Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Symmetric group key negotiation method based on block chain

A group key and symmetric group technology, applied in the field of information security, can solve problems such as easy exposure of personal identity information, reduction of computing and communication overhead, and high information sensitivity

Active Publication Date: 2019-07-12
ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
View PDF7 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the technical problem that the existing group key agreement method is used for identity authentication, personal identity information is easily exposed, and the information is highly sensitive, and the access rights of group members cannot be determined. The present invention proposes a blockchain-based The symmetric group key agreement method uses the blockchain anonymous authentication technology to realize personal privacy protection in the identity authentication process of the group key agreement, and uses the blockchain distributed computing technology to reduce the calculation and cost of each participant. Communication overhead, using blockchain recording technology for traceability and accountability, to prevent terminals without authorization from joining group communication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Symmetric group key negotiation method based on block chain
  • Symmetric group key negotiation method based on block chain
  • Symmetric group key negotiation method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] In the case of complex group communication and information sharing, multiple communication parties need to authenticate the communication members, but when providing identity information, the identity information is easily leaked or stolen. For security reasons, while multiple communication parties need to be authenticated, personal identity privacy needs to be protected. When sharing information, it is also necessary to ensure the confidentiality, integrity and anti-disclosure of communication information, and only authorized members can share information. In view of this application background, the present invention proposes a blockchain-based symmetric group key agreement method, such as figure 1 As shown, the steps are as follows: ①The members participating in the group key negotiation first initialize the parameters and generate their own public / private key pairs respectively; ②During the group negotiation process, the key negotiation information is transmitted in ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a symmetric group key negotiation method based on a block chain. The symmetric group key negotiation method comprises the following steps that a key generation center and terminal members in a group information exchange network domain generate respective public / private key pairs; information composed of the IP addresses and the public key pairs is mutually broadcasted amongthe terminal members, and the information is ranked based on the sizes of the IP addresses to obtain a sequence pair set of all the members of the group; the first node in the sequence pair set packages the message composed of the group key parameters to a block and transmits the message to the next node, and the steps are sequentially circulated to the last node; the last node calculates a groupkey of the last node, packages a message composed of group key parameters into a block and broadcasts the message to other nodes; the other nodes calculate respective group keys; group key correctnessverification is performed. The personal privacy is protected by adopting a block chain technology, so that the group key calculation and communication are more balanced, the traceability is high, andthe group key negotiation of the mobile ad hoc network is more flexible, efficient and practical.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to a blockchain-based symmetric group key agreement method. Background technique [0002] Group key agreement has a wide range of applications, such as secure multi-party computing, secure resource sharing, and distributed collaborative computing. In the mobile ad hoc network with self-organization, decentralization and dynamic topology changes, group communication needs to ensure the safe exchange and transmission of information. The group key agreement scheme is to calculate the group session key online between groups, and then use the session key to carry out group encrypted communication. It is one of the key technologies to ensure safe information exchange and transmission between groups. [0003] In the mobile ad hoc network, in order to ensure the confidentiality, integrity and leakage resistance of the communication information between the groups, the c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0838H04L9/0863H04L9/0869H04L9/3226H04L9/3247H04L63/0407H04L63/0435
Inventor 张启坤张彦华王锐芳李永娇袁俊岭李志刚李健勇甘勇张蓓蕾
Owner ZHENGZHOU UNIVERSITY OF LIGHT INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products