Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Large cluster safe real-time communication method executed by using elliptical curve

An elliptic curve, secure technology, applied in the direction of calculation using residual algorithm, public key for secure communication, calculation using non-number system representation, etc., can solve high signature/verification costs, multiple CPU cycles, CA paralysis, etc. question

Inactive Publication Date: 2009-07-22
SOUTHEAST UNIV
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are three main problems with public-key-based signatures compared to symmetric-key-based signatures: high signing / verification fees mean that public-key-based signatures require more CPU cycles than symmetric-key signatures; high storage The cost means that each recipient needs to store the information of all senders; when a new sender in the receiving group broadcasts signed information to the recipients, all the recipients will request the certificate authority ( CA) to verify the sender of the certificate, which will cause the CA to fail
Additionally, an attacker may sign messages with an unauthorized certificate, thus creating a denial of service attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Large cluster safe real-time communication method executed by using elliptical curve
  • Large cluster safe real-time communication method executed by using elliptical curve
  • Large cluster safe real-time communication method executed by using elliptical curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Such as figure 1 As shown in the schematic diagram of multicast group communication, the group management server is the security center of the entire system and a network entity trusted by both senders and receivers, responsible for the management and distribution of security materials.

[0037] A large cluster security real-time communication method using elliptic curves, the specific steps are as follows:

[0038] Step 1: Initialize the distribution group

[0039] (1) The group management server GCKS creates an elliptic curve T in the finite field P;

[0040] (2) Define two sets of prime numbers as the first set of prime numbers SINIT and the second set of prime numbers RINIT, and create the first set of prime numbers SEN init And put it into the first prime number set SINIT to create the second prime number REG init And put into the second prime number set RINIT;

[0041] (3) Take the first base point G from the elliptic curve T ks and the first private key k k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a method of using elliptical curve to perform large trunking safety real-time communication, belonging to the field of network real-time communication and including following steps: initializing a communication group, a register protocol, a group key management protocol, a re-registration protocol and a source authentication protocol. The communication group referred in this method is composed of a set of controllers / main servers, a receiver and a sender. The method is a new type which is designed based on the elliptical curve theory and used for the group key management and the source authentication protocol for the real-time communication, and supports the re-distribution of the key and the rescinding level process. In the level and the rescinding process, a group management server sends the key materials based on the elliptical curve to the sender and the receiver. In the next group key building process, the sender and the receiver can uses these key materials to build a shared group key without consulting with the group management server. This invention capable of saving the storage space is safer and with higher efficiency.

Description

technical field [0001] The invention relates to a safe real-time communication method, in particular to a large cluster safe real-time communication method using elliptic curves, and belongs to the field of network real-time communication. Background technique [0002] The need for real-time, dynamic large cluster secure communication is becoming more and more significant. There are two key security requirements that must be considered here: confidentiality and origin authentication requirements. Confidentiality means that group information can only be read by specific recipients, which requires the establishment of a shared group key between the sender and the recipient to encrypt and decrypt the transmitted content. The group key management process usually includes key generation, key distribution and key redistribution. Many schemes have been devised in the group key management process. [0003] The simplest solution is a "Simple Key Distribution Center (SKDC)". In th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08G06F7/72
Inventor 万长胜周侃胡爱群
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products