CN105847002A - Method for sharing key in multi-party communication - Google Patents

Method for sharing key in multi-party communication Download PDF

Info

Publication number
CN105847002A
CN105847002A CN201610393551.8A CN201610393551A CN105847002A CN 105847002 A CN105847002 A CN 105847002A CN 201610393551 A CN201610393551 A CN 201610393551A CN 105847002 A CN105847002 A CN 105847002A
Authority
CN
China
Prior art keywords
communication
presider
shared key
communication ends
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610393551.8A
Other languages
Chinese (zh)
Other versions
CN105847002B (en
Inventor
张华�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610393551.8A priority Critical patent/CN105847002B/en
Publication of CN105847002A publication Critical patent/CN105847002A/en
Application granted granted Critical
Publication of CN105847002B publication Critical patent/CN105847002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

Abstract

The invention relates to a method for sharing a key in multi-party communication. The method is applied to a multi-party communication system. The multi-party communication system comprises at least three communication ends which participate in current multi-party communication. The method includes the following steps that: a host is determined from the at least three communication ends; the host sequences the other communication ends according to a first predetermined order, and carries out sharing key negotiation with a first communication end ranking the first; the host carries out sharing key negotiation with communication ends ranking after the first communication end sequentially according the first predetermined order; after a sharing key is obtained through negotiation each time, a sharing key obtained through current negotiation is encrypted by a sharing key obtained through the previous negotiation, and a communication end, which is involved in a sharing key negotiation process before the current key negotiation, is notified of the encrypted sharing key; and all communication ends which participate in the current multi-party communication use a sharing key obtained through the last sharing key negotiation process to encrypt the communication. With the method adopting, the shearing of the key in the multi-party communication can be realized.

Description

The method of shared key in multi-party communication
Technical field
The present invention relates to the network communications technology, close in particular to a kind of multi-party communication is shared The method of key.
Background technology
Generally, when multiple communication parties transmit data on the common channels, need to ensure the peace of communication Quan Xing, it is therefore desirable to transferring content is carried out encryption and decryption.As a example by Smart Home field, a family In the household electrical appliances of multiple different brands use and constructed carry out networking, network of this composition is the most permissible Regard a common signal channel as.But because each producer all has some sensitive datas to be not intended to by other factories The household electrical appliances of family capture, and therefore communicate the most in the network with the household electrical appliances of a manufacturer production Time, need transferring content is carried out encryption and decryption process.Aes algorithm is generally used to carry out encryption and decryption.
Fig. 1 is according to the multi-party communication scene schematic diagram shown in an example.In FIG, with two As a example by the household appliances of producer, wherein rectangle represents producer 1, including product: 1A~1D;Ellipticity tables Show producer 2, including product: 2A~2B.Each product is communicated by common signal channel CCH.
If product 1A with 1B communicates, the common practice of current industry is: (1) 1A generates ECC (Elliptic curve cryptography, Elliptic Curve Cryptography) the algorithm PKI of oneself Ecc_1A_puk_key and private key ecc_1A_priv_key;(2) 1B generates the ECC calculation of oneself Method PKI ecc_1B_puk_key and private key ecc_1B_priv_key;(3) 1A passes through common signal channel Its ECC algorithm PKI ecc_1A_puk_key is transferred to 1B by CCH;(4) 1B is by public affairs Its ECC algorithm PKI ecc_1B_puk_key is transferred to 1A by channel CCH altogether;(5)1A ECDH (Elliptic curve Diffie Hellman, elliptic curve key exchanges) is calculated respectively with 1B Shared secret, and generate aes algorithm shared key share_key according to shared secret;(6) it After, 1A and 1B uses shared key share_key to enter transferring content on common signal channel CCH Row AES encryption and decryption.
The program is the standard scheme designed to solve to communicate two-by-two, and in other words communication party is only There are two, shared key between the two communication party, and other communication parties on common signal channel do not join With communication.And when the communication (more than two sides) in many ways, as 1C and 1D in Fig. 1 is also added In communication, constituting communication set [1A, 1B, 1C, 1D], in this group, any one party (such as 1A) sends Data demand Zu Zhong each side (such as 1B, 1C and 1D) can receive and decipher, the most above-mentioned two-by-two The scheme of communication is the most applicable.
It is only used for strengthening the background to the present invention in information above-mentioned disclosed in described background section Understanding, therefore it can include not constituting prior art known to persons of ordinary skill in the art Information.
Summary of the invention
In view of this, a kind of method of shared key during the present invention provides multi-party communication, it is possible to realize In multi-party communication, key shares.
Other characteristics of the present invention and advantage will be apparent from by detailed description below, or part Ground acquistion by the practice of the present invention.
According to an aspect of the present invention, it is provided that a kind of method of shared key in multi-party communication, should In a multi-party communication system, described multi-party communication system includes that at least three communication ends participates in working as Front multi-party communication, described method includes: determine a hosting from described at least three communication ends Person;Other communication ends are sorted by described presider according to one first predefined procedure, and with come first First communication ends of position carries out shared key negotiation;Described presider is according to described first predefined procedure Successively with described first communication ends after communication ends carry out shared key negotiation;Negotiating every time After shared key, this shared key consulted is added by the shared key the most once consulted Close, and will encryption after shared key notify to this key agreement before shared key consulted Communication ends involved by journey;And the communication ends of all presently described multi-party communications of participation uses last The shared key that shared key negotiations process negotiates is encrypted communication.
According to an embodiment of the present invention, said method also includes: when other communication ends described When at least one exits, described presider is again current to participating according to one second predefined procedure The communication ends of described multi-party communication is ranked up, and carries out altogether with the second communication ends made number one Enjoy key agreement;Described presider according to described second predefined procedure successively with described second communication ends Communication ends afterwards carries out shared key negotiation;After negotiating key, the most once assist every time This shared key consulted is encrypted by the shared key of business, and by the shared key after encryption Notice is to the communication ends involved by the shared key negotiations process before this key agreement;And institute The communication ends participating in presently described multi-party communication is had to use last shared key negotiations process to consult The shared key gone out is encrypted communication.
According to an embodiment of the present invention, described first predefined procedure and described second predefined procedure Identical.
According to an embodiment of the present invention, said method also includes: described presider timing is to institute There is the communication ends broadcast heartbeat packet participating in presently described multi-party communication;And it is presently described many when participating in The communication ends of square tube letter does not receive the described heartbeat packet of described presider broadcast in a Preset Time Time, the communication ends participating in presently described multi-party communication consults to redefine new presider.
According to an embodiment of the present invention, said method also includes: when described presider determines to move back When going out presently described multi-party communication, described presider leading to the presently described multi-party communication of all participations Letter end sends a notification message.
According to an embodiment of the present invention, to include that described presider determines new for described notification message Presider.
According to an embodiment of the present invention, said method also includes: participate in presently described many square tubes The communication ends of letter consults to redefine new presider.
According to an embodiment of the present invention, from described at least three communication ends, a hosting is determined Person includes: selects from described at least three communication ends and adds the logical of presently described multi-party communication at first Letter end is described presider.
According to an embodiment of the present invention, described first predefined procedure includes: add presently described The sequencing of multi-party communication.
According to an embodiment of the present invention, said method also includes: when other communication ends described When two at least within are simultaneously introduced presently described multi-party communication, at random to the communication ends being simultaneously introduced It is ranked up.
According to an embodiment of the present invention, described cipher key agreement process includes being consulted by ECDH AES shared key.
According to the method for shared key in the multi-party communication of the present invention, it is possible to realize during multi-party communication close Key quickly, is effectively consulted and shares, and while ensureing multi-party communication security, improves communication Efficiency and cipher round results.
It addition, according to some embodiments, the method for shared key in the multi-party communication of the present invention, also The abnormal situation about exiting of current presider can be processed further, make currently to participate in the logical of multi-party communication Letter end can again be selected new presider and continue to preside over multi-party communication.
According to other embodiments, the method for shared key in the multi-party communication of the present invention, it is also possible to Process the situation that current presider normally exits further, make currently to participate in the communication ends of multi-party communication Can again select new presider or be specified new presider to continue to preside over by original presider Multi-party communication.
It should be appreciated that it is only exemplary that above general description and details hereinafter describe, The present invention can not be limited.
Accompanying drawing explanation
Its example embodiment is described in detail by referring to accompanying drawing, above and other target of the present invention, Feature and advantage will become apparent from.
Fig. 1 is according to the multi-party communication scene schematic diagram shown in an example.
Fig. 2 is according to the side of shared key in a kind of multi-party communication shown in an illustrative embodiments The flow chart of method.
Fig. 3 is according to shared key in the another kind of multi-party communication shown in an illustrative embodiments The flow chart of method.
Fig. 4 is according to shared key in another multi-party communication shown in an illustrative embodiments The flow chart of method.
Fig. 5 is according to shared key in another multi-party communication shown in an illustrative embodiments The flow chart of method.
Detailed description of the invention
It is described more fully with example embodiment referring now to accompanying drawing.But, example embodiment Can implement in a variety of forms, and be not understood as limited to example set forth herein;On the contrary, carry Make the present invention will more fully and completely for these embodiments, and by the structure of example embodiment Think to convey to those skilled in the art all sidedly.Accompanying drawing is only the schematic illustrations of the present invention, and Not necessarily is drawn to scale.Reference identical in figure represents same or similar part, because of And repetition thereof will be omitted.
Additionally, described feature, structure or characteristic can be combined in one in any suitable manner In individual or more embodiment.In the following description, it is provided that many details thus be given right Fully understanding of embodiments of the present invention.It will be appreciated, however, by one skilled in the art that it is permissible Put into practice technical scheme and omit in described specific detail one or more or permissible Use other method, constituent element, device, step etc..In other cases, be not shown in detail or Describe known features, method, device, realization, material or operation to make to avoid that a presumptuous guest usurps the role of the host Obtain each aspect of the present invention to thicken.
Fig. 2 is according to the side of shared key in a kind of multi-party communication shown in an illustrative embodiments The flow chart of method.The method is applicable to a multi-party communication system, and this multi-party communication system includes at least Three communication ends participate in current multi-party communication.Multi-party communication system such as can as it is shown in figure 1, its Middle common signal channel CCH can be that wire message way can also be for wireless channel, and the present invention is not limited. As in figure 2 it is shown, the method 10 of shared key includes in multi-party communication:
In step s 102, from above-mentioned at least three communication ends, a presider is determined.
As a example by three communication ends A, B, C, for example, it may be determined that first adds multi-party communication Communication ends A be presider, but the present invention is not limited.
In step S104, other communication ends are sorted by this presider according to a predefined procedure, and with The communication ends made number one carries out shared key negotiation.
Still as a example by three communication ends A, B, C, presider's for example, communication ends A, predefined procedure Can be such as communication ends B and the C order that adds this multi-party communication, but the present invention is not limited, Can also be such as the size order of communication ends ID (such as MAC Address), or can also be random Sequence etc..Assume that communication ends B adds this multi-party communication early than communication ends C, then presider A first with Communication ends B carries out shared key negotiation.Consult AES with presider A by ECDH and share close As a example by key, concrete machinery of consultation can be:
(1) presider A generates ECC algorithm PKI ecc_A_puk_key and the private key of oneself ecc_A_priv_key;
(2) communication ends B generates ECC algorithm PKI ecc_B_puk_key and the private key of oneself ecc_B_priv_key;
(3) its ECC algorithm PKI ecc_A_puk_key is transferred to communication ends by presider A B;
(4) its ECC algorithm PKI ecc_B_puk_key is transferred to presider by communication ends B A;
(5) presider A and communication ends B calculate ECDH shared secret respectively, and according to sharing Secret generation aes algorithm shared key AES_key_ab.
In step s 106, this presider is carried out with subsequent communications end altogether successively according to this predefined procedure Enjoy key agreement;After negotiating shared key every time, the shared key pair the most once consulted This shared key consulted is encrypted, and notifies the shared key after encryption to this secondary key The communication ends involved by shared key negotiations process before negotiation.
Such as, presider A continues to carry out shared key negotiation, concrete machinery of consultation with communication ends C May refer to presider A and the shared key machinery of consultation of communication ends B in step S104.Work as master After the person of holding A and communication ends C negotiate shared key AES_key_abc, presider A uses previous Shared key AES_key_abc is entered by shared key AES_key_ab negotiated with communication ends B Row encryption, and shared key AES_key_abc after this encryption is sent to this key agreement it Before communication ends B involved by shared key negotiations process, afterwards communication ends (presider) A, B, Shared key AES_key_abc is used to be encrypted communication between C.
If also including communication ends D in multi-party communication, and communication ends D adds the time of multi-party communication Be later than communication ends B and C, then presider A is further continued for and communication ends D negotiating about cipher key shared, obtains Shared key AES_key_abcd, the method for concrete negotiating about cipher key shared still can be found in step S104 Middle presider A and the shared key machinery of consultation of communication ends B.Afterwards, presider A uses previous Shared key AES_key_abc negotiated with communication ends C is to shared key AES_key_abcd It is encrypted, and shared key AES_key_abcd after this encryption is sent to this key agreement Communication ends B involved by shared key negotiations process before and C, afterwards communication ends (presider) Shared key AES_key_abcd is used to be encrypted communication between A, B, C, D.
If also including communication ends E in multi-party communication, and communication ends E adds the time of multi-party communication Be later than communication ends B, C and D, then presider A is further continued for and communication ends E negotiating about cipher key shared, Obtaining shared key AES_key_abcde, the method for concrete negotiating about cipher key shared still can be found in step Presider A and the shared key machinery of consultation of communication ends B in S104.Afterwards, presider A makes By previous shared key AES_key_abcd negotiated with communication ends D to shared key AES_key_abcde is encrypted, and shared key AES_key_abcde after this encryption is sent out Give communication ends B involved by shared key negotiations process before this key agreement, C and D, Communication ends (presider) uses shared key AES_key_abcde between A, B, C, D, E afterwards It is encrypted communication.
If the most more communication ends adds this multi-party communication, shared key negotiations process as above institute State, do not repeat them here.
In certain embodiments, if the predefined procedure used is communication ends adds multi-party communication end Sequencing, but such as communication ends D and E arrive simultaneously, and this method can also be to communication ends B Use the sequencing adding multi-party communication to do above-mentioned process with C, and determine communication ends D and E Order time, then use other order, the most randomly ordered, or communication ends ID size sequence It is ranked up Deng to communication ends D and E, negotiates communication set [A, B, C, D] according still further to said method respectively The shared key of [A, B, C, D, E].
In step S108, the communication ends of all these multi-party communications of participation uses last shared close The shared key that key negotiations process negotiates is encrypted communication.
The method of shared key in the multi-party communication of embodiment of the present invention, it is possible to realize multi-party communication Time key quickly, effectively consult and share, while ensureing multi-party communication security, improve The efficiency of communication and cipher round results.
It will be clearly understood that present disclosure describe how to be formed and use particular example, but the present invention Principle be not limited to any details of these examples.On the contrary, religion based on present disclosure Leading, these principles can be applied to numerous other embodiments.
Fig. 3 is according to shared key in the another kind of multi-party communication shown in an illustrative embodiments The flow chart of method.The method is still applicable to multi-party communication system, and this multi-party communication system includes At least three communication ends.Multi-party communication system such as can be as it is shown in figure 1, wherein common signal channel CCH Can be that wire message way can also be for wireless channel, the present invention be not limited.As it is shown on figure 3, In multi-party communication, the method 20 of shared key includes:
In step S202, after negotiating the shared key of communication ends of all participation multi-party communications, When have participate in this multi-party communication communication ends exit time, presider according to a predefined procedure again to work as The communication ends of front participation multi-party communication is ranked up.
This predefined procedure can be with the predefined procedure phase of employing in the shared key negotiations process of method 10 With, it is also possible to different.
In step S204, this presider carries out shared key negotiation with the communication ends made number one.
In step S206, this presider is carried out with subsequent communications end altogether successively according to this predefined procedure Enjoy key agreement;After negotiating key, the shared key the most once consulted is to this every time The shared key consulted is encrypted, and notifies the shared key after encryption to this key agreement The communication ends involved by shared key negotiations process before.
In step S208, the communication ends of current all these multi-party communications of participation uses last being total to Enjoy the shared key that cipher key agreement process negotiates and be encrypted communication.
The method of shared key in the multi-party communication of embodiment of the present invention, it is also possible to process further Midway has communication ends to exit the situation of multi-party communication, makes the communication ends currently participating in multi-party communication permissible The shared key after updating is used to continue communication.
In above-mentioned multi-party communication in the method 10 and 20 of shared key, in order to ensure the most in many ways All the time having a presider in communication, it is current main that embodiment of the present invention still further provides process The person of holding exits the method for situation extremely.Fig. 4 is another according to shown in an illustrative embodiments Plant the flow chart of the method for shared key in multi-party communication.As shown in Figure 4, multi-party communication is shared The method 30 of key includes:
In step s 302, presider's timing is wide to the communication ends of current all these multi-party communications of participation Broadcast a heartbeat packet.
Still with current multi-party communication group for [A, B, C, D, E].Presider A based on intervalometer timing to logical Letter end B, C, D and E broadcast heartbeat packet.
In step s 304, do not receive in a Preset Time when the communication ends participating in this multi-party communication To the heartbeat packet of presider's broadcast, then participate in the communication ends of this multi-party communication and consult that to reselect one new Presider.
Such as, communication ends B, C, D and E find not receive presider A in a Preset Time The heartbeat packet of broadcast, communication ends B, C, D and E consult to select from communication ends B, C, D and E The presider made new advances.Select new presider method can also according to above-mentioned according to communication ends B, C, D and E adds the order of multi-party communication and selects, or randomly ordered selects, or big according to communication ends ID Little sequence is selected, and the present invention is not limited.
False detection presider A in order to avoid causing because of packet loss exits extremely, and Preset Time can With the timing cycle more than presider's A fixed time broadcast heartbeat packet, such as, can be N number of timing cycle, N can be such as 2~5, but the present invention is not limited.
Additionally, after the elected presider made new advances, it is also possible to according to the side of shared key in multi-party communication Step in method 20, is again presided over by new presider and negotiates new the sharing of communication set [B, C, D, E] Key.
The method of shared key in the multi-party communication of embodiment of the present invention, it is also possible to process further The abnormal situation about exiting of current presider, makes the communication ends currently participating in multi-party communication again to select The presider made new advances continues to preside over multi-party communication.
Additionally, in above-mentioned multi-party communication in the method 10 and 20 of shared key, in order to ensure working as All the time having a presider in front multi-party communication, embodiment of the present invention still further provides process The method that current presider normally exits situation.Fig. 5 is to illustrate according to an illustrative embodiments Another multi-party communication in the flow chart of method of shared key.As it is shown in figure 5, multi-party communication The method 40 of middle shared key includes:
In step S402, when presider determine exit current multi-party communication time, this presider to The communication ends of current all this multi-party communications of participation sends a notification message.
Still with current multi-party communication group for [A, B, C, D, E].Presider A determine exit current in many ways During communication, presider A sends a notice to the communication ends of current all these multi-party communications of participation and disappears Breath.This notification message can include the new presider specified by presider A, such as presider A is according to the above-mentioned order adding multi-party communication according to communication ends B, C, D and E or randomly ordered, Or selecting new presider according to the sequence of communication ends ID size, the present invention is not limited.
Or presider A can not also select new presider, and by communication ends B, C, D and E Consult to select new presider.Namely this notification message does not include the new master that presider A specifies The person of holding.
In step s 404, when the communication ends participating in this multi-party communication receives this notification message, as Really carry new presider in this notification message, then the communication ends participating in this multi-party communication is new by this Presider continue to preside over this multi-party communication;If this notification message does not carry new hosting Person, then the communication ends participating in this multi-party communication consults to select new presider.
Such as, if it is communication ends B that former presider A selects new presider, and disappeared by notice Breath notice is to communication ends B, C, D and E, follow-up by presider B continuation hosted communication group [B, C, D, E] Communication.
And if former presider A does not select new presider, then communication ends B, C, D and E Consult from communication ends B, C, D and E, select new presider.The method selecting new presider Can also select according to the above-mentioned order according to communication ends B, C, D and E addition multi-party communication, or Randomly ordered selecting, or select according to the sequence of communication ends ID size, the present invention is not limited. Such as, selecting new presider is communication ends B, follow-up by presider B continuation hosted communication group The communication of [B, C, D, E].
Additionally, after the elected presider made new advances, it is also possible to according to the side of shared key in multi-party communication Step in method 20, is again presided over by new presider and negotiates new the sharing of communication set [B, C, D, E] Key.
The method of shared key in the multi-party communication of embodiment of the present invention, it is also possible to process further The situation that current presider normally exits, makes the communication ends currently participating in multi-party communication again to select The presider that makes new advances or specified new presider to continue to preside over multi-party communication by original presider.
It will be appreciated by those skilled in the art that all or part of step realizing above-mentioned embodiment is by reality Now for the computer program performed by CPU.When this computer program is performed by CPU, perform The above-mentioned functions that the said method that the present invention provides is limited.Described program can be stored in one In computer-readable recording medium, this storage medium can be read only memory, disk or CD Deng.
Further, it should be noted that above-mentioned accompanying drawing is only according to exemplary embodiment of the invention The schematically illustrating rather than limit purpose of process included by method.It can be readily appreciated that it is above-mentioned attached Process shown in figure is not intended that or limits these time sequencings processed.It addition, be also easy to reason Solving, these process can such as either synchronously or asynchronously perform in multiple modules.
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that retouch here The example embodiment stated can be realized by software, it is also possible to combines necessary hardware by software Mode realize.Therefore, the technical scheme according to embodiment of the present invention can be with software product Form embody, it is (permissible that this software product can be stored in a non-volatile memory medium Be CD-ROM, USB flash disk, portable hard drive etc.) in or network on, including some instructions so that one Platform calculates equipment (can be personal computer, server, mobile terminal or the network equipment etc.) Perform the method according to embodiment of the present invention.
More than it is particularly shown and described the illustrative embodiments of the present invention.It is understood that It is to the invention is not restricted to detailed construction described herein, set-up mode or implementation method;On the contrary, The invention is intended to contain the various amendments comprised in the spirit and scope of the appended claims and equivalence Arrange.

Claims (11)

1. a method for shared key in multi-party communication, is applied in a multi-party communication system, institute State multi-party communication system and include that at least three communication ends participates in current multi-party communication, it is characterised in that Described method includes:
A presider is determined from described at least three communication ends;
Other communication ends are sorted by described presider according to one first predefined procedure, and with come first First communication ends of position carries out shared key negotiation;
Described presider according to described first predefined procedure successively with described first communication ends after logical Letter end carries out shared key negotiation;After negotiating shared key, the most once consult every time This shared key consulted is encrypted by shared key, and by the shared key notice after encryption To the communication ends involved by the shared key negotiations process before this key agreement;And
The communication ends of the presently described multi-party communication of all participations uses last shared key to consult The shared key that journey negotiates is encrypted communication.
Method the most according to claim 1, it is characterised in that also include:
When at least one of other communication ends described exits, described presider is according to one second The communication ends participating in presently described multi-party communication is ranked up by predefined procedure again, and with come the Second communication ends of one carries out shared key negotiation;
Described presider according to described second predefined procedure successively with described second communication ends after logical Letter end carries out shared key negotiation;After negotiating key, that the most once consults shares every time This shared key consulted of double secret key is encrypted, and notifies the shared key after encryption to this The communication ends involved by shared key negotiations process before secondary key negotiation;And
The communication ends of the presently described multi-party communication of all participations uses last shared key to consult The shared key that journey negotiates is encrypted communication.
Method the most according to claim 2, it is characterised in that described first predefined procedure with Described second predefined procedure is identical.
Method the most according to claim 1, it is characterised in that also include:
Described presider timing broadcasts heart beating to the communication ends of the presently described multi-party communication of all participations Bag;And
When the communication ends participating in presently described multi-party communication does not receive described master in a Preset Time During the described heartbeat packet that the person of holding broadcasts, the communication ends participating in presently described multi-party communication is consulted the most true Fixed new presider.
Method the most according to claim 1, it is characterised in that also include: when described hosting When person determines to exit presently described multi-party communication, described presider is presently described in many ways to all participations The communication ends of communication sends a notification message.
Method the most according to claim 5, it is characterised in that described notification message includes institute State the new presider that presider determines.
Method the most according to claim 5, it is characterised in that also include: participate in current institute The communication ends stating multi-party communication consults to redefine new presider.
Method the most according to claim 1, it is characterised in that communicate from described at least three End being determined, a presider includes: select from described at least three communication ends and add currently at first The communication ends of described multi-party communication is described presider.
Method the most according to claim 1, it is characterised in that described first predefined procedure bag Include: add the sequencing of presently described multi-party communication.
Method the most according to claim 9, it is characterised in that also include: when described other At least within the two of communication ends when being simultaneously introduced presently described multi-party communication, at random to being simultaneously introduced Communication ends be ranked up.
11. according to the method described in any one of claim 1-10, it is characterised in that described key Negotiations process includes consulting AES shared key by ECDH.
CN201610393551.8A 2016-06-06 2016-06-06 The method of shared key in multi-party communication Active CN105847002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610393551.8A CN105847002B (en) 2016-06-06 2016-06-06 The method of shared key in multi-party communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610393551.8A CN105847002B (en) 2016-06-06 2016-06-06 The method of shared key in multi-party communication

Publications (2)

Publication Number Publication Date
CN105847002A true CN105847002A (en) 2016-08-10
CN105847002B CN105847002B (en) 2019-02-12

Family

ID=56575550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610393551.8A Active CN105847002B (en) 2016-06-06 2016-06-06 The method of shared key in multi-party communication

Country Status (1)

Country Link
CN (1) CN105847002B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN109039627A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, equipment, storage medium and system
CN109245885A (en) * 2018-11-02 2019-01-18 美的集团股份有限公司 Cryptographic key negotiation method, equipment, storage medium and system
CN109257170A (en) * 2018-11-02 2019-01-22 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN110138790A (en) * 2019-05-20 2019-08-16 核芯互联科技(青岛)有限公司 A kind of scheme for realizing secure broadcast communication in collision domain
CN110417553A (en) * 2019-08-07 2019-11-05 北京阿尔山区块链联盟科技有限公司 Secure Multi-Party communication means, device and user terminal
CN110855597A (en) * 2018-08-20 2020-02-28 北京京东金融科技控股有限公司 Message transmission method, server and client

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056176A (en) * 2007-05-31 2007-10-17 北京网秦天下科技有限公司 End-to-end encryption method and control device for the mobile phone SMS
CN104506534A (en) * 2014-12-25 2015-04-08 青岛微智慧信息有限公司 Safety communication secret key negotiation interaction scheme
US20160050067A1 (en) * 2014-08-12 2016-02-18 Robert Bosch Gmbh System and method for shared key agreement over untrusted communication channels
WO2016048054A2 (en) * 2014-09-24 2016-03-31 삼성전자 주식회사 Method, apparatus and system for secure data communication

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056176A (en) * 2007-05-31 2007-10-17 北京网秦天下科技有限公司 End-to-end encryption method and control device for the mobile phone SMS
US20160050067A1 (en) * 2014-08-12 2016-02-18 Robert Bosch Gmbh System and method for shared key agreement over untrusted communication channels
WO2016048054A2 (en) * 2014-09-24 2016-03-31 삼성전자 주식회사 Method, apparatus and system for secure data communication
CN104506534A (en) * 2014-12-25 2015-04-08 青岛微智慧信息有限公司 Safety communication secret key negotiation interaction scheme

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
汪小芬: "《基于身份的认证密钥协商协议的安全分析与改进》", 《通信学报》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106779707A (en) * 2016-12-23 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Monitoring and managing method, the apparatus and system of the digital cash Transaction Information based on block chain
CN110855597A (en) * 2018-08-20 2020-02-28 北京京东金融科技控股有限公司 Message transmission method, server and client
CN110855597B (en) * 2018-08-20 2022-08-09 京东科技控股股份有限公司 Message transmission method, server and client
CN109039627A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, equipment, storage medium and system
CN109245885A (en) * 2018-11-02 2019-01-18 美的集团股份有限公司 Cryptographic key negotiation method, equipment, storage medium and system
CN109257170A (en) * 2018-11-02 2019-01-22 美的集团股份有限公司 Cryptographic key negotiation method, equipment, terminal, storage medium and system
CN110138790A (en) * 2019-05-20 2019-08-16 核芯互联科技(青岛)有限公司 A kind of scheme for realizing secure broadcast communication in collision domain
CN110417553A (en) * 2019-08-07 2019-11-05 北京阿尔山区块链联盟科技有限公司 Secure Multi-Party communication means, device and user terminal
CN110417553B (en) * 2019-08-07 2022-12-27 北京阿尔山区块链联盟科技有限公司 Multi-party secret communication method and device and user terminal

Also Published As

Publication number Publication date
CN105847002B (en) 2019-02-12

Similar Documents

Publication Publication Date Title
CN105847002A (en) Method for sharing key in multi-party communication
Wang et al. Constant-round authenticated and dynamic group key agreement protocol for D2D group communications
CN107769914B (en) Method and network device for protecting data transmission security
EP2363977B1 (en) Methods and devices for computing a shared encryption key
JP5722868B2 (en) Method for secure communication in network, communication device, network, and computer program
US20110271334A1 (en) Method, system, and device for implementing device addition in wi-fi device to device network
CN111404950B (en) Information sharing method and device based on block chain network and related equipment
CN101771659B (en) Method, system and equipment for safe switch configuration
CN108347420A (en) A kind of method, relevant device and the system of netkey processing
CN115051791B (en) Efficient three-party privacy set intersection method and system based on key agreement
Wang et al. A hierarchical key management scheme for secure group communications in mobile ad hoc networks
US10505722B2 (en) Shared secret communication system with use of cloaking elements
KR20110039944A (en) Method for generating dynamic group key
Gong Efficient network authentication protocols: Lower bounds and optimal implementations
CN104205898A (en) Method and system for group based service bootstrap in M2M environment
TWI455555B (en) Authentication device, authentication method, and program
Byun et al. N-party encrypted Diffie-Hellman key exchange using different passwords
WO2020212207A1 (en) Method to authenticate a user at a service provider
JP2024503054A (en) Systems and methods for group key formation
JP2005182145A (en) Method for authenticating communication terminal device and communication terminal device
Karim et al. Improvements on new quantum key agreement protocol with five-qubit Brown states
Chain et al. Enhancement authentication protocol using zero‐knowledge proofs and chaotic maps
CN106487502B (en) Lightweight key negotiation method based on password
US7444514B2 (en) Group key exchanges with failures
US20220407845A1 (en) System and Method for Performing Secure Key Exchange

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant