Combined key managing method and system based on ID
A combination key and management method technology, which is applied in the field of identification-based combination key management method and system, and can solve problems affecting system security, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0116] Such as figure 2 As shown in , it is a schematic structural diagram of an identity-based combined key management system. As shown in the figure, the system at least includes: a key factor matrix parameter control device 201, a plurality of key factor generation devices 202 and at least one key distribution device 203; and the key factor matrix parameter control device 201, a plurality of The key factor generation device 202 and at least one key distribution device 203 are connected to each other; wherein,
[0117] Such as figure 2 As shown, there are N key factor generating devices in this embodiment, and the number N≥2.
[0118] Refer to attached figure 2 The identification-based combined key management method in the above system will be described in detail.
[0119] The realization of the system mainly includes the following processes: system initialization, distribution of private key, calculation of public key.
[0120] 1. First perform system initialization...
Embodiment 2
[0154] In order to improve the reliability of the system, the chain backup mechanism of the key factor generation device can be adopted. The processing flow of this method is as follows: Figure 6 shown.
[0155] 1. When performing system initialization, steps are also included:
[0156] There are N key factor generators 202 in the system, and they are respectively denoted as SKG 1 , SKG 2 ,...,SKG N ; The key factor generating device 202 divides the private key factor matrix into N parts, which are respectively denoted as SKM 1 ,SKM 2 ,...,SKM N ;
[0157] The key factor matrix parameter control device 201 specifies the private key factor sub-matrix SKM i (1≤i≤N) by the key factor generator SKG i generate and store;
[0158] Calculate the backup parameter b=[(i+g)modN+1] (wherein 1≤i≤N, 0≤gb The private key factor matrix SKM b Sent to SKG confidentially i (1≤i≤N) for storage; where I, g, N are integers.
[0159] By means of chain backup, it can be ensured that the...
Embodiment 3
[0174] Such as figure 2 As shown in , it is a schematic structural diagram of an identity-based combined key management system. As shown in the figure, the system at least includes: a key factor matrix parameter control device 201, a plurality of key factor generation devices 202 and at least one key distribution device 203; and the key factor matrix parameter control device 201, a plurality of The key factor generation device 202 and at least one key distribution device 203 are connected to each other; wherein,
[0175] The key factor matrix parameter control device 201 is used to generate and store public parameters, and generate key factor matrix division parameters; receive the public key factor matrix sent by the key factor generation device 202;
[0176] The key factor generating device 202 receives the key factor matrix division parameter, and divides the key factor matrix into a plurality of key factor sub-matrices according to the division parameter, and saves the p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 