Unlock instant, AI-driven research and patent intelligence for your innovation.

Combined key managing method and system based on ID

A combination key and management method technology, which is applied in the field of identification-based combination key management method and system, and can solve problems affecting system security, etc.

Inactive Publication Date: 2010-05-12
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The disadvantage of adopting the above scheme is that there is a key management center in this scheme. The key management center is responsible for generating and keeping all the secrets of the system. All power is concentrated in the key management center. Once there is a security problem in the key management center, the will affect the security of the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined key managing method and system based on ID
  • Combined key managing method and system based on ID
  • Combined key managing method and system based on ID

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0116] Such as figure 2 As shown in , it is a schematic structural diagram of an identity-based combined key management system. As shown in the figure, the system at least includes: a key factor matrix parameter control device 201, a plurality of key factor generation devices 202 and at least one key distribution device 203; and the key factor matrix parameter control device 201, a plurality of The key factor generation device 202 and at least one key distribution device 203 are connected to each other; wherein,

[0117] Such as figure 2 As shown, there are N key factor generating devices in this embodiment, and the number N≥2.

[0118] Refer to attached figure 2 The identification-based combined key management method in the above system will be described in detail.

[0119] The realization of the system mainly includes the following processes: system initialization, distribution of private key, calculation of public key.

[0120] 1. First perform system initialization...

Embodiment 2

[0154] In order to improve the reliability of the system, the chain backup mechanism of the key factor generation device can be adopted. The processing flow of this method is as follows: Figure 6 shown.

[0155] 1. When performing system initialization, steps are also included:

[0156] There are N key factor generators 202 in the system, and they are respectively denoted as SKG 1 , SKG 2 ,...,SKG N ; The key factor generating device 202 divides the private key factor matrix into N parts, which are respectively denoted as SKM 1 ,SKM 2 ,...,SKM N ;

[0157] The key factor matrix parameter control device 201 specifies the private key factor sub-matrix SKM i (1≤i≤N) by the key factor generator SKG i generate and store;

[0158] Calculate the backup parameter b=[(i+g)modN+1] (wherein 1≤i≤N, 0≤gb The private key factor matrix SKM b Sent to SKG confidentially i (1≤i≤N) for storage; where I, g, N are integers.

[0159] By means of chain backup, it can be ensured that the...

Embodiment 3

[0174] Such as figure 2 As shown in , it is a schematic structural diagram of an identity-based combined key management system. As shown in the figure, the system at least includes: a key factor matrix parameter control device 201, a plurality of key factor generation devices 202 and at least one key distribution device 203; and the key factor matrix parameter control device 201, a plurality of The key factor generation device 202 and at least one key distribution device 203 are connected to each other; wherein,

[0175] The key factor matrix parameter control device 201 is used to generate and store public parameters, and generate key factor matrix division parameters; receive the public key factor matrix sent by the key factor generation device 202;

[0176] The key factor generating device 202 receives the key factor matrix division parameter, and divides the key factor matrix into a plurality of key factor sub-matrices according to the division parameter, and saves the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an ID-based combined secret key management method and system. And the method comprises the steps of: according to secret key factor dividing parameters generated by secret key factor matrix parameter control device, dividing a secret key factor matrix into plural secret key factor submatrixes and storing private key factor submatrixes in these secret key factor submatrixes by plural secret key factor generator; the secret key factor generator calculates private key factor components according to row-column mark mapping combination corresponding to the ID and sends the private key factor component to a secret key distributor; the secret key distributor calculates corresponding private keys according to all the received private key factor components corresponding to the ID. And it can discretely generate and keep private key factor matrixes and avoids right misusage; all secret key factor generators keep their respective secrets, enhancing system security and reliability; and it can implement large-scale secret key management.

Description

technical field [0001] The invention relates to key management technology, in particular to an identification-based combined key management method and system. Background technique [0002] The security of modern cryptography is based on key secrecy rather than algorithm secrecy, so key management and protection become the key to information secrecy. Public key cryptography was developed in the process of trying to solve the key distribution and digital signatures faced in cryptography. Its appearance is a major leap in the entire history of cryptography development. [0003] In 1976, W.Diffie and M.Hellman proposed the idea of ​​public encryption system. The main feature of this system is to use two keys to separate encryption and decryption, one of which is published to the public as the encryption key; the other is dedicated to the user as the decryption key. Conduct confidential communications. It is computationally infeasible to analyze the plaintext or private key fr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/12H04L9/30
Inventor 李春强
Owner HUAWEI TECH CO LTD