Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for secret key configuration based on specified group

A group and key technology, which is applied in the field of communication, can solve the problems of increasing the amount of calculation, and achieve the effects of reducing the workload of calculation, simplifying the packaging process, and achieving obvious effects

Inactive Publication Date: 2008-04-30
HUAWEI TECH CO LTD +1
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0025] The disadvantage of the method in the above prior art is: at the sending end, the sender needs to generate a ciphertext for each group member, so the calculation amount of the sender increases linearly with the increase of the number of group members
In addition, the security of this scheme is based on the random oracle model, so its security requires additional conditions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for secret key configuration based on specified group
  • Method for secret key configuration based on specified group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The present invention provides a method for configuring keys for designated groups. The main technical features of the present invention are as follows: a shared key is configured for designated groups, the sender generates two ciphertexts for designated groups, and the session encryption The key package is sent to group members in these two ciphertexts. The group members directly obtain the session key encapsulated in the ciphertext through bilinear operation.

[0069] Describe the present invention in detail below in conjunction with accompanying drawing, the present invention provides two embodiments of the method of the present invention, the processing flow of embodiment 1 is as follows figure 1 shown, including the following steps:

[0070] Step 1-1. Select the private key of the system, and generate two public keys of the system according to the private key.

[0071] Firstly, initialize the private key and public key of the system.

[0072] Select two suitable...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key configuration method to a designated group. The method mainly comprises that the designated group is configured with a shared public key to obtain the private key of each member in the designated group, and sends the private keys to the corresponding group member. The adoption of the method of the invention is able to efficiently decrease the workload of both a sender and a receiver, and also carry out the key packages to all the group members.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for configuring keys for a specified group. Background technique [0002] Group communication (also called multi-party communication) refers to a communication scenario involving two or more members. Group communication generally has multiple data receivers and one or more data senders. In communication, unicast technology or multicast technology may be used to send messages. [0003] Group communication is an important communication method in a distributed network. How to safely and reliably send information to a designated group and enable all members in the group to receive information independently is a key issue in group communication. [0004] For example, a service provider wants to deliver multimedia streams to its users through the network. In this application scenario, all users of the service provider form a group, and a one-to-one relationship is formed between the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04Q7/28
Inventor 马春波李建华吴越刘亚
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products