Group communication method and system based on tree structure symmetric key pool

A group communication and symmetric key technology, which is applied in key distribution, can solve problems such as low security, large key quantity, and large capacity, and achieve the effects of enhanced use security, good protection measures, and security assurance

Active Publication Date: 2022-03-25
RUBAN QUANTUM TECH CO LTD +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. In the existing group communication system based on the key pool, all members who have the group key pool have the same status, and any member being captured will lead to the failure of the entire group communication system;
[0007] 2. In the existing technology, due to the large capacity of the group symmetric key pool, it cannot be stored in a highly secure security chip, and there is a possibility that it will be disassembled and cracked after being captured; the group symmetric key pool is Shared by all members in the group, once the group-type symmetric key pool is cracked, the security of group communication based on the group-type symmetric key pool will be threatened;
[0008] 3. The existing key extraction method based on the symmetric key pool is as follows: first select a key location, and then take out the entire key from this location. The method is easy to be predicted or even completely cracked, and the security is not high;
[0009] 4. The existing key pool update method is that one party generates a key and sends it to the other party. Due to the huge amount of keys in the key pool, it will take a lot of time to update the key pool; for group communication, It is necessary to pass the same key to each member of the group, and the amount of keys is even larger, which is often difficult to achieve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group communication method and system based on tree structure symmetric key pool
  • Group communication method and system based on tree structure symmetric key pool
  • Group communication method and system based on tree structure symmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] Example 1: Group communication when members are trusted

[0083] In the case of trusted members, secure communication is performed between any two members A and B in the group. Here we set the replacement key stored by A as KR A , the replacement key stored by B is KR B . Since the relationship between any two nodes in a group may be a parent-child relationship, a brother relationship, or neither a father-son relationship nor a brother relationship, we will discuss these three cases separately below.

[0084] Case 1.1: Communication between two nodes with a parent-child relationship

[0085] 1.1.1: Suppose the parent node is A, the child node is B, the message to be sent by group member A is NTF, and a timestamp TNTF is generated for the message.

[0086] A first needs to calculate the replacement key of B, namely KR B =F KRID (ID B ,KR A ), and then according to KR B Calculate B's key pool.

[0087] A calculates the group key for this group communication:

[...

Embodiment 2

[0098] Example 2: Group communication when a member is untrustworthy

[0099] Let the group administrator be node A, whose ID is ID A , the replacement key is KR A ;

[0100] The untrusted member is X whose ID is ID X , the replacement key is KR X ;

[0101] The trusted superior of X is B whose ID is ID B , the replacement key is KR B ;

[0102] The leaf nodes of X have a total of N X , record any one as C, and its ID is ID C , the replacement key is KR C ;

[0103] Since X can calculate the symmetric key pool of all leaf nodes of X, the group communication security of all leaf nodes of X is affected. Based on this, A will transfer all leaf nodes of X to X's trusted superior B for management. Taking C as an example, after the parent node of C is changed to B, its ID is changed from the original ID C Replace with ID' C , and ID' C is also unique, whose replacement key is determined by the KR C Update to KR' C .

[0104] Taking C as an example, the specific ste...

Embodiment 3

[0138] Embodiment 3: Group communication of newly added trusted members.

[0139] Let the group administrator be A, the newly added trusted member be Y, and the superior node of Y be B. According to Y's layer number and node number, A allocates a corresponding replacement key and a symmetric key pool for Y.

[0140] A generates an NTF to announce that Y is legal, and A sends the NTF to B step by step through the method in case 1.1. After receiving the NTF, B obtains the news that the newly added member Y is legal.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a group communication method and system based on a tree structure symmetric key pool, and the method comprises the steps: taking a group member as a node in a tree structure, constructing a group communication tree structure, and distributing a replacement key and a key pool for each node in the tree structure. The key pool and the replacement key of the child node are calculated by the key pool and the replacement key of the father node of the child node, in this way, diversity and variability of symmetric keys used for communication among members can be realized on the premise that only finite-length key pools are stored in the members in the group, the difficulty of cracking the group communication key by a third party is increased, and the service life of the group communication key is prolonged. And the communication security of the whole group is improved.

Description

technical field [0001] The invention relates to the field of group communication, in particular to a group communication method and system based on a tree-structured symmetric key pool. Background technique [0002] With the continuous development of wireless communication technologies, direct device to device communication (Device to Device, D2D) has become one of the hot spots of 3GPP Rel-12 standardization technology. D2D allows two user equipments (User Equipment, UE) to directly perform data transmission through a specific channel (Sidelink Channel) without going through an evolved base station equipment (Evolutional Node B, eNB). Of course, D2D is not limited to data transmission between two user equipments, and can also support point-to-multipoint group communication (Group Communication). Most of the existing network authentication systems are based on the one-to-one authentication method of a single object, but for point-to-multipoint data transmission, groups will...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0891H04L9/0833H04L9/0869H04L9/3247
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products