CN102685114B - Metering data transmission system based on identity encryption and data transmission method - Google Patents
Metering data transmission system based on identity encryption and data transmission method Download PDFInfo
- Publication number
- CN102685114B CN102685114B CN201210123242.0A CN201210123242A CN102685114B CN 102685114 B CN102685114 B CN 102685114B CN 201210123242 A CN201210123242 A CN 201210123242A CN 102685114 B CN102685114 B CN 102685114B
- Authority
- CN
- China
- Prior art keywords
- measuring terminal
- electric energy
- main website
- key
- energy meter
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses a metering data transmission system based on identity encryption, which comprises a host station, a metering terminal and an intelligent electric energy meter, wherein the intelligent electric energy meter encrypts metering data by adopting a working key and sends the metering data to the metering terminal; the metering terminal performs decryption by adopting the working key of the intelligent electric energy meter, then encrypts the metering data to form a ciphertext by using a public key of the metering terminal, generates a signature for the ciphertext, and sends the metering data and ciphertext information to the host station together; the host station verifies the signature by using the public key of the metering terminal, a private key of the metering terminal is generated after the signature is authenticated, and decryption for ciphertext information is performed so as to obtain an information plaintext; the host station generates a control command according to data processing results and encrypts the control command by adopting system sharing parameters and the public key of the metering terminal so as to generate the ciphertext, the ciphertext is sent to the metering terminal after the signature is generated, the metering terminal verifies the signature and the signature is authenticated, and the control command aiming at the intelligent electric energy meter is generated after the private key is adopted to decode the ciphertext and the control command is read; and in addition, the control command aiming at the intelligent electric energy meter is encrypted through the working key of the intelligent electric energy meter and then is sent to the intelligent electric energy meter. The metering data transmission system improves the security for data transmission, and reduces the calculating load of the host station.
Description
Technical field
The present invention relates to electric power data transmission technique field, particularly relate to a kind of continuous data transmission system of Identity-based encryption, also relate to the method that this system carries out transfer of data.
Background technology
Existing remote metering data transmission system generally comprises intelligent electric energy meter, measuring terminal and main website, wherein, measuring terminal is primarily of measuring equipment compositions such as plant stand electric energy acquisition terminal, load management terminal, low pressure meter-copy collector and distribution transformer monitoring and metering terminals.
In resident's low pressure automatic meter reading system of practical application, expressly read multiple intelligent electric energy meter by low pressure meter-copy collector to collect and after the user data sent, user data is sent to main website and carries out background process, in data transmission procedure, the fail safe of transfer of data is lower, is easy under attack; In order to overcome above-mentioned defect, at present, occurred the data transmission system adopting encryption technology, this data transmission system is generally set up asymmetric encryption mechanisms in main website and intelligent electric energy meter two ends, and the implication of asymmetric encryption mechanisms refers to that encryption, the key deciphered are identical; Continuous data from intelligent electric energy meter is forwarded by the measuring terminal such as low pressure meter-copy collector after encryption, and main website is to the decrypt data forwarded and receive, then deals with it, thus completes the transmission of continuous data between intelligent electric energy meter and main website.
But, also there is following defect in above-mentioned encrypted data transmission system: the key of (1) intelligent electric energy meter is generated by the key of main website and some dominant parameter role of intelligent electric energy meter, therefore, the fail safe of whole data transmission system only depends on the fail safe of main website key, once main website key is attacked, the data transmission security of whole system cannot be ensured effectively; (2) after existing encrypted data transmission system comes into operation, if upgrade the key of a wherein intelligent electric energy meter, just must do the key of intelligent electric energy meters all in this system and upgrade, therefore workload is very large, for practical operation brings the difficulty being difficult to overcome; (3) measuring terminal in existing encrypted data transmission system only has the function forwarding continuous data, and the data that all intelligent electric energy meters are uploaded process by main website, cause the calculated load of main website very large; (4) measuring terminal in existing encrypted data transmission system cannot carry out certification to encrypt data, is vulnerable to Denial of Service attack, thus affects the normal transmission of continuous data.
Summary of the invention
First object of the present invention is to provide a kind of continuous data transmission system that can improve continuous data transmission security, reduce the Identity-based encryption of main website calculated load.
Second object of the present invention is to provide aforesaid continuous data transmission system to carry out the method for transfer of data.
First object of the present invention realizes by the following technical solutions: a kind of continuous data transmission system of Identity-based encryption, comprises main website, measuring terminal and intelligent electric energy meter, it is characterized in that:
Main website, for producing system common parameter by Identity-based cryptography, and according to the PKI of system common parameter with measuring terminal, the private key of generation measuring terminal, is sent to measuring terminal by safe lane;
Measuring terminal, after receiving private key, generates the working key of intelligent electric energy meter and is sent to intelligent electric energy meter by safe lane;
Intelligent electric energy meter, is sent to measuring terminal after continuous data is adopted working key encryption;
Described intelligent electric energy meter is sent to measuring terminal after continuous data is adopted working key encryption, measuring terminal adopts the working key of intelligent electric energy meter to be decrypted, the public key encryption re-using measuring terminal becomes ciphertext, and after signature is generated to ciphertext, continuous data and cipher-text information are together sent to main website, main website uses the public key verifications signature of measuring terminal by rear, generate the private key of measuring terminal, to cipher-text information deciphering obtaining information expressly; Main website produces control command according to data processed result, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal certifying signature passes through, adopt private key decrypting ciphertext and the control command produced after reading control command for intelligent electric energy meter, by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter.
The present invention adopts the asymmetry sampling of identity-based to encrypt to carry out transfer of data between main website and measuring terminal, by main website as key generation centre, for measuring terminal generates private key, improve the fail safe of transfer of data, and between measuring terminal and intelligent electric energy meter, adopt the encryption of the symmetric key cryptography system of identity-based to carry out transfer of data, the user data that measuring terminal periodic collection, process intelligent electric energy meter are uploaded, measuring terminal has encryption and decryption functions, preliminary treatment can be carried out to the data of intelligent electric energy meter, alleviate the calculated load of main website.
Symmetric key cryptography system refers to that encryption and decryption use same key and same algorithm, and transmit leg and recipient's shared key and algorithm, and the safety condition of symmetric key cryptography system is that key must be maintained secrecy, and its advantage is that amount of calculation is little, computing is fast and cost is low; Asymmetry sampling refers to that encryption and decryption use different keys, and disclosed in one of them key is, another key is secret, and its advantage is that fail safe is good.
It is with IBC (Identity Based Cryptography that continuous data between intelligent electric energy meter of the present invention and main website transmits, Identity-based cryptography) based on, Identity-based cryptography is proposed in 1984 by one of the inventor of Israel scientist, famous RSA system A.Shamir, the basic theories of this cryptographic system is: Identity based encryption mechanism and data signature mechanism not certificate of necessity mechanism, can using the PKI of arbitrary string as user.Identity-based cryptography is made to be widely used in various technical field because above-mentioned cryptographic system has this characteristic.
As a modification of the present invention, described main website sends key updating instruction, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal receives ciphertext and by after certifying signature, by decrypt ciphertext, then by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter, intelligent electric energy meter receives ciphertext, upgrades after adopting the deciphering of the working key of intelligent electric energy meter to working key.The present invention can reach the object of regular update intelligent electric energy meter working key, to improve the fail safe of transfer of data.
The present invention also can do following improvement, and when initialization main website and measuring terminal, the identity information of measuring terminal adopts installation addresses, coding, sequence number codominance information.Make main website or other measuring terminal can the PKI of other measuring terminal in acquisition system easily.
Measuring terminal of the present invention is according to data processed result, produce the control command sending to main website, generating ciphertext instruction after ciphering signature, if measuring terminal and master station communication failure, ciphertext instruction be sent to and communicate with normal measuring terminal, measuring terminal, by certifying signature, adds after receiving ciphertext instruction and signs and be sent to main website, by certifying signature after main website receives, the private key deciphering of measuring terminal is adopted to obtain control command.In system operation, as emergency case, when part measuring terminal cannot be got in touch with main website, still send data to main website by contiguous measuring terminal.
As embodiments of the present invention, when described safe lane refers to data transmission system initialization, the mode such as powerline network, optical fiber, dialing, GPRS, CDMA, GSM or SMS is adopted to carry out the channel of the safe transmission of data.
Second object of the present invention realizes by the following technical solutions: a kind of data transmission method of continuous data transmission system of above-mentioned Identity-based encryption, it is characterized in that specifically comprising the following steps:
(1) set up system common parameter: main website produces system common parameter by Identity-based cryptography, calculate the PKI of measuring terminal;
(2) key distribution: the PKI that main website obtains according to system common parameter and measuring terminal, generates the private key of measuring terminal, and sends to measuring terminal by safe lane; After measuring terminal receives private key, initialization main website and measuring terminal, generate the working key of intelligent electric energy meter and send to intelligent electric energy meter by safe lane;
(3) continuous data transmission: intelligent electric energy meter is sent to measuring terminal after continuous data is adopted working key encryption, measuring terminal adopts the working key of intelligent electric energy meter to be decrypted, the public key encryption re-using measuring terminal becomes ciphertext, and after signature is generated to ciphertext, cipher-text information and signature are together sent to main website, main website uses the public key verifications signature of measuring terminal by rear, generate the private key of measuring terminal, to cipher-text information deciphering obtaining information expressly; Main website produces control command according to data processed result, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal certifying signature passes through, adopt private key decrypting ciphertext and the control command produced after reading control command for intelligent electric energy meter, by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter.
The present invention adopts the encryption of the asymmetry sampling of identity-based to carry out transfer of data between main website and measuring terminal, by main website as key generation centre, for measuring terminal generates private key, improve the fail safe of transfer of data, and between measuring terminal and intelligent electric energy meter, adopt the encryption of the symmetric key cryptography system of identity-based to carry out transfer of data, take full advantage of that asymmetric encryption techniques fail safe is good and symmetric cryptosystem amount of calculation is little, the feature that computing is fast and cost is low, key is distributed to measuring terminal, and as the important step of transfer of data, measuring terminal is made to have encryption and decryption functions, preliminary treatment can be carried out to the data of intelligent electric energy meter, alleviate the calculated load of main website, the Identity based encryption decipherment algorithm that encryption mechanism adopts, is a kind of public key system encryption method of elliptic curve class, has higher security intensity.
As the preferred embodiment of the present invention, the step that main website sets up system common parameter is as follows:
[1] main website produces the GDH group (G on two prime number q rank
1,+), (G
2) and Bilinear map e:G
1× G
1→ G
2, choose arbitrarily generator P ∈ G
1;
[2] main website random choose master key
calculate PKI P
pub=sP;
[3] a strong hash function H is selected
1: { 0,1}
*→ G
1, be mapped to G in order to the effective identity information measuring terminal
1in element;
[4] a strong hash function is selected
in order to determine the byte length of clear-text message, n
1represent the byte length of clear-text message;
[5] a strong hash function is selected
in order to generate the key in asymmetric encryption mechanisms, n
2represent the key length in asymmetric encryption mechanisms;
[6] a strong hash function is selected
[7] dispersion function Diff is selected
k(MetNum), k shows that length is n
2master control key, MetNum represents that in intelligent electric energy meter, length is n
3the sequence number of ESAM module;
If
represent measuring terminal Con
ieffective identity information, main website calculate g=e (P, P), retain s as system private key; The open system parameters PARAMS=(G of main website
1, G
2, e, P, P
pub, g, H
1, H
2, H
3, H
4).
The step of key distribution of the present invention is:
[1] measuring terminal Con
ieffective identity information is submitted to main website
after the authentication of main website, as measuring terminal Con
ipKI;
[2] main website system private key s calculates measuring terminal Con
iprivate key
and return to measuring terminal Con by safe lane
i, account form is as follows:
[3] measuring terminal
the master control key in subordinate's asymmetric encryption mechanisms is calculated with the private key that higher level's asymmetric encryption mechanism is distributed:
[4] measuring terminal
read intelligent electric energy meter Met
jeSAM module serial number MetNum
jand key updating factor S alt value (Salt initial value is set to complete zero), calculate the working key K of intelligent electric energy meter
j:
And inserted in advance in the ESAM module of intelligent electric energy meter by safe lane.
Transfer of data route of the present invention comprises main website → measuring terminal → intelligent electric energy meter and intelligent electric energy meter → measuring terminal → main website two transmission direction, and wherein the connection table such as distribution transformer monitoring and metering terminal and load management terminal is haggled over few measuring terminal and directly completed data communication by asymmetry sampling and main website; Measuring terminal is not simple forwarding data, but reads the laggard row relax of data, generates new data message; In the control command that main website or measuring terminal produce except comprising data message, also comprise the information such as current time stamp, instruction effective time.
Described main website is as follows to the step of intelligent electric energy meter sending controling instruction:
[1] main website is according to the data processed result of background system, produces and sends to measuring terminal Con
icontrol command M
1;
[2] main website is by system common parameter and measuring terminal Con
ipKI
by control command M
1encryption generating ciphertext G
1:
Wherein, r
1for
in random number;
[3] main website uses system private key to sign to ciphertext,
I.e. Sig
mas=sH
1(C
1);
[4] main website is by ' C
1|| Sig
mas' send to measuring terminal Con
i, wherein character string connects together by ' || ' expression;
[5] measuring terminal Con
ireceive ' C
1|| Sig
mas' after, first use the signature of system common parameter checking ciphertext, calculate:
E (Sig
mas, P) and=e (H
1(C
1), P
pub) whether set up,
Set up and then accept this signature, proceed to step (6), be false, refuse;
[6] after signature verification correctly, measuring terminal Con
iuse the private key of oneself
to the deciphering of ciphertext operation part, obtain command M
1:
[7] measuring terminal reads control command M
1, and produce corresponding for intelligent electric energy meter Met
jcontrol command M
2, by master control key, the intelligent electric energy meter Met of measuring terminal
jthe sequence number MetNum of ESAM module
jand key updating factor S alt value generates intelligent electric energy meter Met
jworking key K
j:
Adopt working key K
jintelligent electric energy meter Met is sent to after encryption
j;
[8] intelligent electric energy meter Met
jafter receiving ciphertext instruction, use work key K
jdeciphering is read and performs.
Intelligent electric energy meter transmission continuous data of the present invention is as follows to the step of main website:
[1] intelligent electric energy meter Met
jmake the information such as power consumption, electricity charge remaining sum according to user, produce data message M
1j, be sent to corresponding measuring terminal Con with working key encryption
i;
[2] measuring terminal Con
iafter receiving ciphertext, according to master control key, intelligent electric energy meter Met
jthe sequence number MetNum of ESAM module
jand key updating factor S alt value generates intelligent electric energy meter Met
jworking key K
j:
Data message M is obtained after decrypting ciphertext
1j;
[3] measuring terminal Con
ireceive intelligent electric energy meter Met successively
1, Met
2, Met
3... the data message M of transmission
11, M
12, M
13..., produce the data message M sending to main website after reading data
21, M
22, M
23..., then use public-key
be encrypted:
Wherein, r '
jfor
in random number;
[4] measuring terminal generates signature to ciphertext, note C
2=C
21|| C
22|| C
23..., sign as follows:
Wherein, r
3for
in random number;
[5] measuring terminal is by cipher-text information
be sent to main website;
[6], after main website receives cipher-text information, first measuring terminal Con is used
ipublic key verifications signature:
Namely verify
Whether set up,
Set up and then accept this signature, proceed to step (7), be false, refuse;
[7] signature verification errorless after, main website generates the private key of measuring terminal
and to decrypt ciphertext, obtain data message plaintext M
2j:
On above basis, in order to improve the fail safe of transfer of data further, as a modification of the present invention, key updating step is as follows:
[1] main website produces random number Salt
i, and generation comprises random number Salt
iand the key updating command M of the information such as current time stamp
new, by encrypting and sending to measuring terminal Con after process of signing
i, wherein
[2] measuring terminal Con
ireceive ciphertext and certifying signature errorless after, deciphering obtain Salt
i, and by Salt
iintelligent electric energy meter { Met all under being sent to this measuring terminal after encryption
1, Met
2..., Met
j... };
[3] intelligent electric energy meter Met
jafter receiving ciphertext, deciphering obtains Salt
i, working key is upgraded as follows:
[4] measuring terminal upgrades as follows to key updating factor S alt value:
Main website regularly produces key updating instruction, upgrades the working key of intelligent electric energy meter, effectively prevent the potential threat that the same key of Long-Time Service brings, improves the anti-attack ability of system.
As a further improvement on the present invention, the step of carrying out continuous data transmission between described measuring terminal is as follows:
[1] measuring terminal Con
iaccording to data processed result, produce the command information M sending to main website
tra, be encrypted and sign process, obtain '
’;
[2] measuring terminal Con
iwith under master station communication failure scenarios, measuring terminal Con
iciphertext instruction is sent to measuring terminal Con
j;
[3] measuring terminal Con
jaccording to measuring terminal Con
ipKI
and common parameter, check gauging terminal Con
jsigning messages, if correct, receive, proceed to step [4], if mistake, then refuse;
[4] measuring terminal Con
jright
add signature
send '
To main website;
[5] after main website receives information, certifying signature information respectively
with
if correct, receive, proceed to step [6], if mistake, then refuse;
[6] checking of main website signing messages errorless after, use the deciphering of work private key, obtain command information M
tra.
The identity information of measuring terminal adopts dominant information to make main website or other measuring terminal can the PKI of other measuring terminal in relatively easily acquisition system.In native system running, as emergency case, when namely part measuring terminal cannot be got in touch with main website, still send data to main website by contiguous measuring terminal, enhance the reliability of system.
Compared with prior art, the present invention has following significant effect:
(1) the present invention adopts the asymmetry sampling of identity-based to encrypt to carry out transfer of data between main website and measuring terminal, by main website as key generation centre, for measuring terminal generates private key, improve the fail safe of transfer of data, and between measuring terminal and intelligent electric energy meter, adopt the encryption of the symmetric key cryptography system of identity-based to carry out transfer of data, measuring terminal periodic collection, the user data that process intelligent electric energy meter is uploaded, measuring terminal has encryption and decryption functions, distribute double secret key, preliminary treatment is carried out to the data of sending of intelligent electric energy meter, alleviate main website calculated load.
(2) the Identity based encryption decipherment algorithm of encryption mechanism employing, is a kind of public key system encryption method of elliptic curve class, has higher security intensity.
(3) as emergency case, part measuring terminal when getting in touch with main website, still can by other measuring terminal by data upload to main website, effectively improve reliability and the fail safe of system.
(4) main website can carry out regular update to the working key of intelligent electric energy meter effectively, improves the fail safe of system.
(5) of the present invention practical, be particularly useful for the transmitting procedure of continuous data, and be applicable to the occasion that other has set of metadata of similar data transmission characteristic.
Accompanying drawing explanation
Below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.
Fig. 1 is present system initialization schematic diagram;
Fig. 2 is present system composition schematic diagram.
Embodiment
As shown in Figure 1, 2, be the continuous data transmission system of a kind of Identity-based encryption of the present invention, comprise:
Main website, for producing system common parameter by Identity-based cryptography, and according to the PKI of system common parameter with measuring terminal, the private key of generation measuring terminal, is sent to measuring terminal by safe lane;
Measuring terminal, after receiving private key, generates the working key of intelligent electric energy meter and is sent to intelligent electric energy meter by safe lane;
Intelligent electric energy meter, is sent to measuring terminal after continuous data is adopted working key encryption;
Intelligent electric energy meter is sent to measuring terminal after continuous data is adopted working key encryption, measuring terminal adopts the working key of intelligent electric energy meter to be decrypted, the public key encryption re-using measuring terminal becomes ciphertext, and after signature is generated to ciphertext, continuous data and cipher-text information are together sent to main website, main website uses the public key verifications signature of measuring terminal by rear, generate the private key of measuring terminal, to cipher-text information deciphering obtaining information expressly; Main website produces control command according to data processed result, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal certifying signature passes through, adopt private key decrypting ciphertext and the control command produced after reading control command for intelligent electric energy meter, by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter.
Main website sends key updating instruction, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal receives ciphertext and by after certifying signature, by decrypt ciphertext, again by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter, intelligent electric energy meter receives ciphertext, upgrades after adopting the deciphering of the working key of intelligent electric energy meter to working key.
When initialization main website and measuring terminal, the identity information of measuring terminal adopts installation addresses, coding, sequence number codominance information.Make main website or other measuring terminal can the PKI of other measuring terminal in acquisition system easily.Measuring terminal is according to data processed result, produce the control command sending to main website, generating ciphertext instruction after ciphering signature, if measuring terminal and master station communication failure, ciphertext instruction be sent to and communicate with normal measuring terminal, measuring terminal, by certifying signature, adds after receiving ciphertext instruction and signs and be sent to main website, by certifying signature after main website receives, the private key deciphering of measuring terminal is adopted to obtain control command.In system operation, as emergency case, when part measuring terminal cannot be got in touch with main website, still send data to main website by contiguous measuring terminal.
When safe lane refers to data transmission system initialization, the mode such as powerline network, optical fiber, dialing, GPRS, CDMA, GSM or SMS is adopted to carry out the channel of the safe transmission of data.
A data transmission method for the continuous data transmission system of above-mentioned Identity-based encryption, specifically comprises the following steps:
(1) set up system common parameter: main website produces system common parameter by Identity-based cryptography, calculate the PKI of measuring terminal;
(2) key distribution: the PKI that main website obtains according to system common parameter and measuring terminal, generates the private key of measuring terminal, and sends to measuring terminal by safe lane; After measuring terminal receives private key, generate the working key of intelligent electric energy meter and send to intelligent electric energy meter by safe lane;
(3) continuous data transmission: intelligent electric energy meter is sent to measuring terminal after continuous data is adopted working key encryption, measuring terminal adopts the working key of intelligent electric energy meter to be decrypted, the public key encryption re-using measuring terminal becomes ciphertext, and after signature is generated to ciphertext, continuous data and cipher-text information are together sent to main website, main website uses the public key verifications signature of measuring terminal by rear, generate the private key of measuring terminal, to cipher-text information deciphering obtaining information expressly; Main website produces control command according to data processed result, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal certifying signature passes through, adopt private key decrypting ciphertext and the control command produced after reading control command for intelligent electric energy meter, by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter.
The step that main website sets up system common parameter is as follows:
[1] main website produces the GDH group (G on two prime number q rank
1,+), (G
2) and Bilinear map e:G
1× G
1→ G
2, choose arbitrarily generator P ∈ G
1;
[2] main website random choose master key
calculate PKI P
pub=sP;
[3] a strong hash function H is selected
1: { 0,1}
*→ G
1, be mapped to G in order to the effective identity information measuring terminal
1in element;
[4] a strong hash function is selected
in order to determine the byte length of clear-text message, n
1represent the byte length of clear-text message;
[5] a strong hash function is selected
in order to generate the key in asymmetric encryption mechanisms, n
2represent the key length in asymmetric encryption mechanisms;
[6] a strong hash function is selected
[7] dispersion function Diff is selected
k(MetNum), k represents that length is n
2master control key, MetNum represents that in intelligent electric energy meter, length is n
3the sequence number of ESAM module.
If
represent measuring terminal Con
ieffective identity information, main website calculate g=e (P, P), retain s as system private key; The open system parameters PARAMS=(G of main website
1, G
2, e, P, P
pub, g, H
1, H
2, H
3, H
4).The step of key distribution is:
[1] measuring terminal Con
ieffective identity information is submitted to main website
after the authentication of main website, as measuring terminal Con
ipKI;
[2] main website system private key s calculates measuring terminal Con
iprivate key
and return to measuring terminal Con by safe lane
i, account form is as follows:
[3] measuring terminal
the master control key in subordinate's asymmetric encryption mechanisms is calculated with the private key that higher level's asymmetric encryption mechanism is distributed:
[4] measuring terminal
read intelligent electric energy meter Met
jeSAM module serial number MetNum
jand key updating factor S alt value (Salt initial value is set to complete zero), calculate the working key K of intelligent electric energy meter
j:
And inserted in advance in the ESAM module of intelligent electric energy meter by safe lane.
Main website is as follows to the step of intelligent electric energy meter sending controling instruction:
[1] main website is according to the data processed result of background system, produces and sends to measuring terminal Con
icontrol command M
1;
[2] main website is by system common parameter and measuring terminal Con
ipKI
by control command M
1encryption generating ciphertext G
1:
Wherein, r
1for
in random number;
[3] main website uses system private key to sign to ciphertext,
I.e. Sig
mas=sH
1(C
1);
[4] main website is by ' C
1|| Sig
mas' send to measuring terminal Con
i, wherein character string connects together by ' || ' expression;
[5] measuring terminal Con
ireceive ' C
1|| Sig
mas' after, first use the signature of system common parameter checking ciphertext, calculate:
E (Sig
mas, P) and=e (H
1(C
1), P
pub) whether set up,
Set up and then accept this signature, proceed to step (6), be false, refuse;
[6] after signature verification correctly, measuring terminal Con
iuse the private key of oneself
to the deciphering of ciphertext operation part, obtain command M
1:
[7] measuring terminal reads control command M
1, and produce corresponding for intelligent electric energy meter Met
jcontrol command M
2, by master control key, the intelligent electric energy meter Met of measuring terminal
jthe sequence number MetNum of ESAM module
jand key updating factor S alt value generates intelligent electric energy meter Met
jworking key K
j:
Adopt working key K
jintelligent electric energy meter Met is sent to after encryption
j;
[8] intelligent electric energy meter Met
jafter receiving ciphertext instruction, use work key K
jdeciphering is read and performs.Intelligent electric energy meter transmission continuous data is as follows to the step of main website:
[1] intelligent electric energy meter Met
jmake the information such as power consumption, electricity charge remaining sum according to user, produce data message M
1j, be sent to corresponding measuring terminal Con with working key encryption
i;
[2] measuring terminal Con
iafter receiving ciphertext, according to master control key, intelligent electric energy meter Met
jthe sequence number MetNum of ESAM module
jand key updating factor S alt value generates intelligent electric energy meter Met
jworking key K
j:
Data message M is obtained after decrypting ciphertext
1j;
[3] measuring terminal Con
ireceive intelligent electric energy meter Met successively
1, Met
2, Met
3... the data message M of transmission
11, M
12, M
13..., produce the data message M sending to main website after reading data
21, M
22, M
23..., then use public-key
be encrypted:
Wherein, r '
jfor
in random number;
[4] measuring terminal generates signature to ciphertext, note C
2=C
21|| C
22|| C
23..., sign as follows:
Wherein, r
3for
in random number;
[5] measuring terminal is by cipher-text information
be sent to main website;
[6], after main website receives cipher-text information, first measuring terminal Con is used
ipublic key verifications signature: namely verify
Whether set up, set up and then accept this signature, proceed to step (7), be false, refuse;
[7] signature verification errorless after, main website generates the private key of measuring terminal
and to decrypt ciphertext, obtain data message plaintext M
2j:
Key updating step is as follows:
[1] main website produces random number Salt
i, and generation comprises random number Salt
iand the key updating command M of the information such as current time stamp
new, by encrypting and sending to measuring terminal Con after process of signing
i, wherein
[2] measuring terminal Con
ireceive ciphertext and certifying signature errorless after, deciphering obtain Salt
i, and by Salt
iintelligent electric energy meter { Met all under being sent to this measuring terminal after encryption
1, Met
2..., Met
j... };
[3] intelligent electric energy meter Met
jafter receiving ciphertext, deciphering obtains Salt
i, working key is upgraded as follows:
[4] measuring terminal upgrades as follows to key updating factor S alt value:
The step of carrying out continuous data transmission (measuring terminal forwards the continuous data of other measuring terminal to main website) between measuring terminal is as follows:
[1] measuring terminal Con
iaccording to data processed result, produce the command information M sending to main website
tra, be encrypted and sign process, obtain '
’;
[2] measuring terminal Con
iwith under master station communication failure scenarios, measuring terminal Con
iciphertext instruction is sent to measuring terminal Con
j;
[3] measuring terminal Con
jaccording to measuring terminal Con
ipKI
and common parameter, check gauging terminal Con
jsigning messages, if correct, receive, proceed to step [4], if mistake, then refuse;
[4] measuring terminal Con
jright
add signature
, send '
' to main website;
[5] after main website receives information, certifying signature information respectively
with
if correct, receive, proceed to step [6], if mistake, then refuse;
[6] checking of main website signing messages errorless after, use the deciphering of work private key, obtain command information M
tra.
Embodiments of the present invention are not limited thereto; according to foregoing of the present invention; according to ordinary technical knowledge and the customary means of this area; do not departing under the present invention's above-mentioned basic fundamental thought prerequisite; the present invention can also make the amendment of other various ways, replacement or change, all drops within rights protection scope of the present invention.
Claims (9)
1. a continuous data transmission system for Identity-based encryption, comprises main website, measuring terminal and intelligent electric energy meter, it is characterized in that:
Main website, for producing system common parameter by Identity-based cryptography, and according to the PKI of system common parameter with measuring terminal, the private key of generation measuring terminal, is sent to measuring terminal by safe lane; The step that main website sets up system common parameter is as follows:
[1] main website produces the GDH group (G on two prime number q rank
1,+), (G
2) and Bilinear map e:G
1× G
1→ G
2, choose arbitrarily generator P ∈ G
1;
[2] main website random choose master key
calculate PKI P
pub=sP;
[3] a strong hash function H is selected
1: { 0,1}
*→ G
1, be mapped to G in order to the effective identity information measuring terminal
1in element;
[4] a strong hash function is selected
in order to determine the byte length of clear-text message, n
1represent the byte length of clear-text message;
[5] a strong hash function is selected
in order to generate the key in asymmetric encryption mechanisms, n
2represent the key length in asymmetric encryption mechanisms;
[6] a strong hash function is selected
[7] dispersion function Diff is selected
k(MetNum), k represents that length is n
2master control key, MetNum represents that in intelligent electric energy meter, length is n
3the sequence number of ESAM module;
If
represent measuring terminal Con
ieffective identity information, main website calculate g=e (P, P), retain s as system private key; The open system parameters PARAMS=(G of main website
1, G
2, e, P, P
pub, g, H
1, H
2, H
3, H
4);
Measuring terminal, for receive measuring terminal private key after, generate the working key of intelligent electric energy meter and be sent to intelligent electric energy meter by safe lane;
Intelligent electric energy meter, is sent to measuring terminal after continuous data is adopted working key encryption;
Described intelligent electric energy meter is sent to measuring terminal after continuous data is adopted working key encryption, measuring terminal adopts the working key of intelligent electric energy meter to be decrypted, the public key encryption re-using measuring terminal becomes ciphertext, and after signature is generated to ciphertext, continuous data and cipher-text information are together sent to main website, main website uses the public key verifications signature of measuring terminal by rear, generate the private key of measuring terminal, to cipher-text information deciphering obtaining information expressly; Main website produces control command according to data processed result, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal certifying signature passes through, adopt the private key decrypting ciphertext of measuring terminal and produce the control command for intelligent electric energy meter after reading, by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter.
2. the continuous data transmission system of Identity-based encryption according to claim 1, it is characterized in that: described main website sends key updating instruction, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal receives ciphertext and by after certifying signature, by decrypt ciphertext, again by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter, intelligent electric energy meter receives ciphertext, upgrades after adopting the deciphering of the working key of intelligent electric energy meter to working key.
3. the continuous data transmission system of Identity-based encryption according to claim 2, is characterized in that: when initialization main website and measuring terminal, and the identity information of measuring terminal adopts installation addresses, coding or serial number information; Described measuring terminal is according to data processed result, produce the control command sending to main website, generating ciphertext instruction after ciphering signature, if measuring terminal and master station communication failure, ciphertext instruction be sent to and communicate with normal measuring terminal, measuring terminal, by certifying signature, adds after receiving ciphertext instruction and signs and be sent to main website, by certifying signature after main website receives, the private key deciphering of measuring terminal is adopted to obtain control command.
4. the continuous data transmission system of Identity-based encryption according to claim 3, it is characterized in that: when described safe lane refers to data transmission system initialization, adopt powerline network, optical fiber, channel that dialing, GPRS, CDMA, GSM or SMS mode carry out the safe transmission of data.
5. a data transmission method for the continuous data transmission system of Identity-based encryption according to claim 1, is characterized in that specifically comprising the following steps:
(1) set up system common parameter: main website produces system common parameter by Identity-based cryptography, calculate the PKI of measuring terminal; The step that main website sets up system common parameter is as follows:
[1] main website produces the GDH group (G on two prime number q rank
1,+), (G
2) and Bilinear map e:G
1× G
1→ G
2, choose arbitrarily generator P ∈ G
1;
[2] main website random choose master key
calculate PKI P
pub=sP;
[3] a strong hash function H is selected
1: { 0,1}
*→ G
1, be mapped to G in order to the effective identity information measuring terminal
1in element;
[4] a strong hash function is selected
in order to determine the byte length of clear-text message, n
1represent the byte length of clear-text message;
[5] a strong hash function is selected
in order to generate the key in asymmetric encryption mechanisms, n
2represent the key length in asymmetric encryption mechanisms;
[6] a strong hash function is selected
[7] dispersion function Diff is selected
k(MetNum), k represents that length is n
2master control key, MetNum represents that in intelligent electric energy meter, length is n
3the sequence number of ESAM module;
If
represent measuring terminal Con
ieffective identity information, main website calculate g=e (P, P), retain s as system private key; The open system parameters PARAMS=(G of main website
1, G
2, e, P, P
pub, g, H
1, H
2, H
3, H
4);
(2) key distribution: the PKI that main website obtains according to system common parameter and measuring terminal, generates the private key of measuring terminal, and sends to measuring terminal by safe lane; After measuring terminal receives the private key of measuring terminal, initialization main website and measuring terminal, generate the working key of intelligent electric energy meter and send to intelligent electric energy meter by safe lane;
(3) continuous data transmission: intelligent electric energy meter is sent to measuring terminal after continuous data is adopted working key encryption, measuring terminal adopts the working key of intelligent electric energy meter to be decrypted, the public key encryption re-using measuring terminal becomes ciphertext, and after signature is generated to ciphertext, continuous data and cipher-text information are together sent to main website, main website uses the public key verifications signature of measuring terminal by rear, generate the private key of measuring terminal, to cipher-text information deciphering obtaining information expressly; Main website produces control command according to data processed result, the PKI of employing system common parameter and measuring terminal encrypts generating ciphertext to control command, measuring terminal is sent to after signature, measuring terminal certifying signature passes through, adopt the private key decrypting ciphertext of measuring terminal and produce the control command for intelligent electric energy meter after reading, by being sent to intelligent electric energy meter after the working key encryption of intelligent electric energy meter.
6. data transmission method according to claim 5, is characterized in that the step of described key distribution is:
[1] measuring terminal Con
ieffective identity information is submitted to main website
after the authentication of main website, as measuring terminal Con
ipKI;
[2] main website system private key s calculates measuring terminal Con
iprivate key
and return to measuring terminal Con by safe lane
i, account form is as follows:
[3] measuring terminal
the master control key in subordinate's asymmetric encryption mechanisms is calculated with the private key that higher level's asymmetric encryption mechanism is distributed:
[4] measuring terminal
read intelligent electric energy meter Met
jeSAM module serial number MetNum
jand key updating factor S alt value (Salt initial value is set to complete zero), calculate the working key K of intelligent electric energy meter
j:
And inserted in advance in the ESAM module of intelligent electric energy meter by safe lane.
7. data transmission method according to claim 6, is characterized in that described intelligent electric energy meter transmission continuous data is as follows to the step of main website:
[1] intelligent electric energy meter Met
jmake the information such as power consumption, electricity charge remaining sum according to user, produce data message M
1j, be sent to corresponding measuring terminal Con with working key encryption
i;
[2] measuring terminal Con
iafter receiving ciphertext, according to master control key, intelligent electric energy meter Met
jthe sequence number MetNum of ESAM module
jand key updating factor S alt value generates intelligent electric energy meter Met
jworking key K
j:
Data message M is obtained after decrypting ciphertext
1j;
[3] measuring terminal Con
ireceive intelligent electric energy meter Met successively
1, Met
2, Met
3the data message M sent
11, M
12, M
13, after reading data, produce the data message M sending to main website
21, M
22, M
23, then use public-key
be encrypted:
Wherein,
for
in random number;
[4] measuring terminal generates signature to ciphertext, note C
2=C
21|| C
22|| C
23, sign as follows:
Wherein, r
3for
in random number;
[5] measuring terminal is by cipher-text information
be sent to main website;
[6], after main website receives cipher-text information, first measuring terminal Con is used
ipublic key verifications signature:
Namely verify
Whether set up,
Set up and then accept this signature, proceed to step (7), be false, refuse;
[7] signature verification errorless after, main website generates the private key of measuring terminal
and to decrypt ciphertext, obtain data message plaintext M
2j:
Described main website is as follows to the step of intelligent electric energy meter sending controling instruction:
[1] main website is according to the data processed result of background system, produces and sends to measuring terminal Con
icontrol command M
1;
[2] main website is by system common parameter and measuring terminal Con
ipKI
by control command M
1encryption generating ciphertext C
1:
Wherein, r
1for
in random number;
[3] main website uses system private key to sign to ciphertext,
I.e. Sig
mas=sH
1(C
1);
[4] main website is by ' C
1|| Sig
mas' send to measuring terminal Con
i, wherein character string connects together by ' || ' expression;
[5] measuring terminal Con
ireceive ' C
1|| Sig
mas' after, first use the signature of system common parameter checking ciphertext, calculate:
E (Sig
mas, P) and=e (H
1(C
1), P
pub) whether set up,
Set up and then accept this signature, proceed to step (6), be false, refuse;
[6] after signature verification correctly, measuring terminal Con
iuse the private key of oneself
to the deciphering of ciphertext operation part, obtain command M
1:
[7] measuring terminal reads control command M
1, and produce corresponding for intelligent electric energy meter Met
jcontrol command M
2, by master control key, the intelligent electric energy meter Met of measuring terminal
jthe sequence number MetNum of ESAM module
jand key updating factor S alt value generates intelligent electric energy meter Met
jworking key K
j:
Adopt working key K
jintelligent electric energy meter Met is sent to after encryption
j;
[8] intelligent electric energy meter Met
jafter receiving ciphertext instruction, use work key K
jdeciphering is read and performs.
8. data transmission method according to claim 7, characterized by further comprising key updating step as follows:
[1] main website produces random number Salt
i, and generation comprises random number Salt
iand the key updating command M of the information such as current time stamp
new, by encrypting and sending to measuring terminal Con after process of signing
i, wherein
[2] measuring terminal Con
ireceive ciphertext and certifying signature errorless after, deciphering obtain Salt
i, and by Salt
iintelligent electric energy meter { Met all under being sent to this measuring terminal after encryption
1, Met
2..., Met
j...;
[3] intelligent electric energy meter Met
jafter receiving ciphertext, deciphering obtains Salt
i, working key is upgraded as follows:
K
j=K
j⊕ Salt
i, wherein ⊕ is XOR;
[4] measuring terminal upgrades as follows to key updating factor S alt value:
Salt=Salt⊕Salt
i。
9. data transmission method according to claim 8, the data retransmission step that characterized by further comprising between measuring terminal is as follows:
[1] measuring terminal Con
iaccording to data processed result, produce the command information M sending to main website
tra, be encrypted and sign process, obtains
[2] measuring terminal Con
iwith under master station communication failure scenarios, measuring terminal Con
iciphertext instruction is sent to measuring terminal Con
j;
[3] measuring terminal Con
jaccording to measuring terminal Con
ipKI
and common parameter, check gauging terminal Con
jsigning messages, if correct, receive, proceed to step [4], if mistake, then refuse;
[4] measuring terminal Con
jright
add signature
send
to main website;
[5] after main website receives information, certifying signature information respectively
with
if correct, receive, proceed to step [6], if mistake, then refuse;
[6] checking of main website signing messages errorless after, use the deciphering of work private key, obtain command information M
tra.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210123242.0A CN102685114B (en) | 2012-04-24 | 2012-04-24 | Metering data transmission system based on identity encryption and data transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210123242.0A CN102685114B (en) | 2012-04-24 | 2012-04-24 | Metering data transmission system based on identity encryption and data transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102685114A CN102685114A (en) | 2012-09-19 |
CN102685114B true CN102685114B (en) | 2015-02-11 |
Family
ID=46816477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210123242.0A Active CN102685114B (en) | 2012-04-24 | 2012-04-24 | Metering data transmission system based on identity encryption and data transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102685114B (en) |
Families Citing this family (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103001771B (en) * | 2012-11-14 | 2015-06-10 | 广东电网公司电力科学研究院 | Data transmission security encryption method for metering automation system |
CN103051450A (en) * | 2012-12-10 | 2013-04-17 | 中国电力科学研究院 | System and method applicable to electric power information collection system for distributing safety tasks |
CN104283675A (en) * | 2013-07-10 | 2015-01-14 | 中兴通讯股份有限公司 | Concentrator, electricity meter and message processing method of concentrator and electricity meter |
CN103473910B (en) * | 2013-09-11 | 2016-06-08 | 华南理工大学 | The method that calorimeter long-distance meter-reading system and this system realize Security Data Transmission |
CN103986570A (en) * | 2014-04-10 | 2014-08-13 | 深圳清华大学研究院 | Safe data transmission method of smart instrument system |
CN106559218A (en) * | 2015-09-29 | 2017-04-05 | 中国电力科学研究院 | A kind of safe acquisition method of intelligent substation continuous data |
CN105376238A (en) * | 2015-11-25 | 2016-03-02 | 国网河南省电力公司平顶山供电公司 | Optical fiber ring network self-healing communication based anti-misoperation locking device |
CN105450395A (en) * | 2015-12-30 | 2016-03-30 | 中科创达软件股份有限公司 | Information encryption and decryption processing method and system |
CN106448110B (en) * | 2016-10-26 | 2022-09-16 | 南方电网科学研究院有限责任公司 | Metering automation data acquisition system and method based on Beidou satellite |
CN106685991A (en) * | 2017-02-10 | 2017-05-17 | 华立科技股份有限公司 | Full life circle traceable electric energy meter based on wireless technology |
CN108933659B (en) * | 2017-05-26 | 2023-07-18 | 全球能源互联网研究院 | Identity verification system and method for smart power grid |
CN108960552B (en) * | 2017-05-27 | 2022-04-29 | 华为技术有限公司 | Charging method based on real-time electricity price and related equipment |
CN107896231B (en) * | 2017-12-27 | 2020-12-01 | 江苏联宏智慧能源股份有限公司 | Data encryption method for remote communication of energy hosting platform system |
CN108737449B (en) * | 2018-06-26 | 2021-05-28 | 华立科技股份有限公司 | Soft encryption authentication method and device and electronic equipment |
CN110034928B (en) * | 2019-03-29 | 2021-11-02 | 国网山东省电力公司梁山县供电公司 | Electric energy metering information transmission device and method |
CN111030817A (en) * | 2019-12-27 | 2020-04-17 | 广东电科院能源技术有限责任公司 | Method for safely transmitting file between transformer area terminal and electric energy meter and transformer area terminal |
CN111246462B (en) * | 2020-01-22 | 2021-09-24 | 南方电网电力科技股份有限公司 | Method, system and equipment for safely transmitting data between terminal and electric energy meter |
CN111696332A (en) * | 2020-06-10 | 2020-09-22 | 青岛鼎信通讯股份有限公司 | Thing allies oneself with edge processing unit system |
CN112019342B (en) * | 2020-06-30 | 2023-05-23 | 宁波三星医疗电气股份有限公司 | Data transmission method between electric energy meter and master station and electric energy meter |
CN112087300B (en) * | 2020-07-30 | 2023-04-28 | 宁波三星医疗电气股份有限公司 | Key distribution method for electric power field device |
CN112087299B (en) * | 2020-07-30 | 2023-04-28 | 宁波三星医疗电气股份有限公司 | Method for preventing fraudulent use of electricity |
CN112311528B (en) * | 2020-10-17 | 2023-06-23 | 深圳市德卡科技股份有限公司 | Data security transmission method based on cryptographic algorithm |
CN112379870A (en) * | 2020-11-16 | 2021-02-19 | 广东电网有限责任公司电力调度控制中心 | Intelligent terminal software architecture and control method thereof |
CN115201561B (en) * | 2021-04-09 | 2023-10-24 | 浙江正泰仪器仪表有限责任公司 | Electric energy meter data transmission system, control method and electric energy meter |
CN113595739B (en) * | 2021-07-30 | 2023-06-30 | 宁波三星医疗电气股份有限公司 | System and method for realizing switching of intelligent ammeter safety suite |
CN114567486B (en) * | 2022-03-01 | 2024-02-13 | 上海浦东软件平台有限公司 | Method and system for regulating and controlling metering parameters of intelligent metering equipment |
CN115051813B (en) * | 2022-08-12 | 2023-01-03 | 南京华盾电力信息安全测评有限公司 | New energy platform control instruction protection method and system |
CN115202952B (en) * | 2022-09-15 | 2022-11-29 | 北京智芯微电子科技有限公司 | Method and system for testing cost control function of electric energy meter, test host and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753312A (en) * | 2010-02-03 | 2010-06-23 | 北京融通高科科技发展有限公司 | Security certification method and security certification device for power grid equipment and negative control terminal |
-
2012
- 2012-04-24 CN CN201210123242.0A patent/CN102685114B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101753312A (en) * | 2010-02-03 | 2010-06-23 | 北京融通高科科技发展有限公司 | Security certification method and security certification device for power grid equipment and negative control terminal |
Non-Patent Citations (2)
Title |
---|
"基于身份的密码体制研究及其应用";陈静;《中国优秀硕士学位论文全文数据库信息科技辑》;20090415(第04期);全文 * |
"智能输电网信息安全技术研究";霍司天;《中国优秀硕士学位论文全文数据库工程科技II辑》;20110915(第09期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN102685114A (en) | 2012-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102685114B (en) | Metering data transmission system based on identity encryption and data transmission method | |
CN102811125B (en) | Certificateless multi-receiver signcryption method with multivariate-based cryptosystem | |
CN101789865B (en) | Dedicated server used for encryption and encryption method | |
CN105743646B (en) | A kind of Identity based encryption method and system | |
CN102082790B (en) | Method and device for encryption/decryption of digital signature | |
CN104767612B (en) | It is a kind of from the label decryption method without certificate environment to PKIX environment | |
CN103618610A (en) | Information safety algorithm based on energy information gateway in smart power grid | |
Saxena et al. | Integrated distributed authentication protocol for smart grid communications | |
CN105245326A (en) | Intelligent power grid safety communication method based on combination cipher | |
CN102946602A (en) | Mobile information system based privacy protection and encryption method | |
CN104363218A (en) | Proxy re-encryption method and system on basis of certificate conditions | |
CN102387152A (en) | Preset-key-based symmetric encryption communication method | |
CN106533656B (en) | A kind of key multilayer mixing method for encryption/decryption based on WSN | |
CN104168114A (en) | Distributed type (k, n) threshold certificate-based encrypting method and system | |
CN104767611B (en) | It is a kind of from PKIX environment to the label decryption method without certificate environment | |
CN103414559B (en) | A kind of identity identifying method of based on class IBE system under cloud computing environment | |
CN104301108A (en) | Signcryption method based from identity environment to certificateless environment | |
CN105610773A (en) | Communication encryption method of electric energy meter remote meter reading | |
CN102594551B (en) | Method for reliable statistics of privacy data on radio frequency identification (RFID) tag | |
CN104618109A (en) | Method for safely transmitting data of power terminal based on digital signature | |
CN106713349B (en) | Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text | |
CN104052601A (en) | Secret key isolation signcryption method | |
CN110113150A (en) | The encryption method and system of deniable authentication based on no certificate environment | |
CN102111273A (en) | Pre-sharing-based secure data transmission method for electric load management system | |
Wu et al. | A lightweight SM2-based security authentication scheme for smart grids |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |