Shared key establishment method suitable for computing resource dissymmetric fields

A technology for sharing keys and computing resources, applied in the field of information security, can solve problems such as low implementation efficiency, mathematical difficulties, and weak terminal computing resources, and achieve the effect of improving implementation efficiency

Active Publication Date: 2018-02-09
WUHAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) Compared with symmetric cryptography, public key cryptography is mostly designed based on difficult mathematical problems, and its implementation efficiency is low;
[0005] (2) The algorithm itself does not consider the differences in the implementation environment. For example, for the classic Diffie-Hellman key exchange protocol, the computing resources consumed by both parties in the process of implementing the protocol are the same, that is, both parties need to execute two large integer modular exponentiation
[0006] However, at present, many application fields such as the Internet of Things and cloud computing often present the characteristics of asymmetric computing resources, that is, the computing resources of the server end are strong, and the computing resources of the terminal are weak.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared key establishment method suitable for computing resource dissymmetric fields

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0021] please see figure 1 , a method for establishing a shared key applicable to the field of asymmetric computing resources provided by the present invention. Assuming that the two parties in communication are Bob and Alice, the establishment of key sharing by the two parties in communication includes the following steps:

[0022] Step 1: Build the system;

[0023] Cyclic group Then randomly pick n values ​​y 1 ,…, Then the public parameters of the system are

[0024] Step 2: Alice randomly selects the set evenly Use S as your temporary private k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a shared key establishment method suitable for computing resource dissymmetric fields. The shared key establishment method is provided by adopting a knapsack problem and a discrete logarithm problem (comprising an elliptic curve discrete logarithm problem), which is characterized in that computing resources necessary for both protocol parties in an implementation process are dissymmetric, thereby greatly improving the implementation efficiency of one of the protocol parties. The shared key establishment method is particularly suitable for the computing resource dissymmetric fields of servers and mobile terminals in the Internet of Things, cloud computing and other security fields, and has more advantages than the traditional key exchange protocols such as Diffie Hellman key exchange protocol and the like in these fields. The method provided by the invention can be widely used in the field of information security systems such as network security, electronic commerce and so on.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for establishing a shared key applicable to the field of asymmetric computing resources. Background technique [0002] Aiming at the problem of complex key management in symmetric cryptographic algorithms, Diffie and Hellman proposed the idea of ​​"public key cryptosystem" in 1976, and proposed the Diffie-Hellman key exchange (key establishment) protocol to solve the problem of public channel key transmission problems. [0003] There are two defects in the traditional public key cryptosystem: [0004] (1) Compared with symmetric cryptography, public key cryptography is mostly designed based on difficult mathematical problems, and its implementation efficiency is low; [0005] (2) The algorithm itself does not consider the differences in the implementation environment. For example, for the classic Diffie-Hellman key exchange protocol, the comput...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0863H04L9/0869H04L9/0838H04L9/0825G06F7/58H04L9/14H04L9/0841
Inventor 王后珍张焕国
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products