Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key distribution and reconstruction method and device based on mobile internet

A technology for key distribution and mobile interconnection, which is applied in security devices, electrical components, wireless communication, etc., and can solve problems such as implementation in an interconnected environment.

Inactive Publication Date: 2015-07-01
HENAN NORMAL UNIV
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In response to the above problems, this patent has carried out theoretical and methodological research in the following aspects: combining game theory, information theory, and cryptographic algorithms, on the basis of mobile Internet communication networks, it aims at anti-collusion methods for rational key sharing protocols, network communication methods, and key encapsulation mechanisms To study and improve key theories such as ciphers, design a computable anti-collusion equilibrium method, construct an anti-collusion game model of the protocol, and prevent participants from colluding to attack; construct a communication game model of a cryptographic protocol, and make up for the fact that the cryptographic protocol constructed under the broadcast communication network cannot be used in mobile networks. Due to the defects in the implementation of the Internet environment, the present invention provides a method and device for key distribution and reconstruction based on the mobile Internet, researches the key encapsulation mechanism suitable for verifiable random functions, and designs rational keys that do not require public key infrastructure Share the protocol to ensure the fairness and delivery of computing in the mobile Internet environment; finally, use the provable security theory to analyze and prove the security of the protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key distribution and reconstruction method and device based on mobile internet
  • Key distribution and reconstruction method and device based on mobile internet
  • Key distribution and reconstruction method and device based on mobile internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0090] The principle of the present invention is as follows,

[0091]With the increasing proportion of the application of mobile Internet and cryptographic protocols in national production and life, the research of this program will greatly improve the security and usability of mobile Internet, which can be used to solve the problem of encryption in the mobile Internet environment. It provides a new solution to the key sharing problem, provides a theoretical and technical basis for enriching and improving rational cryptographic protocols, and has a far-reaching impact on national economic and social development. The network topology of the rational key sharing scheme in the mobile Internet environment is as follows: figure 1 shown.

[0092] This patent first studies the identity-based key encapsulation mechanism suitable for verifiable random functions, and designs a rational key sharing protocol that does not require public key infrastructure, so that the technical solution ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a key distribution and reconstruction method based on the mobile internet. The method includes the steps of S1, constructing an identity-based key packaging model and a verifiable random function; S2, distributing keys; S3, reconstructing the keys. A calculable collusion-proof equilibrium method is designed, a protocol collusion-proof game-with-entropy model is constructed, and thus collusive attack of participants is prevented; a cryptographic protocol communication game model is constructed, and the defect that password protocols constructed in the broadcast communication network are unable to be implemented in the mobile internet is overcome; the key packaging mechanism applicable to the verifiable random function is studied, the rational key sharing protocol requiring no pubic key infrastructure is designed, and calculation fairness and delivery in the mobile internet is guaranteed; finally, the protocol is subjected to security analysis and proving through the theory of provable security.

Description

technical field [0001] The present invention relates to the technical field of mobile Internet security, in particular to a method and device for key distribution and reconstruction based on mobile Internet Background technique [0002] Key sharing is an important research content in the field of network security, and it is also the cornerstone of many security protocols. In classical key sharing protocols, it is assumed that some participants are honest and others are malicious. The honest person always abides by the agreement, and the malicious person can deviate from the agreement at will. In reality, it is very dangerous to base the security of a protocol on assuming and relying on someone to be honest. Common sense tells us that even people who are considered honest by ordinary people will cheat, and even conspire with others to cheat. There are two types of classic key sharing algorithms, under certain conditions, one is a scheme involving trusted parties. The othe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/0431
CPCH04W12/04
Inventor 张恩刘亚鹏孙林王英杰朱文焌代丽萍张淑堃彭杰
Owner HENAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products