Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based secret key negotiation construction method and network platform

A key negotiation and construction method technology, which is applied to key distribution, can solve the problems of increasing the amount of calculation for users, the inability to calculate the session key, and the inability to set the session key, etc., to achieve simplified use and management, and high security Good results

Inactive Publication Date: 2017-10-10
NANJING UNIV OF SCI & TECH
View PDF8 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even if some past session keys are known, the adversary cannot use them to deduce current or future session keys
[0007] (2) Forward security (forward security): If the private keys of Alice and Bob are leaked, the session keys generated in the past cannot be recovered
[0010] (5) Key control: Neither Alice nor Bob can control the structure of the session key, that is to say, they cannot set the session key equal to the value they set in advance, nor can they predict the value of the session key
[0012] (1) Before using any public key, it is necessary to verify the validity of the public key certificate, which increases the amount of calculation for the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based secret key negotiation construction method and network platform
  • Identity-based secret key negotiation construction method and network platform
  • Identity-based secret key negotiation construction method and network platform

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0105] In this embodiment, the identity-based two-party key agreement protocol is implemented in the form of a website, and the security of the protocol is demonstrated on the website, as follows:

[0106] (1) A new identity-based two-party key agreement protocol.

[0107] The algorithm mainly involved in the protocol is an identity-based key agreement scheme. The identity-based key agreement scheme is composed of three stages: system establishment, key extraction (user's public and private keys), and key agreement. Based on Weilpairing.Electronics Letters, 2003,39(8):653-654.) The improvement of the identity-based key agreement scheme proposed, the schematic diagram of the identity-based key agreement system is shown in figure 1 , the specific steps of the whole process are as follows:

[0108] (1) System establishment: public system parameters: {G 1 ,G T ,p,e,P,P pub ,H 1 ,H 2}, keep the master private key s;

[0109] Among them, G 1 : is the additive cyclic group g...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based secret key negotiation construction method and a network platform. The method comprises the steps of establishing a system, conducting secret key extraction and conducting key negotiation, wherein in the step of establishing the system, system parameters are disclosed, and a main secret key is kept secret; in the step of conducting secret key extraction, an identity of a user U is given, a private key of the user is calculated through PKG, and a public key and private keys of two secret key negotiation parties A and B at the position are calculated respectively; in the step of conducting key negotiation, A and B are selected randomly, temporary session keys of A and B are calculated respectively, values generated by the session keys are sent to the two parties mutually, and a final shared secret key is calculated. According to the network platform, an MVC framework model is used, a Controller layer is responsible for forwarding requests and processing the requests, a View layer interacts with the user, a Model layer achieves the programmed algorithm function and interacts with a database, and a Service layer and a Dao layer in the Model layer achieve an identity-based secret key negotiation protocol. The identity identification of the user is directly used as the public key, the use and management of the public key are simplified, and the method and the network platform have wide application prospects.

Description

technical field [0001] The invention belongs to the technical field of communication, in particular to an identity-based key agreement construction method and network platform. Background technique [0002] Key establishment (key establishment) refers to the process in which two or more communication parties establish a shared session key. There are currently two popular methods to establish a session key between the two parties. One method generates a session key for one party to communicate and transfers the session key to the other party securely. This method is called key transmission. The second method contributes part of the information for both communication parties, and the information jointly pushes out a session key. This method is called key agreement. If Alice is sure that only Bob can (others cannot) determine the value of the session key , then this key agreement protocol is said to provide key authentication from Bob to Alice. If a key agreement agreement p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/08
Inventor 许春根夏逸珉窦本年蔚晓玲倪绿林
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products