Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for upgrading secret key

A key update and key technology, applied in the field of communication network security, can solve the problems of relying on certificates, untimely key revocation, and heavy workload of certificate maintenance and management, and achieve the effect of enhancing security and improving convenience

Inactive Publication Date: 2013-09-25
ZTE CORP
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this solution is that it needs to rely on certificates; the workload of certificate maintenance and management is very heavy
The downside of this approach is that key revocation may not be timely and key revocation may be required before the additional date expires

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for upgrading secret key
  • Method and device for upgrading secret key
  • Method and device for upgrading secret key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In this embodiment, the user ID is defined as a fixed part and a variable part, and the revocation of the key is completed by changing the variable part of the user ID. The variable part is calculated by hashing the intermediate parameters and intercepted from the result of the hash operation according to the length of the variable part. The variable part can also be a random value intercepted according to the length of the variable part, or for The random value is hashed, and is intercepted from the result of the hash according to the length of the variable part.

[0058] Intermediate parameters include: random value, user auxiliary ID, and credentials.

[0059] The hash operation refers to calculation by using a hash function, for example, a message digest MD5 (Message Digest) or a secure hash algorithm (Secure Hash Algorithm, SHA-1).

[0060] After the user's key is revoked, the following mechanism is used to notify other users of the key revocation result.

[0061...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for upgrading a secret key. The method and device for upgrading the secret key includes the steps that in a cryptosystem (IBC) based on an identification, a secret key center enables a user identification used as a public key is arranged to be a fixed part and a variable part, and the variable part of the user identification is changed to conduct upgrading on the public key. The method and device for upgrading the secret key can effectively solve the problem that the secret key is revoked based on the cryptosystem on the identification, a user can timely conduct secret key revocation, service operators can conveniently conduct safety service, convenience is improved for the user, and the safety of the system is enhanced.

Description

technical field [0001] The invention relates to the field of communication network security, in particular to a method and device for updating a key. Background technique [0002] Identity based cryptography (IBC, Identity based Cryptography) uses an identity as a public key, where the identity can be a network address, an email address, an ID number, and the like. Compared with the traditional public key infrastructure (PKI, Public Key Infrastructure) system, IBC does not need to use digital certificates, which is easy to deploy and conducive to business development. [0003] Since keys may expire or be lost, a mechanism for key revocation is required. In the IBC-based system, "identity is the public key", which translates into revoking the identity. However, in a general sense, identification cannot be easily revoked, such as ID number, email address, etc. In the IBC system, it is necessary to provide a key revocation method, which can be realized through identity revoc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0847H04L9/083H04L9/0891H04L63/062H04L63/0823H04L63/0846
Inventor 韦银星张世伟周苏静吴强
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products