CN102684883A - Distribution-type online social network key distribution privacy authority method - Google Patents

Distribution-type online social network key distribution privacy authority method Download PDF

Info

Publication number
CN102684883A
CN102684883A CN2012101609677A CN201210160967A CN102684883A CN 102684883 A CN102684883 A CN 102684883A CN 2012101609677 A CN2012101609677 A CN 2012101609677A CN 201210160967 A CN201210160967 A CN 201210160967A CN 102684883 A CN102684883 A CN 102684883A
Authority
CN
China
Prior art keywords
key
privacy
assistant
user
protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101609677A
Other languages
Chinese (zh)
Inventor
杨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2012101609677A priority Critical patent/CN102684883A/en
Publication of CN102684883A publication Critical patent/CN102684883A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Computer And Data Communications (AREA)

Abstract

The invention discloses a distribution-type online social network key distribution privacy authority method which relates to three basic roles of Peer, a key generator centre (KGC) and a privacy authority (PA), wherein the Peer refers to common users in an online social network, and the common users are liable to suffer from various types of attacks, especially privacy prying attacks, so that the related privacy of the common users needs an effective protection mechanism; the KGC is used for providing Peer registration and key issuing services which are generally provided by online social network service providers, for example, famous social network websites; and the PA is used for providing privacy protection services related to keys to special users. The distribution-type online social network key distribution privacy authority method disclosed by the invention has the beneficial effects that in order to ensure the safety of key distribution, a system provides a safe key distribution method under an environment without reliable channel guarantee and can effectively defend the replay attacks, man-in-the-middle attacks, interior attacks and the like; and in order to realize system maintenance robustness, the system provides a mechanism of verifying and isolating malicious PA online, and if too much PA is isolated, the key distribution becomes ineffective, and then the system continuously approves new PA to perform equivalent supplement when the malicious PA is isolated.

Description

A kind of distributed online community network key distribution method for secret protection
Technical field
The invention belongs to community network secret protection field, relate to a distributed online community network key distribution method for secret protection.
Background technology
Along with rapid development of network technology, and people are to the making earnest efforts of community network day by day, and the safety of distributed online community network and secret protection problem also become increasingly conspicuous.
Traditional P KI system adopts is the application scenarios that comes can not well adapt to distributed online community network to the pattern that all members carry out authentication and issue digital certificate through an authority's certificate verification center CA.
For fear of the huge expense of the certificate management aspect of PKI, progressively be incorporated in the distributed online community network based on the IBC system of identity, can not only effectively simplify key management, service such as authentication and authentication more flexibly can also be provided.But there is following several weak point in existing IBC scheme: 1. existing most schemes all are to adopt off-line pre-authentication pattern, perhaps suppose the existence of a safe lane; 2. key produces the center and can pretend even frame certain user through the mode of obtaining private key.This has just caused a series of actual demands: under the distributed online community network environment of reality; Need a kind ofly at non-safe lane or be called the scheme of secure distribution user key under the open channel, and need user's personal secrets rank further be promoted.
Summary of the invention
The objective of the invention is to propose a kind of key distribution secret protection scheme based on open network to distributed online community network.
A distributed online community network key distribution method for secret protection relates to Peer, key generation center KGC (Key Generator Center) and three kinds of basic roles of privacy of user protection assistant PA (Privacy Authority); Wherein, Described Peer is the domestic consumer in the online community network; They receive various attack easily, and particularly privacy is spied upon attack, to their effective protection mechanism of relevant privacy needs; Described key produces center KGC and is responsible for providing Peer registration and key to issue service, is generally provided by online social network service provider, like some well-known community network websites; Described privacy of user protection assistant PA is responsible for the specific user provides key relevant secret protection service.
Further, for the legitimacy of online verification privacy of user protection assistant PA, can set a test subscriber and gather T and accomplish online verification family secret protection assistant PA.
Suppose that simultaneously privacy of user protection assistant PA is that friend by Peer serves as, privacy of user protection assistant PA need be as reliability key produces center KGC and fail safe.
Distributed online community network key distribution method for secret protection is specially:
Step 1: key produces center KGC selecting system private key and system safety parameter; All n privacy of user protection assistant PA unite execution distributed generation of a thresholding key s and shared procedure, make any k privacy of user protection assistant PA utilize the key fragment that has separately just can recover s;
Step 2: Peer produces center KGC to key and registers, and registration produces center KGC through the back key and produces a unique sign ID for each Peer AWith evidence Proof A
Step 3: when needing to generate key, Peer A sends the key application at every turn, sign ID A, evidence Proof AGive KGC with a random number N;
Step 4: key produces center KGC A is carried out authentication registration, and checking produces a part key through the back, adds that the N that back is received sends to A together;
Step 5: A selects the secret protection assistant PA of certain customers to provide key to assist distribution services at random, and sends to the privacy of user protection assistant PA of its appointment: key is assisted application, sign ID A, evidence Proof AWith a random number N;
Step 6: privacy of user protection assistant PA carries out authentication to A, through after also produce a part key, add that the N that back is received sends to A together;
Step 7: A accumulative total makes up this k key and utilizes it to produce the private key of oneself after receiving k the part key from privacy of user protection assistant PA.
Further, privacy of user protection assistant PA authentication protocol mode is:
Step 1: key produces center KGC and id information is provided for the member in the selected Peer T set, supplies the usefulness of certain particular user secret protection assistant PA of its challenge;
Step 2: the member among the T submits part key application challenge to privacy of user protection assistant PA respectively, whether has the legitimate secret fragment that produces center KGC from key in the hope of test subscriber's secret protection assistant PA;
Step 3: the member returning part key of privacy of user protection assistant PA in T;
Step 4: the member among the T will submit to key to produce its legitimacy of center KGC checking by the part key information that privacy of user protects assistant PA to obtain; If legal number surpasses (N-1)/3+1; Can assert that then privacy of user protection assistant PA authentication passes through; And set member's number that N is the T set, and pass through if this PA is unverified, think that then this PA is malicious user secret protection assistant PA and takes quarantine measures.
Beneficial effect of the present invention is: realize the distribution of safe key, system should provide safe cryptographic key distribution method under the environment that no trusted channel guarantees, and can effectively resist Replay Attack, man-in-the-middle attack and internal attack etc.; Realize the system maintenance robustness; The mechanism that system provides a kind of online discriminating malicious user secret protection assistant PA and isolates; If segregate privacy of user protection assistant PA is too much, can cause the inefficacy of key distribution, therefore; In user-isolated secret protection assistant PA, also need the new privacy of user protection assistant PA of constantly approval to carry out equivalent and replenish.
Description of drawings
Fig. 1 is a distributed online community network key distribution method for secret protection sketch map according to the invention;
Fig. 2 is a PA authentication protocol sketch map of the present invention
Embodiment
As shown in Figure 1, distributed online community network key distribution method for secret protection is specially:
Step 1: key produces center KGC selecting system private key and system safety parameter; All n privacy of user protection assistant PA unite execution distributed generation of a thresholding key s and shared procedure, make any k privacy of user protection assistant PA utilize the key fragment that has separately just can recover s;
Step 2: Peer produces center KGC to key and registers, and registration produces center KGC through the back key and produces a unique sign ID for each Peer AWith evidence Proof A
Step 3: when needing to generate key, Peer A sends the key application at every turn, sign ID A, evidence Proof AGive KGC with a random number N;
Step 4: key produces center KGC A is carried out authentication registration, and checking produces a part key through the back, adds that the N that back is received sends to A together;
Step 5: A selects the secret protection assistant PA of certain customers to provide key to assist distribution services at random, and sends to the privacy of user protection assistant PA of its appointment: key is assisted application, sign ID A, evidence Proof AWith a random number N;
Step 6: privacy of user protection assistant PA carries out authentication to A, through after also produce a part key, add that the N that back is received sends to A together;
Step 7: A accumulative total makes up this k key and utilizes it to produce the private key of oneself after receiving k the part key from privacy of user protection assistant PA.
As shown in Figure 2, PA authentication protocol mode is:
Step 1: key produces center KGC and id information is provided for the member in the selected Peer T set, supplies the usefulness of certain particular user secret protection assistant PA of its challenge;
Step 2: the member among the T submits part key application challenge to privacy of user protection assistant PA respectively, whether has the legitimate secret fragment that produces center KGC from key in the hope of test subscriber's secret protection assistant PA;
Step 3: the member returning part key of privacy of user protection assistant PA in T;
Step 4: the member among the T will submit to key to produce its legitimacy of center KGC checking by the part key information that privacy of user protects assistant PA to obtain; If legal number surpasses (N-1)/3+1; Can assert that then privacy of user protection assistant PA authentication passes through; And set member's number that N is the T set, and pass through if this PA is unverified, think that then this PA is malicious user secret protection assistant PA and takes quarantine measures.

Claims (4)

1. a distributed online community network key distribution method for secret protection relates to Peer, key generation center KGC and three kinds of basic roles of privacy of user protection assistant PA; Wherein, Described Peer is the domestic consumer in the online community network; They receive various attack easily, and particularly privacy is spied upon attack, to their effective protection mechanism of relevant privacy needs; Described key produces center KGC and is responsible for providing Peer registration and key to issue service, is generally provided by online social network service provider, like some well-known community network websites; Described privacy of user protection assistant PA is responsible for the specific user provides key relevant secret protection service.
2. a kind of distributed online community network key distribution method for secret protection as claimed in claim 1; It is characterized in that; For the legitimacy of online verification privacy of user protection assistant PA, can set a test subscriber and gather T and accomplish online verification family secret protection assistant PA.
3. a kind of distributed online community network key distribution method for secret protection as claimed in claim 1 is characterized in that distributed online community network key distribution method for secret protection is specially:
Step 1: key produces center KGC selecting system private key and system safety parameter; All n privacy of user protection assistant PA unite execution distributed generation of a thresholding key s and shared procedure, make any k privacy of user protection assistant PA utilize the key fragment that has separately just can recover s;
Step 2: Peer produces center KGC to key and registers, and registration produces center KGC through the back key and produces a unique sign ID for each Peer AWith evidence Proof A
Step 3: when needing to generate key, Peer A sends the key application at every turn, sign ID A, evidence Proof AGive KGC with a random number N;
Step 4: key produces center KGC A is carried out authentication registration, and checking produces a part key through the back, adds that the N that back is received sends to A together;
Step 5: A selects the secret protection assistant PA of certain customers to provide key to assist distribution services at random, and sends to the privacy of user protection assistant PA of its appointment: key is assisted application, sign ID A, evidence Proof AWith a random number N;
Step 6: privacy of user protection assistant PA carries out authentication to A, through after also produce a part key, add that the N that back is received sends to A together;
Step 7: A accumulative total makes up this k key and utilizes it to produce the private key of oneself after receiving k the part key from privacy of user protection assistant PA.
4. a kind of distributed online community network key distribution method for secret protection as claimed in claim 3 is characterized in that, privacy of user protection assistant PA authentication protocol mode is:
Step 1: key produces center KGC and id information is provided for the member in the selected Peer T set, supplies the usefulness of certain particular user secret protection assistant PA of its challenge;
Step 2: the member among the T submits part key application challenge to privacy of user protection assistant PA respectively, whether has the legitimate secret fragment that produces center KGC from key in the hope of test subscriber's secret protection assistant PA;
Step 3: the member returning part key of privacy of user protection assistant PA in T;
Step 4: the member among the T will submit to key to produce its legitimacy of center KGC checking by the part key information that privacy of user protects assistant PA to obtain; If legal number surpasses (N-1)/3+1; Can assert that then privacy of user protection assistant PA authentication passes through; And set member's number that N is the T set, and pass through if this PA is unverified, think that then this PA is malicious user secret protection assistant PA and takes quarantine measures.
CN2012101609677A 2012-05-23 2012-05-23 Distribution-type online social network key distribution privacy authority method Pending CN102684883A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101609677A CN102684883A (en) 2012-05-23 2012-05-23 Distribution-type online social network key distribution privacy authority method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101609677A CN102684883A (en) 2012-05-23 2012-05-23 Distribution-type online social network key distribution privacy authority method

Publications (1)

Publication Number Publication Date
CN102684883A true CN102684883A (en) 2012-09-19

Family

ID=46816286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101609677A Pending CN102684883A (en) 2012-05-23 2012-05-23 Distribution-type online social network key distribution privacy authority method

Country Status (1)

Country Link
CN (1) CN102684883A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027556A (en) * 2016-06-30 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Multi-party communication method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027556A (en) * 2016-06-30 2016-10-12 宇龙计算机通信科技(深圳)有限公司 Multi-party communication method and device
CN106027556B (en) * 2016-06-30 2020-04-07 宇龙计算机通信科技(深圳)有限公司 Multi-party communication method and device

Similar Documents

Publication Publication Date Title
Irshad et al. A provably secure and efficient authenticated key agreement scheme for energy internet-based vehicle-to-grid technology framework
CN102664885B (en) Identity authentication method based on biological feature encryption and homomorphic algorithm
US8533482B2 (en) Method for generating a key pair and transmitting a public key or request file of a certificate in security
Wang et al. A smart card based efficient and secured multi-server authentication scheme
Shao et al. On security against the server in designated tester public key encryption with keyword search
Lin et al. A new strong-password authentication scheme using one-way hash functions
CN104125199B (en) A kind of anonymous authentication method and system based on attribute
CN102355663B (en) Credible inter-domain rapid authentication method on basis of separation mechanism network
CN110071812A (en) A kind of editable can link, the ring signatures method of non-repudiation
CN105187405A (en) Reputation-based cloud computing identity management method
US10091189B2 (en) Secured data channel authentication implying a shared secret
Siddiqui et al. An improved lightweight PUF–PKI digital certificate authentication scheme for the Internet of Things
EP2827529B1 (en) Method, device, and system for identity authentication
WO2015158228A1 (en) Server, user equipment, and method for user equipment to interact with server
Yao et al. An Improved and Privacy‐Preserving Mutual Authentication Scheme with Forward Secrecy in VANETs
CN103312672A (en) Identity authentication method and system
Thakur et al. Cryptographically secure privacy-preserving authenticated key agreement protocol for an IoT network: A step towards critical infrastructure protection
CN110945833B (en) Method and system for multi-mode identification network privacy protection and identity management
Hussain et al. An improved authentication scheme for digital rights management system
US9716707B2 (en) Mutual authentication with anonymity
CN102291396A (en) Anonymous authentication algorithm for remote authentication between credible platforms
Nasiri et al. Using Combined One-Time Password for Prevention of Phishing Attacks.
CN102684883A (en) Distribution-type online social network key distribution privacy authority method
Alzahrani et al. SKIA‐SH: A Symmetric Key‐Based Improved Lightweight Authentication Scheme for Smart Homes
Chen et al. Threshold identity authentication signature: Impersonation prevention in social network services

Legal Events

Date Code Title Description
C06 Publication
DD01 Delivery of document by public notice

Addressee: Yang Tao

Document name: Notification of Passing Preliminary Examination of the Application for Invention

PB01 Publication
DD01 Delivery of document by public notice

Addressee: Yang Tao

Document name: Notification of Publication of the Application for Invention

DD01 Delivery of document by public notice

Addressee: Yang Tao

Document name: Notification of Passing Examination on Formalities

C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120919