CN107682150A - 一种适用于计算资源非对称领域的共享密钥建立方法 - Google Patents

一种适用于计算资源非对称领域的共享密钥建立方法 Download PDF

Info

Publication number
CN107682150A
CN107682150A CN201711024800.7A CN201711024800A CN107682150A CN 107682150 A CN107682150 A CN 107682150A CN 201711024800 A CN201711024800 A CN 201711024800A CN 107682150 A CN107682150 A CN 107682150A
Authority
CN
China
Prior art keywords
bob
alice
key
shared key
calculated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711024800.7A
Other languages
English (en)
Other versions
CN107682150B (zh
Inventor
王后珍
张焕国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University WHU
Original Assignee
Wuhan University WHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University WHU filed Critical Wuhan University WHU
Priority to CN201711024800.7A priority Critical patent/CN107682150B/zh
Priority to US15/869,110 priority patent/US10637653B2/en
Publication of CN107682150A publication Critical patent/CN107682150A/zh
Application granted granted Critical
Publication of CN107682150B publication Critical patent/CN107682150B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/58Random or pseudo-random number generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种适用于计算资源非对称领域的共享密钥建立方法,采用背包问题和离散对数问题(包括椭圆曲线离散对数问题)给出了一种共享密钥的建立方法,其特点是协议双方实现过程中所需的计算资源不对称,极大地提高了协议一方的实现效率。特别适用于物联网,云计算等安全领域中服务器与移动终端计算资源非对称应用领域,在这些领域比传统密钥交换协议如Diffie‑Hellman密钥交换协议等有优势。本发明提供的方法可广泛应用于网络安全、电子商务等信息安全***领域。

Description

一种适用于计算资源非对称领域的共享密钥建立方法
技术领域
本发明属于信息安全技术领域,尤其涉及一种适用于计算资源非对称领域的共享密钥建立方法。
背景技术
针对对称密码算法中密钥管理复杂的问题,1976年Diffie和Hellman提出了“公钥密码体制”的思想,并提出了Diffie-Hellman密钥交换(密钥建立)协议,解决了***道密钥的传输难题。
传统公钥密码体制存在两个缺陷:
(1)与对称密码相比,公钥密码体制大多基于数学困难问题而设计、实现效率低;
(2)算法本身没有考虑实现环境的差异,例如,对于经典的Diffie-Hellman密钥交换协议,协议双方在实现协议的过程中消耗的计算资源是相同的,亦即,均需执行两次大整数模幂运算。
然而,目前很多应用领域如物联网、云计算等往往呈现计算资源非对称的特点,即服务器一端计算资源强,终端计算资源弱。
发明内容
针对上述存在的技术问题,本发明的目的是提供一种适用于计算资源非对称领域的共享密钥建立方法。
本发明所采用的技术方案是:一种适用于计算资源非对称领域的共享密钥建立方法,假设通信双方是Bob和Alice,则通信双方建立密钥共享包括以下步骤:
步骤1:建立***;
首先选定循环群然后随机选取n个值y1,…,则***的公开参数为
步骤2:Alice随机均匀选取集合将S做为自己的临时私钥,然后计算KA=∏i∈Syi
步骤3:Alice通过***道发送KA给Bob;
步骤4:Bob随机选取并依次计算
步骤5:Bob通过***道发送给Alice;
步骤6:Alice收到KB后,用自己的私钥S计算出共享密钥
步骤7:Bob收到KA后,用自己的私钥b计算出共享密钥KAB=(∏i∈s yi)b
其中步骤2、步骤4、步骤6、步骤7中的运算均在循环群中进行。
本发明具有以下优点和积极效果:协议双方实现过程中所需的计算资源不对称,极大地提高了协议一方的实现效率。特别适用于物联网,云计算等安全领域中服务器与移动终端计算资源非对称应用领域,在这些领域比传统密钥交换协议如Diffie-Hellman密钥交换协议等有优势。
附图说明
图1是本发明实施例的流程图。
具体实施方式
为了便于本领域普通技术人员理解和实施本发明,下面结合附图及实施例对本发明作进一步的详细描述,应当理解,此处所描述的实施示例仅用于说明和解释本发明,并不用于限定本发明。
请见图1,本发明提供的一种适用于计算资源非对称领域的共享密钥建立方法,假设通信双方是Bob和Alice,则通信双方建立密钥共享包括以下步骤:
步骤1:建立***;
首先选定循环群然后随机选取n个值y1,…,则***的公开参数为
步骤2:Alice随机均匀选取集合将S做为自己的临时私钥,然后计算KA=∏i∈syi
步骤3:Alice通过***道发送KA给Bob;
步骤4:Bob随机选取并依次计算
步骤5:Bob通过***道发送给Alice;
步骤6:Alice收到KB后,用自己的私钥S计算出共享密钥
步骤7:Bob收到KA后,用自己的私钥b计算出共享密钥
其中步骤2、步骤4、步骤6、步骤7中的运算均在循环群中进行。
本发明还提供了一种适用于计算资源非对称领域的共享密钥建立方法,假设通信双方是Bob和Alice,则通信双方建立密钥共享包括以下步骤:
步骤1:建立***;
选定椭圆曲线上点集组成的循环群,然后随机选取n个点则***的公开参数为
步骤2:Alice随机均匀选取集合将S做为自己的临时私钥,然后计算KA=∑i∈S(xi,yi);
步骤3:Alice通过***道发送KA给Bob;
步骤4:Bob随机选取并计算b(x1,y1),…,b(xn,yn),其中b(xi,yi)表示椭圆曲线的点乘运算;
步骤5:Bob通过***道发送KB={b(x1,y1),…,b(xn,yn)}给Alice;
步骤6:Alice收到KB后,用自己的私钥S计算出共享密钥KBA=∑i∈s b(xi,yi);
步骤7:Bob收到KA后,用自己的私钥b计算出共享密钥KAB=b∑i∈S(xi,yi);
其中步骤2、步骤4、步骤6、步骤7中的运算均在循环群中进行。
应当理解的是,本说明书未详细阐述的部分均属于现有技术。
应当理解的是,上述针对较佳实施例的描述较为详细,并不能因此而认为是对本发明专利保护范围的限制,本领域的普通技术人员在本发明的启示下,在不脱离本发明权利要求所保护的范围情况下,还可以做出替换或变形,均落入本发明的保护范围之内,本发明的请求保护范围应以所附权利要求为准。

Claims (2)

1.一种适用于计算资源非对称领域的共享密钥建立方法,其特征在于:假设通信双方是Bob和Alice,则通信双方建立密钥共享包括以下步骤:
步骤1:建立***;
首先选定循环群然后随机选取n个值则***的公开参数为
步骤2:Alice随机均匀选取集合将S做为自己的临时私钥,然后计算KA=∏i∈syi
步骤3:Alice通过***道发送KA给Bob;
步骤4:Bob随机选取并依次计算
步骤5:Bob通过***道发送给Alice;
步骤6:Alice收到KB后,用自己的私钥S计算出共享密钥
步骤7:Bob收到KA后,用自己的私钥b计算出共享密钥KAB=(∏i∈syi)b
其中步骤2、步骤4、步骤6、步骤7中的运算均在循环群中进行。
2.一种适用于计算资源非对称领域的共享密钥建立方法,其特征在于:假设通信双方是Bob和Alice,则通信双方建立密钥共享包括以下步骤:
步骤1:建立***;
选定椭圆曲线上点集组成的循环群然后随机选取n个点则***的公开参数为
步骤2:Alice随机均匀选取集合将S做为自己的临时私钥,然后计算KA=∑i∈s(xi,yi);
步骤3:Alice通过***道发送KA给Bob;
步骤4:Bob随机选取并依次计算b(x1,y1),…,b(xn,yn),其中b(xi,yi)表示椭圆曲线的点乘运算;
步骤5:Bob通过***道发送KB={b(x1,y1),…,b(xn,yn)}给Alice;
步骤6:Alice收到KB后,用自己的私钥S计算出共享密钥KBA=∑i∈sb(xi,yi);
步骤7:Bob收到KA后,用自己的私钥b计算出共享密钥KAB=b∑i∈S(xi,yi);
其中步骤2、步骤4、步骤6、步骤7中的运算均在循环群中进行。
CN201711024800.7A 2017-10-27 2017-10-27 一种适用于计算资源非对称领域的共享密钥建立方法 Active CN107682150B (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711024800.7A CN107682150B (zh) 2017-10-27 2017-10-27 一种适用于计算资源非对称领域的共享密钥建立方法
US15/869,110 US10637653B2 (en) 2017-10-27 2018-01-12 System and method for establishing share key in computing-resource-asymmetric field

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711024800.7A CN107682150B (zh) 2017-10-27 2017-10-27 一种适用于计算资源非对称领域的共享密钥建立方法

Publications (2)

Publication Number Publication Date
CN107682150A true CN107682150A (zh) 2018-02-09
CN107682150B CN107682150B (zh) 2020-03-10

Family

ID=61142902

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711024800.7A Active CN107682150B (zh) 2017-10-27 2017-10-27 一种适用于计算资源非对称领域的共享密钥建立方法

Country Status (2)

Country Link
US (1) US10637653B2 (zh)
CN (1) CN107682150B (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326852A (zh) * 2013-06-20 2013-09-25 武汉大学 一种量子计算环境下的共享密钥建立方法
CN103986575A (zh) * 2014-06-05 2014-08-13 武汉大学 一种计算非对称的共享密钥建立方法
CN107241190A (zh) * 2017-08-04 2017-10-10 南京理工大学 一种基于身份的密钥协商构建方法与网络平台

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040050625A (ko) * 2002-12-10 2004-06-16 한국전자통신연구원 대칭형 및 비대칭형 인증 키 교환을 이용한 인증방법
US8707042B2 (en) * 2008-08-28 2014-04-22 Red Hat, Inc. Sharing keys between cooperating parties
CN101616410B (zh) * 2009-06-25 2011-08-10 中兴通讯股份有限公司 一种蜂窝移动通信网络的接入方法和***
US8553878B2 (en) * 2010-04-14 2013-10-08 Apple Inc. Data transformation system using cyclic groups
US9229823B2 (en) * 2011-08-17 2016-01-05 International Business Machines Corporation Storage and retrieval of dispersed storage network access information
JP2014220661A (ja) * 2013-05-08 2014-11-20 株式会社東芝 証明装置、出力装置、検証装置、入力装置、証明方法、検証方法およびプログラム
SG10201509342WA (en) * 2015-11-12 2017-06-29 Huawei Int Pte Ltd Method and system for session key generation with diffie-hellman procedure
JP6613909B2 (ja) * 2016-01-15 2019-12-04 富士通株式会社 相互認証方法、認証装置および認証プログラム
US20170359318A1 (en) * 2016-06-12 2017-12-14 Apple Inc. Diversification of Public Keys

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326852A (zh) * 2013-06-20 2013-09-25 武汉大学 一种量子计算环境下的共享密钥建立方法
CN103986575A (zh) * 2014-06-05 2014-08-13 武汉大学 一种计算非对称的共享密钥建立方法
CN107241190A (zh) * 2017-08-04 2017-10-10 南京理工大学 一种基于身份的密钥协商构建方法与网络平台

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
CHIK HOW TAN ; J.C.M. TEO: ""An authenticated group key agreement for wireless networks"", 《IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE,2005》 *
SHUNGAN ZHOU;RUIYING DU等: ""SSEM Secure, scalable and efficient multi-owner data sharing in clouds"", 《CHINA COMMUNICATIONS》 *

Also Published As

Publication number Publication date
US10637653B2 (en) 2020-04-28
US20190132121A1 (en) 2019-05-02
CN107682150B (zh) 2020-03-10

Similar Documents

Publication Publication Date Title
CN103200000B (zh) 一种量子计算环境下的共享密钥建立方法
CN103986575B (zh) 一种计算非对称的共享密钥建立方法
CN104660415B (zh) 移动云计算下多域间非对称群组密钥协商协议的方法
CN104868993A (zh) 一种基于证书的两方认证密钥协商方法及***
Gong et al. A secure and lightweight certificateless hybrid signcryption scheme for Internet of Things
CN102833740A (zh) 一种无线传感器网络数据聚合隐私保护方法
CN103796199A (zh) 移动非平衡网络中可认证非对称群组秘钥协商方法
US10630476B1 (en) Obtaining keys from broadcasters in supersingular isogeny-based cryptosystems
CN103326852A (zh) 一种量子计算环境下的共享密钥建立方法
CN101860796B (zh) 一种抗同谋攻击的网络组播信息加密方法
Wen et al. Secret handshakes from ID-based message recovery signatures: A new generic approach
CN106571913A (zh) 一种面向电力无线专网的两方认证密钥协商方法
Tsai A novel authenticated group key agreement protocol for mobile environment
Nagesh et al. Comparative analysis of MOD-ECDH algorithm and various algorithms
CN107682150A (zh) 一种适用于计算资源非对称领域的共享密钥建立方法
Xia et al. Breaking and repairing the certificateless key agreement protocol from ASIAN 2006
Naresh et al. A new two-round dynamic authenticated contributory group key agreement protocol using elliptic curve Diffie–Hellman with privacy preserving public key infrastructure
Zhu Sustained and authenticated of a universal construction for multiple key agreement based on chaotic maps with privacy preserving
Jiaqing et al. A secure and efficient anonymous user authentication and key agreement scheme for global mobility networks based on bilinear pairing
CN108521329B (zh) 雾***中的动态安全信道建立方法
Youn et al. Signcryption with fast online signing and short signcryptext for secure and private mobile communication
Addepalli et al. A hybrid security framework for medical data in IoT applications
Ghoreishi et al. A novel secure two-party identity-based authenticated key agreement protocol without bilinear pairings
Kumar et al. A pairing free certificateless group key agreement protocol with constant round
Kumar et al. A Study of Pairing-Free Identity-Based Mutual Authenticated Protocol for Cloud Computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant