Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-party key agreement method based on self-certified public key

A technology of key agreement and public key, which is applied in the field of network security, can solve problems such as large amount of calculation and communication, key escrow, and non-central security, and achieve the effect of improving calculation amount and communication amount and reducing storage

Inactive Publication Date: 2010-05-05
XIDIAN UNIV
View PDF0 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the traditional network, the mobile ad hoc network has the characteristics of dynamic topology, limited node performance, distributed control, no center and poor security.
However, there are still the following problems in the application of two-party key agreement based on self-certified public keys in mobile ad-hoc networks: (1) There must be a central server in the network to generate self-certified public keys for users; (2) A secure channel is required to transmit secret information ; (3) The amount of calculation and communication is relatively large; (4) There is key escrow
Among them, the first two problems are unrealizable in mobile ad hoc networks, and the latter two problems are also unreasonable for such resource-constrained networks, so they need to be avoided as much as possible.
[0006] In the mobile ad hoc network, there is no method of session key agreement between the two parties based on the self-authenticated public key mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-party key agreement method based on self-certified public key
  • Two-party key agreement method based on self-certified public key
  • Two-party key agreement method based on self-certified public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] One, the applied mathematical theory of the present invention

[0031] (1) Elliptic Curve Cryptosystem ECC

[0032] Let p and q be large prime numbers, GF(q) is a finite field of order q, E is an elliptic curve on GF(q), E(GF(q)) is a cyclic group of order p formed by points on E, P∈ E(GF(q)) is the generator. For the definition of elliptic curve and the selection of security parameters, please refer to the literature: Don Johnson, Alfred Menezes and Scott Vanstone, The Elliptic Curve Digital Signature Algorithm (ECDSA), IJLS, vol.1 issue1 (2001), 36-63.

[0033] (2) Hash function

[0034] The Hash function is a function that transforms an input message of arbitrary length into an output message of fixed length, and this output is called the Hash value of the message. A secure Hash function should at least meet the following conditions: ①The input length is arbitrary; ②The output length is fixed, at least 128 bits long, so as to resist birthday attacks; ③For each giv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-party key agreement method based on a self-certified public key, mainly solving the complicated certificate management problem in the traditional PKI technology to realize the self-certified two-party key share and reduce the network resource expenses. The method comprises the following steps of: allocating shared keys to n virtual central nodes by utilizing a threshold cryptology; selecting an individual secret random number by one party of a session, calculating public parameters, sending the individual identity and the public parameters to a virtual center to apply an individual self-certified public key; selecting an individual secret random number by the other one party of the session, calculating public parameters, sending the individual identity and the public parameters to the virtual center to apply an individual self-certified public key; after mutually exchanging the self-certified public key, the identity and the public parameters by two parties of the session, respectively calculating the shared session key. In the invention, a light code ECC is used as a theoretical basis without the certificate management, the key escrow and the safe signal path, so that the man-in-the-middle attack can be resisted, and the invention is suitable for the mobile self-organization network safety communication with the limited resources.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to self-authentication public key and session key negotiation, specifically, a two-party key negotiation method based on self-authentication public key, which can provide communication network security and trust system establishment. Basic technical support, especially suitable for mobile ad hoc networks. Background technique [0002] Session key partitioning is one of the most important applications of public key cryptography. Using public key cryptography, Alice and Bob can negotiate session keys in an open network environment. [0003] There are currently three modes of public key cryptosystems that session key negotiation relies on: certificate-based, identity-based, and self-authenticated. The certificate-based model is based on the public key infrastructure (PKI), and there are complex certificate management problems. The identity-based mode directly uses the user's i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W84/18H04L9/30H04L29/06H04W12/0431
Inventor 吕锡香李晖张卫东
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products