexible, efficient and practical.

Description

technical field [0001] The present invention relates to the technical field of information security, and in particular, to a method for layered dynamic group key negotiation based on privacy protection. Background technique [0002] With the continuous in-depth development of technologies such as big data, artificial intelligence and the Internet of Things, it has provided convenience for people's daily life and provided impetus for the development of the country and society. The core of these technologies is secure resource sharing, information exchange and transmission among multi-party entities. At the same time, the exchange and processing of a large amount of data also brings a series of security risks. How to ensure that the data is not leaked when a large amount of data is exchanged, and how to ensure that the identity information of the communication entity is not leaked, which brings forward the information security technology. a huge challenge. [0003] As a link...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0838H04L9/0861H04L9/3247
Inventor 刘书如朱亮张平原高歌王锐芳袁俊岭李健勇张启坤
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products