Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Distributed group key management scheme for secure many-to-many communication

A technology of secure communication and key management system, applied in the field of secure communication systems, and can solve problems such as fragility

Inactive Publication Date: 2002-08-07
PANASONIC CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While this protocol works in principle, it is vulnerable in the case of members colluding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed group key management scheme for secure many-to-many communication
  • Distributed group key management scheme for secure many-to-many communication
  • Distributed group key management scheme for secure many-to-many communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] refer to figure 1 , which illustrates a scalable secure multicast protocol supporting many-to-many communications based on the principles of the present invention. An embodiment of the present invention is a communication system 20 that uses a distribution tree-based key management scheme (DTKM) for secure many-to-many packet communication. System 20 is scalable and members 22 are trusted equally. System 20 equally distributes group control responsibilities and key distribution tasks among members.

[0022] Each member 22 is assigned a binary ID and these IDs are used to define key associations for each member 22 . Members of the key association group 22a contact each other to report membership changes and exchange keys. Members 22 are equally trusted and can all be senders. Prospective members can contact any active member to join the group. The active member verifies the new member's certificate and assigns it a unique binary ID 24 . ID assignment is done locall...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A group key management system and method for providing secure many-to-many communication is presented. The system employs a binary distribution tree structure. The binary tree includes a first internal node having a first branch and a second branch depending therefrom. Each of the branches includes a first member assigned to a corresponding leaf node. The first member has a unique binary ID that is associated with the corresponding leaf node to which the first member is assigned. A first secret key of the first member is operable for encrypting data to be sent to other members. The first member is associated with a key association group that is comprised of other members. The other members have blinded keys. A blinded key derived from the first secret key of the first member is transmitted to the key association group. Wherein, the first member uses the blinded keys received from the key association group and the first secret key to calculate an unblinded key of the first internal node. The unblinded key is used for encrypting data that is communicated between members located on branches depending from the first internal node.

Description

[0001] Cross References to Intersecting Applications [0002] This patent application claims filing date priority to US Provisional Patent Application No. 60 / 142,490, filed July 6, 1999. technical field [0003] The present invention relates to secure communications. More specifically, the present invention relates to systems that provide secure communications between multiple senders and multiple members. Background technique [0004] Secure multicasting over networks such as the Internet is used for applications such as stock ticker distribution, private conferences, and distributed interactive simulations. Some of these applications have a single sender that sends confidential data to a large number of users, while other applications have a large number of users that communicate privately with each other. Several schemes have been proposed recently to support packet communication between a sender and multiple members. Some solutions for secure communication between mul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38H04L9/08H04L12/18H04L29/06
CPCG06Q20/3829H04L9/0822H04L63/0823H04L63/065H04L63/064H04L9/0891H04L63/0428H04L63/0442H04L2209/046H04L63/104H04L12/18H04L9/0836H04L9/08
Inventor 拉克斯米纳斯·R·东戴提萨里特·穆克黑吉阿谢克·塞默尔
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products