Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Unicast secret communication method and multicast secret communication method based on identity

A technology for confidential communication and identity information, applied in key distribution, it can solve problems such as complex key management, and achieve the effect of simple key management and ensuring privacy and security.

Inactive Publication Date: 2013-09-11
顾纯祥
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an identity-based unicast secure communication method and a multicast secure communication method to solve the current problem of using public key cryptography technology that relies on PKI / CA (Public Key Infrastructure / Certificate Authority) public key infrastructure to achieve security. Communication complicates key management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Unicast secret communication method and multicast secret communication method based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0024] The invention proposes an identity-based unicast secure communication method and a multicast secure communication method, and uses identity-based passwords to ensure the privacy and security of legal user operations. Different from the traditional PKI / CA technical mechanism, in the identity-based cryptographic system, the user's public identity information (such as e-mail address, IP address, name, etc.) is used as the public key part of the user's public key / private key pair. Private keys are generated by a trusted third party called a Private Key Generator (PKG). An identity-based cryptosystem such as figure 1 As shown, it consists of a security center and user groups. The security center provides key management services to users. Users use secure cryptographic algorithms to implement cryptographic operations and processing such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a unicast secret communication method and a multicast secret communication method based on identity, and belongs to the field of communication and information security technologies. Security communication channels are established based on identity cryptography, and privacy and security of legal user operation are guaranteed. Key management is easy, a system key management center only needs to be responsible for creating distributing a private key to each user and manages a master key of the security center and a set of common parameter files, identity is taken as an identification key to be packaged, and secret communication based on the cryptology can be realized as long as identity labels of the others are acquired.

Description

technical field [0001] The invention relates to an identity-based unicast secure communication method and a multicast secure communication method, belonging to the technical field of communication and information security. Background technique [0002] Today, with the rapid development of network technology, communication encryption is an important means to achieve information security. Traditional security methods usually use public key cryptography to achieve authentication and secure channel establishment, but this type of system relies on PKI / CA (Public Key Infrastructure / Certificate Authority) public key infrastructure, which has the advantages of high security, but there are also key Management is complicated and so on. [0003] In order to simplify the key management problem of the traditional public key system, Shamir proposed the idea of ​​IBC (Identity Based Cryptography) based on identity cipher in 1984: public user identity information (such as e-mail address, I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/14H04L29/06
Inventor 顾纯祥王永生费金龙郑永辉
Owner 顾纯祥
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products