Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authenticable asymmetrical group secret key negotiation method in mobile unbalanced network

An unbalanced network and secret key negotiation technology, which is applied in the field of secure group secret key negotiation schemes and certifiable asymmetric group secret key negotiation schemes, and can solve problems such as large amount of calculation and unsuitable communication

Active Publication Date: 2014-05-14
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the fact that the group secret key negotiation currently studied has a large amount of calculation and communication, it is not suitable for energy-constrained mobile unbalanced network environments. In the existing technology, there is no possible solution for mobile unbalanced network environments Authenticated Asymmetric Group Key Agreement Scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticable asymmetrical group secret key negotiation method in mobile unbalanced network
  • Authenticable asymmetrical group secret key negotiation method in mobile unbalanced network
  • Authenticable asymmetrical group secret key negotiation method in mobile unbalanced network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In this embodiment, the unbalanced mobile network consists of a high-energy node and multiple low-energy nodes, such as figure 1 shown. The resources of low-energy nodes are limited, and the amount of calculation and communication should be reduced as little as possible. High-energy nodes have more resources, and they share as much computing and communication traffic as possible for low-energy nodes. Group key negotiation can be divided into two stages: one is identity authentication before negotiation, and the other is group key negotiation.

[0066] Such as figure 2 As shown, this embodiment implements the authentication of the asymmetric group key negotiation in the mobile unbalanced network according to the following steps.

[0067] 1. Signature and authentication of group members

[0068] A) Initialize the system

[0069] Suppose the group has 8 members U i (1≤i≤8), where U 8 is a high-energy node, and pk i (pk i =sk i g 1 ) is a group member U i (1≤...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an authenticable asymmetrical group secret key negotiation scheme in a mobile unbalanced network. The scheme comprises the steps that signature and authentication of group members are carried out, group members negotiate an asymmetrical shared secret key, and consistency verification of the shared secret key is carried out. According to the signature and authentication, a short signature mechanism of mobile equipment in a network is achieved by adopting a bilinear mapping technology, and members of mobile groups provide identify authentication by using the signature before the group secret key is negotiated to defense active attack of adversaries. According to step that the group members negotiate the asymmetrical shared secret key, all mobile equipment in the mobile unbalanced network negotiates a pair of asymmetrical group communication encryption / decryption secret keys, and members outside the group can send secret messages to members inside the group by encrypting the secret messages through a public key without the necessary of joining the group. According to the consistency verification of the shared secret key, after the group members negotiate the group secret key, the accuracy and the consistency of the calculated group secret key can be guaranteed. According to the authenticable asymmetrical group secret key negotiation scheme in the mobile unbalanced network, when secret communication is carried out among mobile group equipment in the mobile network environment, safe communication among the group equipment can be guaranteed, energy consumption of calculation and communication is quite low, and good flexibility, safety and practicability are achieved.

Description

technical field [0001] The invention relates to a security group secret key negotiation scheme in a mobile network environment, in particular to an authenticated asymmetric group secret key negotiation scheme in a mobile unbalanced network environment, and belongs to the field of network communication security. Background technique [0002] Many complex cryptographic system designs rely on the existing secret channel between multiple communication parties. The main purpose of the group key agreement (group key agreement, GKA) protocol design is to provide two or more group members with a secure Secret channels are widely used in the fields of collaborative computing and distributed computing, such as multi-party secure computing, file sharing and distribution, video conferencing and group chat systems. Simply put, the GKA protocol is for group members to communicate in an open network environment. Exchange information and negotiate to calculate a common key, which is used as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04
Inventor 张启坤甘勇段赵磊王锐芳蔡增玉
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products