Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for asymmetric group key agreement protocol between multiple domains under mobile cloud computing

A group key agreement and group key technology, applied in the field of multi-domain asymmetric group key agreement protocol under mobile cloud computing, can solve the problems of multi-domain authentication, anonymity and traceability. Issues such as precedents

Active Publication Date: 2016-09-14
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there have been some researches on group key agreement, how to realize multi-domain group key agreement in the mobile cloud computing environment, including inter-domain authentication, anonymity, There is no precedent for work on traceability, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for asymmetric group key agreement protocol between multiple domains under mobile cloud computing
  • Method for asymmetric group key agreement protocol between multiple domains under mobile cloud computing
  • Method for asymmetric group key agreement protocol between multiple domains under mobile cloud computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] In this embodiment, the mobile cloud computing network includes multiple domains, and the members participating in the group key negotiation may come from different domains, such as figure 1 shown. Members of each domain in the group pass the key parameters on the open channel, and each member obtains the group encryption key and the group decryption key through calculation after receiving the key parameters. Group key negotiation can be divided into two stages: one is identity authentication before negotiation, and the other is group key negotiation. Suppose the mobile cloud network contains R domains, and the domain name is D j (1≤j≤R), the number of members participating in the key agreement in the domain is at most n, and the entity set of members is expressed as U j ={u j,1 , u j,2 ,...,u j,n}, and the identity set of the corresponding group members is expressed as

[0041] 1. The present invention is based on bilinear mapping, and its theoretical basis is ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-inter-domain asymmetric group key agreement protocol method under the mobile cloud computing network environment. The method comprises the following steps: adopting a bilinear mapping technology and a blind secret key technology to realize a short signature mechanism between a domain secret key management center and a domain terminal; using a short signature technology to realize a multi-inter-domain group key agreement authentication mechanism of terminals distributed in different domains, and further realize asymmetric group key agreement of the terminals distributed in multiple domains. The protocol method disclosed by the invention has the anonymity and the authentication, supports dynamic group key updating of nodes, and realizes the security of forward confidentiality and backward confidentiality of the group keys; on the hypothesis of the Diffe-Hellman bilinear computing problem, the security of the protocol is proved; the computing and communication energy consumption of the protocol is low; the method is good in flexibility, security and practicability, and suitable for cross-domain group key agreement of the terminals distributed in the multiple domains under the mobile cloud computing network environment.

Description

technical field [0001] The invention relates to the technical field of group key agreement for confidential or secure communication, in particular to a method for an asymmetric group key agreement protocol between multiple domains under mobile cloud computing, which is applied to the fields of network security technology and encryption technology. Background technique [0002] Mobile cloud computing (Mobile Cloud Computing, MCC) is the product of the rapid development of mobile distributed computing, and can also be regarded as the information technology of the integration of mobile Internet and cloud computing. It integrates the advantages of mobile computing, mobile network and cloud computing. Mobile cloud computing enables the client to break through the hardware limitation, obtain the services it needs conveniently and quickly, access the same data source or relationship source through mobile phones, PCs and other terminals, and expand the friend relationship from PC to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/08
Inventor 张启坤李建春苏晓珂尤磊刘书如王锐芳尹毅峰甘勇
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products