CN105847002A - Method for sharing key in multi-party communication - Google Patents
Method for sharing key in multi-party communication Download PDFInfo
- Publication number
- CN105847002A CN105847002A CN201610393551.8A CN201610393551A CN105847002A CN 105847002 A CN105847002 A CN 105847002A CN 201610393551 A CN201610393551 A CN 201610393551A CN 105847002 A CN105847002 A CN 105847002A
- Authority
- CN
- China
- Prior art keywords
- communication
- presider
- shared key
- communication ends
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
Abstract
The invention relates to a method for sharing a key in multi-party communication. The method is applied to a multi-party communication system. The multi-party communication system comprises at least three communication ends which participate in current multi-party communication. The method includes the following steps that: a host is determined from the at least three communication ends; the host sequences the other communication ends according to a first predetermined order, and carries out sharing key negotiation with a first communication end ranking the first; the host carries out sharing key negotiation with communication ends ranking after the first communication end sequentially according the first predetermined order; after a sharing key is obtained through negotiation each time, a sharing key obtained through current negotiation is encrypted by a sharing key obtained through the previous negotiation, and a communication end, which is involved in a sharing key negotiation process before the current key negotiation, is notified of the encrypted sharing key; and all communication ends which participate in the current multi-party communication use a sharing key obtained through the last sharing key negotiation process to encrypt the communication. With the method adopting, the shearing of the key in the multi-party communication can be realized.
Description
Technical field
The present invention relates to the network communications technology, close in particular to a kind of multi-party communication is shared
The method of key.
Background technology
Generally, when multiple communication parties transmit data on the common channels, need to ensure the peace of communication
Quan Xing, it is therefore desirable to transferring content is carried out encryption and decryption.As a example by Smart Home field, a family
In the household electrical appliances of multiple different brands use and constructed carry out networking, network of this composition is the most permissible
Regard a common signal channel as.But because each producer all has some sensitive datas to be not intended to by other factories
The household electrical appliances of family capture, and therefore communicate the most in the network with the household electrical appliances of a manufacturer production
Time, need transferring content is carried out encryption and decryption process.Aes algorithm is generally used to carry out encryption and decryption.
Fig. 1 is according to the multi-party communication scene schematic diagram shown in an example.In FIG, with two
As a example by the household appliances of producer, wherein rectangle represents producer 1, including product: 1A~1D;Ellipticity tables
Show producer 2, including product: 2A~2B.Each product is communicated by common signal channel CCH.
If product 1A with 1B communicates, the common practice of current industry is: (1) 1A generates
ECC (Elliptic curve cryptography, Elliptic Curve Cryptography) the algorithm PKI of oneself
Ecc_1A_puk_key and private key ecc_1A_priv_key;(2) 1B generates the ECC calculation of oneself
Method PKI ecc_1B_puk_key and private key ecc_1B_priv_key;(3) 1A passes through common signal channel
Its ECC algorithm PKI ecc_1A_puk_key is transferred to 1B by CCH;(4) 1B is by public affairs
Its ECC algorithm PKI ecc_1B_puk_key is transferred to 1A by channel CCH altogether;(5)1A
ECDH (Elliptic curve Diffie Hellman, elliptic curve key exchanges) is calculated respectively with 1B
Shared secret, and generate aes algorithm shared key share_key according to shared secret;(6) it
After, 1A and 1B uses shared key share_key to enter transferring content on common signal channel CCH
Row AES encryption and decryption.
The program is the standard scheme designed to solve to communicate two-by-two, and in other words communication party is only
There are two, shared key between the two communication party, and other communication parties on common signal channel do not join
With communication.And when the communication (more than two sides) in many ways, as 1C and 1D in Fig. 1 is also added
In communication, constituting communication set [1A, 1B, 1C, 1D], in this group, any one party (such as 1A) sends
Data demand Zu Zhong each side (such as 1B, 1C and 1D) can receive and decipher, the most above-mentioned two-by-two
The scheme of communication is the most applicable.
It is only used for strengthening the background to the present invention in information above-mentioned disclosed in described background section
Understanding, therefore it can include not constituting prior art known to persons of ordinary skill in the art
Information.
Summary of the invention
In view of this, a kind of method of shared key during the present invention provides multi-party communication, it is possible to realize
In multi-party communication, key shares.
Other characteristics of the present invention and advantage will be apparent from by detailed description below, or part
Ground acquistion by the practice of the present invention.
According to an aspect of the present invention, it is provided that a kind of method of shared key in multi-party communication, should
In a multi-party communication system, described multi-party communication system includes that at least three communication ends participates in working as
Front multi-party communication, described method includes: determine a hosting from described at least three communication ends
Person;Other communication ends are sorted by described presider according to one first predefined procedure, and with come first
First communication ends of position carries out shared key negotiation;Described presider is according to described first predefined procedure
Successively with described first communication ends after communication ends carry out shared key negotiation;Negotiating every time
After shared key, this shared key consulted is added by the shared key the most once consulted
Close, and will encryption after shared key notify to this key agreement before shared key consulted
Communication ends involved by journey;And the communication ends of all presently described multi-party communications of participation uses last
The shared key that shared key negotiations process negotiates is encrypted communication.
According to an embodiment of the present invention, said method also includes: when other communication ends described
When at least one exits, described presider is again current to participating according to one second predefined procedure
The communication ends of described multi-party communication is ranked up, and carries out altogether with the second communication ends made number one
Enjoy key agreement;Described presider according to described second predefined procedure successively with described second communication ends
Communication ends afterwards carries out shared key negotiation;After negotiating key, the most once assist every time
This shared key consulted is encrypted by the shared key of business, and by the shared key after encryption
Notice is to the communication ends involved by the shared key negotiations process before this key agreement;And institute
The communication ends participating in presently described multi-party communication is had to use last shared key negotiations process to consult
The shared key gone out is encrypted communication.
According to an embodiment of the present invention, described first predefined procedure and described second predefined procedure
Identical.
According to an embodiment of the present invention, said method also includes: described presider timing is to institute
There is the communication ends broadcast heartbeat packet participating in presently described multi-party communication;And it is presently described many when participating in
The communication ends of square tube letter does not receive the described heartbeat packet of described presider broadcast in a Preset Time
Time, the communication ends participating in presently described multi-party communication consults to redefine new presider.
According to an embodiment of the present invention, said method also includes: when described presider determines to move back
When going out presently described multi-party communication, described presider leading to the presently described multi-party communication of all participations
Letter end sends a notification message.
According to an embodiment of the present invention, to include that described presider determines new for described notification message
Presider.
According to an embodiment of the present invention, said method also includes: participate in presently described many square tubes
The communication ends of letter consults to redefine new presider.
According to an embodiment of the present invention, from described at least three communication ends, a hosting is determined
Person includes: selects from described at least three communication ends and adds the logical of presently described multi-party communication at first
Letter end is described presider.
According to an embodiment of the present invention, described first predefined procedure includes: add presently described
The sequencing of multi-party communication.
According to an embodiment of the present invention, said method also includes: when other communication ends described
When two at least within are simultaneously introduced presently described multi-party communication, at random to the communication ends being simultaneously introduced
It is ranked up.
According to an embodiment of the present invention, described cipher key agreement process includes being consulted by ECDH
AES shared key.
According to the method for shared key in the multi-party communication of the present invention, it is possible to realize during multi-party communication close
Key quickly, is effectively consulted and shares, and while ensureing multi-party communication security, improves communication
Efficiency and cipher round results.
It addition, according to some embodiments, the method for shared key in the multi-party communication of the present invention, also
The abnormal situation about exiting of current presider can be processed further, make currently to participate in the logical of multi-party communication
Letter end can again be selected new presider and continue to preside over multi-party communication.
According to other embodiments, the method for shared key in the multi-party communication of the present invention, it is also possible to
Process the situation that current presider normally exits further, make currently to participate in the communication ends of multi-party communication
Can again select new presider or be specified new presider to continue to preside over by original presider
Multi-party communication.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe,
The present invention can not be limited.
Accompanying drawing explanation
Its example embodiment is described in detail by referring to accompanying drawing, above and other target of the present invention,
Feature and advantage will become apparent from.
Fig. 1 is according to the multi-party communication scene schematic diagram shown in an example.
Fig. 2 is according to the side of shared key in a kind of multi-party communication shown in an illustrative embodiments
The flow chart of method.
Fig. 3 is according to shared key in the another kind of multi-party communication shown in an illustrative embodiments
The flow chart of method.
Fig. 4 is according to shared key in another multi-party communication shown in an illustrative embodiments
The flow chart of method.
Fig. 5 is according to shared key in another multi-party communication shown in an illustrative embodiments
The flow chart of method.
Detailed description of the invention
It is described more fully with example embodiment referring now to accompanying drawing.But, example embodiment
Can implement in a variety of forms, and be not understood as limited to example set forth herein;On the contrary, carry
Make the present invention will more fully and completely for these embodiments, and by the structure of example embodiment
Think to convey to those skilled in the art all sidedly.Accompanying drawing is only the schematic illustrations of the present invention, and
Not necessarily is drawn to scale.Reference identical in figure represents same or similar part, because of
And repetition thereof will be omitted.
Additionally, described feature, structure or characteristic can be combined in one in any suitable manner
In individual or more embodiment.In the following description, it is provided that many details thus be given right
Fully understanding of embodiments of the present invention.It will be appreciated, however, by one skilled in the art that it is permissible
Put into practice technical scheme and omit in described specific detail one or more or permissible
Use other method, constituent element, device, step etc..In other cases, be not shown in detail or
Describe known features, method, device, realization, material or operation to make to avoid that a presumptuous guest usurps the role of the host
Obtain each aspect of the present invention to thicken.
Fig. 2 is according to the side of shared key in a kind of multi-party communication shown in an illustrative embodiments
The flow chart of method.The method is applicable to a multi-party communication system, and this multi-party communication system includes at least
Three communication ends participate in current multi-party communication.Multi-party communication system such as can as it is shown in figure 1, its
Middle common signal channel CCH can be that wire message way can also be for wireless channel, and the present invention is not limited.
As in figure 2 it is shown, the method 10 of shared key includes in multi-party communication:
In step s 102, from above-mentioned at least three communication ends, a presider is determined.
As a example by three communication ends A, B, C, for example, it may be determined that first adds multi-party communication
Communication ends A be presider, but the present invention is not limited.
In step S104, other communication ends are sorted by this presider according to a predefined procedure, and with
The communication ends made number one carries out shared key negotiation.
Still as a example by three communication ends A, B, C, presider's for example, communication ends A, predefined procedure
Can be such as communication ends B and the C order that adds this multi-party communication, but the present invention is not limited,
Can also be such as the size order of communication ends ID (such as MAC Address), or can also be random
Sequence etc..Assume that communication ends B adds this multi-party communication early than communication ends C, then presider A first with
Communication ends B carries out shared key negotiation.Consult AES with presider A by ECDH and share close
As a example by key, concrete machinery of consultation can be:
(1) presider A generates ECC algorithm PKI ecc_A_puk_key and the private key of oneself
ecc_A_priv_key;
(2) communication ends B generates ECC algorithm PKI ecc_B_puk_key and the private key of oneself
ecc_B_priv_key;
(3) its ECC algorithm PKI ecc_A_puk_key is transferred to communication ends by presider A
B;
(4) its ECC algorithm PKI ecc_B_puk_key is transferred to presider by communication ends B
A;
(5) presider A and communication ends B calculate ECDH shared secret respectively, and according to sharing
Secret generation aes algorithm shared key AES_key_ab.
In step s 106, this presider is carried out with subsequent communications end altogether successively according to this predefined procedure
Enjoy key agreement;After negotiating shared key every time, the shared key pair the most once consulted
This shared key consulted is encrypted, and notifies the shared key after encryption to this secondary key
The communication ends involved by shared key negotiations process before negotiation.
Such as, presider A continues to carry out shared key negotiation, concrete machinery of consultation with communication ends C
May refer to presider A and the shared key machinery of consultation of communication ends B in step S104.Work as master
After the person of holding A and communication ends C negotiate shared key AES_key_abc, presider A uses previous
Shared key AES_key_abc is entered by shared key AES_key_ab negotiated with communication ends B
Row encryption, and shared key AES_key_abc after this encryption is sent to this key agreement it
Before communication ends B involved by shared key negotiations process, afterwards communication ends (presider) A, B,
Shared key AES_key_abc is used to be encrypted communication between C.
If also including communication ends D in multi-party communication, and communication ends D adds the time of multi-party communication
Be later than communication ends B and C, then presider A is further continued for and communication ends D negotiating about cipher key shared, obtains
Shared key AES_key_abcd, the method for concrete negotiating about cipher key shared still can be found in step S104
Middle presider A and the shared key machinery of consultation of communication ends B.Afterwards, presider A uses previous
Shared key AES_key_abc negotiated with communication ends C is to shared key AES_key_abcd
It is encrypted, and shared key AES_key_abcd after this encryption is sent to this key agreement
Communication ends B involved by shared key negotiations process before and C, afterwards communication ends (presider)
Shared key AES_key_abcd is used to be encrypted communication between A, B, C, D.
If also including communication ends E in multi-party communication, and communication ends E adds the time of multi-party communication
Be later than communication ends B, C and D, then presider A is further continued for and communication ends E negotiating about cipher key shared,
Obtaining shared key AES_key_abcde, the method for concrete negotiating about cipher key shared still can be found in step
Presider A and the shared key machinery of consultation of communication ends B in S104.Afterwards, presider A makes
By previous shared key AES_key_abcd negotiated with communication ends D to shared key
AES_key_abcde is encrypted, and shared key AES_key_abcde after this encryption is sent out
Give communication ends B involved by shared key negotiations process before this key agreement, C and D,
Communication ends (presider) uses shared key AES_key_abcde between A, B, C, D, E afterwards
It is encrypted communication.
If the most more communication ends adds this multi-party communication, shared key negotiations process as above institute
State, do not repeat them here.
In certain embodiments, if the predefined procedure used is communication ends adds multi-party communication end
Sequencing, but such as communication ends D and E arrive simultaneously, and this method can also be to communication ends B
Use the sequencing adding multi-party communication to do above-mentioned process with C, and determine communication ends D and E
Order time, then use other order, the most randomly ordered, or communication ends ID size sequence
It is ranked up Deng to communication ends D and E, negotiates communication set [A, B, C, D] according still further to said method respectively
The shared key of [A, B, C, D, E].
In step S108, the communication ends of all these multi-party communications of participation uses last shared close
The shared key that key negotiations process negotiates is encrypted communication.
The method of shared key in the multi-party communication of embodiment of the present invention, it is possible to realize multi-party communication
Time key quickly, effectively consult and share, while ensureing multi-party communication security, improve
The efficiency of communication and cipher round results.
It will be clearly understood that present disclosure describe how to be formed and use particular example, but the present invention
Principle be not limited to any details of these examples.On the contrary, religion based on present disclosure
Leading, these principles can be applied to numerous other embodiments.
Fig. 3 is according to shared key in the another kind of multi-party communication shown in an illustrative embodiments
The flow chart of method.The method is still applicable to multi-party communication system, and this multi-party communication system includes
At least three communication ends.Multi-party communication system such as can be as it is shown in figure 1, wherein common signal channel CCH
Can be that wire message way can also be for wireless channel, the present invention be not limited.As it is shown on figure 3,
In multi-party communication, the method 20 of shared key includes:
In step S202, after negotiating the shared key of communication ends of all participation multi-party communications,
When have participate in this multi-party communication communication ends exit time, presider according to a predefined procedure again to work as
The communication ends of front participation multi-party communication is ranked up.
This predefined procedure can be with the predefined procedure phase of employing in the shared key negotiations process of method 10
With, it is also possible to different.
In step S204, this presider carries out shared key negotiation with the communication ends made number one.
In step S206, this presider is carried out with subsequent communications end altogether successively according to this predefined procedure
Enjoy key agreement;After negotiating key, the shared key the most once consulted is to this every time
The shared key consulted is encrypted, and notifies the shared key after encryption to this key agreement
The communication ends involved by shared key negotiations process before.
In step S208, the communication ends of current all these multi-party communications of participation uses last being total to
Enjoy the shared key that cipher key agreement process negotiates and be encrypted communication.
The method of shared key in the multi-party communication of embodiment of the present invention, it is also possible to process further
Midway has communication ends to exit the situation of multi-party communication, makes the communication ends currently participating in multi-party communication permissible
The shared key after updating is used to continue communication.
In above-mentioned multi-party communication in the method 10 and 20 of shared key, in order to ensure the most in many ways
All the time having a presider in communication, it is current main that embodiment of the present invention still further provides process
The person of holding exits the method for situation extremely.Fig. 4 is another according to shown in an illustrative embodiments
Plant the flow chart of the method for shared key in multi-party communication.As shown in Figure 4, multi-party communication is shared
The method 30 of key includes:
In step s 302, presider's timing is wide to the communication ends of current all these multi-party communications of participation
Broadcast a heartbeat packet.
Still with current multi-party communication group for [A, B, C, D, E].Presider A based on intervalometer timing to logical
Letter end B, C, D and E broadcast heartbeat packet.
In step s 304, do not receive in a Preset Time when the communication ends participating in this multi-party communication
To the heartbeat packet of presider's broadcast, then participate in the communication ends of this multi-party communication and consult that to reselect one new
Presider.
Such as, communication ends B, C, D and E find not receive presider A in a Preset Time
The heartbeat packet of broadcast, communication ends B, C, D and E consult to select from communication ends B, C, D and E
The presider made new advances.Select new presider method can also according to above-mentioned according to communication ends B, C,
D and E adds the order of multi-party communication and selects, or randomly ordered selects, or big according to communication ends ID
Little sequence is selected, and the present invention is not limited.
False detection presider A in order to avoid causing because of packet loss exits extremely, and Preset Time can
With the timing cycle more than presider's A fixed time broadcast heartbeat packet, such as, can be N number of timing cycle,
N can be such as 2~5, but the present invention is not limited.
Additionally, after the elected presider made new advances, it is also possible to according to the side of shared key in multi-party communication
Step in method 20, is again presided over by new presider and negotiates new the sharing of communication set [B, C, D, E]
Key.
The method of shared key in the multi-party communication of embodiment of the present invention, it is also possible to process further
The abnormal situation about exiting of current presider, makes the communication ends currently participating in multi-party communication again to select
The presider made new advances continues to preside over multi-party communication.
Additionally, in above-mentioned multi-party communication in the method 10 and 20 of shared key, in order to ensure working as
All the time having a presider in front multi-party communication, embodiment of the present invention still further provides process
The method that current presider normally exits situation.Fig. 5 is to illustrate according to an illustrative embodiments
Another multi-party communication in the flow chart of method of shared key.As it is shown in figure 5, multi-party communication
The method 40 of middle shared key includes:
In step S402, when presider determine exit current multi-party communication time, this presider to
The communication ends of current all this multi-party communications of participation sends a notification message.
Still with current multi-party communication group for [A, B, C, D, E].Presider A determine exit current in many ways
During communication, presider A sends a notice to the communication ends of current all these multi-party communications of participation and disappears
Breath.This notification message can include the new presider specified by presider A, such as presider
A is according to the above-mentioned order adding multi-party communication according to communication ends B, C, D and E or randomly ordered,
Or selecting new presider according to the sequence of communication ends ID size, the present invention is not limited.
Or presider A can not also select new presider, and by communication ends B, C, D and E
Consult to select new presider.Namely this notification message does not include the new master that presider A specifies
The person of holding.
In step s 404, when the communication ends participating in this multi-party communication receives this notification message, as
Really carry new presider in this notification message, then the communication ends participating in this multi-party communication is new by this
Presider continue to preside over this multi-party communication;If this notification message does not carry new hosting
Person, then the communication ends participating in this multi-party communication consults to select new presider.
Such as, if it is communication ends B that former presider A selects new presider, and disappeared by notice
Breath notice is to communication ends B, C, D and E, follow-up by presider B continuation hosted communication group [B, C, D, E]
Communication.
And if former presider A does not select new presider, then communication ends B, C, D and E
Consult from communication ends B, C, D and E, select new presider.The method selecting new presider
Can also select according to the above-mentioned order according to communication ends B, C, D and E addition multi-party communication, or
Randomly ordered selecting, or select according to the sequence of communication ends ID size, the present invention is not limited.
Such as, selecting new presider is communication ends B, follow-up by presider B continuation hosted communication group
The communication of [B, C, D, E].
Additionally, after the elected presider made new advances, it is also possible to according to the side of shared key in multi-party communication
Step in method 20, is again presided over by new presider and negotiates new the sharing of communication set [B, C, D, E]
Key.
The method of shared key in the multi-party communication of embodiment of the present invention, it is also possible to process further
The situation that current presider normally exits, makes the communication ends currently participating in multi-party communication again to select
The presider that makes new advances or specified new presider to continue to preside over multi-party communication by original presider.
It will be appreciated by those skilled in the art that all or part of step realizing above-mentioned embodiment is by reality
Now for the computer program performed by CPU.When this computer program is performed by CPU, perform
The above-mentioned functions that the said method that the present invention provides is limited.Described program can be stored in one
In computer-readable recording medium, this storage medium can be read only memory, disk or CD
Deng.
Further, it should be noted that above-mentioned accompanying drawing is only according to exemplary embodiment of the invention
The schematically illustrating rather than limit purpose of process included by method.It can be readily appreciated that it is above-mentioned attached
Process shown in figure is not intended that or limits these time sequencings processed.It addition, be also easy to reason
Solving, these process can such as either synchronously or asynchronously perform in multiple modules.
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that retouch here
The example embodiment stated can be realized by software, it is also possible to combines necessary hardware by software
Mode realize.Therefore, the technical scheme according to embodiment of the present invention can be with software product
Form embody, it is (permissible that this software product can be stored in a non-volatile memory medium
Be CD-ROM, USB flash disk, portable hard drive etc.) in or network on, including some instructions so that one
Platform calculates equipment (can be personal computer, server, mobile terminal or the network equipment etc.)
Perform the method according to embodiment of the present invention.
More than it is particularly shown and described the illustrative embodiments of the present invention.It is understood that
It is to the invention is not restricted to detailed construction described herein, set-up mode or implementation method;On the contrary,
The invention is intended to contain the various amendments comprised in the spirit and scope of the appended claims and equivalence
Arrange.
Claims (11)
1. a method for shared key in multi-party communication, is applied in a multi-party communication system, institute
State multi-party communication system and include that at least three communication ends participates in current multi-party communication, it is characterised in that
Described method includes:
A presider is determined from described at least three communication ends;
Other communication ends are sorted by described presider according to one first predefined procedure, and with come first
First communication ends of position carries out shared key negotiation;
Described presider according to described first predefined procedure successively with described first communication ends after logical
Letter end carries out shared key negotiation;After negotiating shared key, the most once consult every time
This shared key consulted is encrypted by shared key, and by the shared key notice after encryption
To the communication ends involved by the shared key negotiations process before this key agreement;And
The communication ends of the presently described multi-party communication of all participations uses last shared key to consult
The shared key that journey negotiates is encrypted communication.
Method the most according to claim 1, it is characterised in that also include:
When at least one of other communication ends described exits, described presider is according to one second
The communication ends participating in presently described multi-party communication is ranked up by predefined procedure again, and with come the
Second communication ends of one carries out shared key negotiation;
Described presider according to described second predefined procedure successively with described second communication ends after logical
Letter end carries out shared key negotiation;After negotiating key, that the most once consults shares every time
This shared key consulted of double secret key is encrypted, and notifies the shared key after encryption to this
The communication ends involved by shared key negotiations process before secondary key negotiation;And
The communication ends of the presently described multi-party communication of all participations uses last shared key to consult
The shared key that journey negotiates is encrypted communication.
Method the most according to claim 2, it is characterised in that described first predefined procedure with
Described second predefined procedure is identical.
Method the most according to claim 1, it is characterised in that also include:
Described presider timing broadcasts heart beating to the communication ends of the presently described multi-party communication of all participations
Bag;And
When the communication ends participating in presently described multi-party communication does not receive described master in a Preset Time
During the described heartbeat packet that the person of holding broadcasts, the communication ends participating in presently described multi-party communication is consulted the most true
Fixed new presider.
Method the most according to claim 1, it is characterised in that also include: when described hosting
When person determines to exit presently described multi-party communication, described presider is presently described in many ways to all participations
The communication ends of communication sends a notification message.
Method the most according to claim 5, it is characterised in that described notification message includes institute
State the new presider that presider determines.
Method the most according to claim 5, it is characterised in that also include: participate in current institute
The communication ends stating multi-party communication consults to redefine new presider.
Method the most according to claim 1, it is characterised in that communicate from described at least three
End being determined, a presider includes: select from described at least three communication ends and add currently at first
The communication ends of described multi-party communication is described presider.
Method the most according to claim 1, it is characterised in that described first predefined procedure bag
Include: add the sequencing of presently described multi-party communication.
Method the most according to claim 9, it is characterised in that also include: when described other
At least within the two of communication ends when being simultaneously introduced presently described multi-party communication, at random to being simultaneously introduced
Communication ends be ranked up.
11. according to the method described in any one of claim 1-10, it is characterised in that described key
Negotiations process includes consulting AES shared key by ECDH.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610393551.8A CN105847002B (en) | 2016-06-06 | 2016-06-06 | The method of shared key in multi-party communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610393551.8A CN105847002B (en) | 2016-06-06 | 2016-06-06 | The method of shared key in multi-party communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105847002A true CN105847002A (en) | 2016-08-10 |
CN105847002B CN105847002B (en) | 2019-02-12 |
Family
ID=56575550
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610393551.8A Active CN105847002B (en) | 2016-06-06 | 2016-06-06 | The method of shared key in multi-party communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105847002B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN109039627A (en) * | 2018-11-02 | 2018-12-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, storage medium and system |
CN109245885A (en) * | 2018-11-02 | 2019-01-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, storage medium and system |
CN109257170A (en) * | 2018-11-02 | 2019-01-22 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, terminal, storage medium and system |
CN110138790A (en) * | 2019-05-20 | 2019-08-16 | 核芯互联科技(青岛)有限公司 | A kind of scheme for realizing secure broadcast communication in collision domain |
CN110417553A (en) * | 2019-08-07 | 2019-11-05 | 北京阿尔山区块链联盟科技有限公司 | Secure Multi-Party communication means, device and user terminal |
CN110855597A (en) * | 2018-08-20 | 2020-02-28 | 北京京东金融科技控股有限公司 | Message transmission method, server and client |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056176A (en) * | 2007-05-31 | 2007-10-17 | 北京网秦天下科技有限公司 | End-to-end encryption method and control device for the mobile phone SMS |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
US20160050067A1 (en) * | 2014-08-12 | 2016-02-18 | Robert Bosch Gmbh | System and method for shared key agreement over untrusted communication channels |
WO2016048054A2 (en) * | 2014-09-24 | 2016-03-31 | 삼성전자 주식회사 | Method, apparatus and system for secure data communication |
-
2016
- 2016-06-06 CN CN201610393551.8A patent/CN105847002B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056176A (en) * | 2007-05-31 | 2007-10-17 | 北京网秦天下科技有限公司 | End-to-end encryption method and control device for the mobile phone SMS |
US20160050067A1 (en) * | 2014-08-12 | 2016-02-18 | Robert Bosch Gmbh | System and method for shared key agreement over untrusted communication channels |
WO2016048054A2 (en) * | 2014-09-24 | 2016-03-31 | 삼성전자 주식회사 | Method, apparatus and system for secure data communication |
CN104506534A (en) * | 2014-12-25 | 2015-04-08 | 青岛微智慧信息有限公司 | Safety communication secret key negotiation interaction scheme |
Non-Patent Citations (1)
Title |
---|
汪小芬: "《基于身份的认证密钥协商协议的安全分析与改进》", 《通信学报》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106779707A (en) * | 2016-12-23 | 2017-05-31 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain |
CN110855597A (en) * | 2018-08-20 | 2020-02-28 | 北京京东金融科技控股有限公司 | Message transmission method, server and client |
CN110855597B (en) * | 2018-08-20 | 2022-08-09 | 京东科技控股股份有限公司 | Message transmission method, server and client |
CN109039627A (en) * | 2018-11-02 | 2018-12-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, storage medium and system |
CN109245885A (en) * | 2018-11-02 | 2019-01-18 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, storage medium and system |
CN109257170A (en) * | 2018-11-02 | 2019-01-22 | 美的集团股份有限公司 | Cryptographic key negotiation method, equipment, terminal, storage medium and system |
CN110138790A (en) * | 2019-05-20 | 2019-08-16 | 核芯互联科技(青岛)有限公司 | A kind of scheme for realizing secure broadcast communication in collision domain |
CN110417553A (en) * | 2019-08-07 | 2019-11-05 | 北京阿尔山区块链联盟科技有限公司 | Secure Multi-Party communication means, device and user terminal |
CN110417553B (en) * | 2019-08-07 | 2022-12-27 | 北京阿尔山区块链联盟科技有限公司 | Multi-party secret communication method and device and user terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105847002B (en) | 2019-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105847002A (en) | Method for sharing key in multi-party communication | |
Wang et al. | Constant-round authenticated and dynamic group key agreement protocol for D2D group communications | |
CN107769914B (en) | Method and network device for protecting data transmission security | |
EP2363977B1 (en) | Methods and devices for computing a shared encryption key | |
JP5722868B2 (en) | Method for secure communication in network, communication device, network, and computer program | |
US20110271334A1 (en) | Method, system, and device for implementing device addition in wi-fi device to device network | |
CN111404950B (en) | Information sharing method and device based on block chain network and related equipment | |
CN101771659B (en) | Method, system and equipment for safe switch configuration | |
CN108347420A (en) | A kind of method, relevant device and the system of netkey processing | |
CN115051791B (en) | Efficient three-party privacy set intersection method and system based on key agreement | |
Wang et al. | A hierarchical key management scheme for secure group communications in mobile ad hoc networks | |
US10505722B2 (en) | Shared secret communication system with use of cloaking elements | |
KR20110039944A (en) | Method for generating dynamic group key | |
Gong | Efficient network authentication protocols: Lower bounds and optimal implementations | |
CN104205898A (en) | Method and system for group based service bootstrap in M2M environment | |
TWI455555B (en) | Authentication device, authentication method, and program | |
Byun et al. | N-party encrypted Diffie-Hellman key exchange using different passwords | |
WO2020212207A1 (en) | Method to authenticate a user at a service provider | |
JP2024503054A (en) | Systems and methods for group key formation | |
JP2005182145A (en) | Method for authenticating communication terminal device and communication terminal device | |
Karim et al. | Improvements on new quantum key agreement protocol with five-qubit Brown states | |
Chain et al. | Enhancement authentication protocol using zero‐knowledge proofs and chaotic maps | |
CN106487502B (en) | Lightweight key negotiation method based on password | |
US7444514B2 (en) | Group key exchanges with failures | |
US20220407845A1 (en) | System and Method for Performing Secure Key Exchange |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |