Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for distributing key

A technology of key distribution and key distribution center, which is applied in the field of key distribution based on key distribution center, can solve the problems of forward secrecy without key perfection, large security risks, threats to system security, etc., and achieve perfection The effect of forward secrecy

Active Publication Date: 2008-10-08
CHINA IWNCOMM
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Due to the participation of the key distribution center or key transfer center, each pair of entities can use a fresh communication key each time they communicate, but each user needs to save a shared key with the key distribution center or key transfer center. The secret management key is used for a long time, and for the key distribution center and the key transfer center, it not only needs to store a huge number of secret management keys, but also bears a large security risk, because once there is a problem, it will directly Threat to the security of the entire system, and none of the above-mentioned key distribution methods has the perfect forward secrecy PFS (Perfect Forward Secrecy) of the key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for distributing key
  • Method for distributing key
  • Method for distributing key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] Here, four embodiments of a key distribution method of the present invention are given.

[0048] see Figure 5 , the specific steps of Embodiment 1 of the present invention are as follows:

[0049] When the first entity A and the second entity B need to communicate securely, they apply to the key distribution center for a communication session key. The first entity A generates a pair of temporary public-private key pair a and Pa, and sends a key request message to the key distribution center, which contains the temporary public key Pa, and the key distribution center receives the key request from the first entity A After the message, the communication session key k between the first entity A and the second entity B is generated, and the key distribution center uses A’s temporary public key Pa to encrypt k, and then forms a key response message and returns it to the first entity A. After an entity A receives the key response message, it uses the temporary private key a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a key distribution method which comprises the following steps: 1) respectively generating a pair of temporary public / private key pair by a first entity and a second entity which requires communication; and 2) through the public / private key pairs respectively generated by the first entity and the second entity, applying to a key distribution center to obtain a communication conversation key. The invention is based on a ternary equal identification (TePA) and adopts a public key cryptographic technique for distributing key to the entity which needs communication through the key distribution center KDC. The safe distribution and dynamic upgrading of the communication key are realized. A perfect forward security PFS is furthermore provided. The method settles the problems of considerable keys managed in the key distribution center, long storing period of the key by the user and no forward security of the communication key in the traditional method. The invention can be applied for the mobile communication network system and other communication system.

Description

technical field [0001] The invention relates to a key distribution method, in particular to a key distribution method based on a key distribution center. Background technique [0002] When secure communication is required between communication network entities, key management is one of the key technologies. Sharing a key per pair of users is possible in small networks, but is not feasible in larger networks. In a system with N users, in order to realize secure communication between any two users, N(N-1) / 2 keys need to be generated and distributed to ensure secure communication between any two users in the network. As the scale of the system increases, the complexity increases dramatically. For a network where N is 1000, about 500,000 keys are needed for distribution, storage, etc. In order to reduce complexity, a centralized key management method is usually adopted, which is implemented by a trusted online server as the key distribution center KDC (Key Distribution Center)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/30
CPCH04L9/0891H04L9/083H04L9/30H04L9/321H04L2209/80
Inventor 铁满霞曹军赖晓龙黄振海
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products