Unlock instant, AI-driven research and patent intelligence for your innovation.

Key negotiation method and device, electronic equipment and storage medium

A key negotiation and private key technology, applied in the field of network technology and security, can solve problems such as hidden dangers in data access, and achieve the effect of improving security and increasing encryption and decryption rates.

Pending Publication Date: 2022-04-08
CHINA TELECOM CORP LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the field of data transmission, in order to ensure the safe transmission and access of data, the secret key management method is often used to set different access rights for the confidentiality of data. As long as the attributes of the decryptor meet the access policy, the data can be decrypted to avoid third-party Untrusted server threats, but the existing secret key management methods cannot meet the increasing data computing speed requirements. Edge computing is a distributed computing architecture that can be used on the network edge side of the data source to improve data processing data, but In edge computing, the data sharing party of one edge node may need to access the edge node data of another data sharing party, which may easily lead to hidden dangers in data access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key negotiation method and device, electronic equipment and storage medium
  • Key negotiation method and device, electronic equipment and storage medium
  • Key negotiation method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0041] The block diagrams shown in the drawings are merely functional entities and do not necessarily correspond to physically separate entities. That is, these functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and / or processor devices and / or microcontroller devices entity.

[0042] The flow charts shown ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secret key negotiation method and device, electronic equipment and a storage medium, and the method comprises the steps: generating a global public key and an attribute authority public key, and transmitting the global public key and the attribute authority public key to a first edge server, the first edge server generates a ciphertext from the to-be-transmitted data according to the global public key, the attribute authority public key and the first public key; updating a private key according to a pre-generated initial private key to obtain an attribute authority private key; and sending the attribute authority private key to the second edge server, so that the second edge server decrypts the ciphertext according to the attribute authority private key and the second private key to obtain a semi-decrypted ciphertext, and the target terminal decrypts the semi-decrypted ciphertext according to the first private key to obtain the to-be-transmitted data. According to the technical scheme provided by the embodiment of the invention, the encryption and decryption rate is improved through the edge server, and the security of the private key is ensured by updating the private key through multiple parties.

Description

technical field [0001] The present application relates to the field of network technology and security technology, in particular, to a secret key negotiation method, device, electronic equipment and storage medium. Background technique [0002] With the rapid development of Internet technology, the demand for information sharing in the network is also growing rapidly, and the increase in demand for information sharing has also driven the requirements for data calculation and processing speed, transmission speed and data transmission security in information sharing. improvement. [0003] In the field of data transmission, in order to ensure the safe transmission and access of data, the secret key management method is often used to set different access rights for the confidentiality of data. As long as the attributes of the decryptor meet the access policy, the data can be decrypted to avoid third-party Untrusted server threats, but the existing secret key management methods ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40H04L9/30H04L9/08
Inventor 李佳聪吕航王镇宇
Owner CHINA TELECOM CORP LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More