CN108063667A - Method for distributing key and device - Google Patents
Method for distributing key and device Download PDFInfo
- Publication number
- CN108063667A CN108063667A CN201810005853.2A CN201810005853A CN108063667A CN 108063667 A CN108063667 A CN 108063667A CN 201810005853 A CN201810005853 A CN 201810005853A CN 108063667 A CN108063667 A CN 108063667A
- Authority
- CN
- China
- Prior art keywords
- key
- sequence
- values
- matrix
- network node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Abstract
The present invention relates to method for distributing key and device.The described method includes:The node identification of network node in a network is obtained, carrying out numerical operation to the node identification obtains the first sequence of values;Corresponding second value sequence is determined according to first sequence of values;Corresponding set element is chosen from predetermined cipher key sets according to first sequence of values, second value sequence, obtains the corresponding key of the network node.The present invention solves the problems, such as the security that existing key agreement mechanisms are difficult to ensure that device node in wireless sensor network, and the security of the encryption key distribution of network node has been effectively ensured.
Description
Technical field
The present invention relates to technical field of network security, more particularly to method for distributing key and device.
Background technology
Wearable smart machine is had been widely used in military and national defense, environmental monitoring, medical treatment & health, industry and high-risk field
The fields such as data monitoring.Since the architecture of wearable smart machine is open, the Some features of its own determine
The security of network is poor, and criminal can easily eavesdrop, intercept and capture and forge the information of transmission, therefore security becomes
Wearable smart machine is badly in need of one of key issue solved.
Such as in the wireless sensor network being made of portable medical remote sensing equipment, due to no authentication center, and set
The processing capacity of slave node is limited, therefore most of existing key agreement mechanisms cannot be directly applied to such wireless sensing
In network, accordingly, it is difficult to which the security of device node in wireless sensor network is effectively ensured.
The content of the invention
Based on this, it is necessary to be difficult to ensure that the safety of device node in wireless sensor network for existing key agreement mechanisms
The problem of property, provide a kind of method for distributing key and device.
Scheme provided in an embodiment of the present invention includes:
A kind of method for distributing key, including:
The node identification of network node in a network is obtained, carrying out numerical operation to the node identification obtains the first numerical value
Sequence;Wherein, the node identification of each network node is unique in a network;
Corresponding second value sequence is determined according to first sequence of values;
Corresponding set is chosen from predetermined cipher key sets according to first sequence of values, second value sequence
Element obtains the corresponding key of the network node.
In one embodiment, carrying out the step of numerical operation obtains the first sequence of values to the node identification includes:
Hash operation is carried out to the node identification, obtains corresponding median;Modular arithmetic is carried out to the median, is obtained
To the first sequence of values.
In one embodiment, the step of determining corresponding second value sequence according to first sequence of values includes:
Transposition is carried out to first sequence of values, obtains corresponding second value sequence.
In one embodiment, the cipher key sets include public key matrix and private key matrix;
Corresponding set is chosen from predetermined cipher key sets according to first sequence of values, second value sequence
Element, the step of obtaining the network node corresponding key, include:
One matrix element is chosen as public from public key matrix according to first sequence of values, second value sequence
Key;One matrix element is chosen as private key from private key matrix according to first sequence of values, second value sequence;Thus
Obtain the corresponding key pair of the network node.
In one embodiment, a square is chosen from public key matrix according to first sequence of values, second value sequence
Array element element is used as public key;One matrix element is chosen from private key matrix according to first sequence of values, second value sequence
Include as the step of private key:
The row of matrix is determined according to each element in first sequence of values, is determined according to each element in second value sequence
Matrix column according to the row and column determined, chooses the first matrix element as public from public key matrix, private key matrix respectively
Key, the second matrix element are as private key.
In one embodiment, the corresponding key of the network node is obtained to afterwards, further including:
The public key is sent to the network node, the key is corresponding to being sent to the network node
Server.
In one embodiment, the network node includes device label and tag recognition node, and the server is to set
Standby monitoring server.
A kind of encryption key distribution device, including:
First ray determining module, for obtaining the node identification of network node in a network, to the node identification into
Row numerical operation obtains the first sequence of values;Wherein, the node identification of each network node is unique in a network;
Second sequence determining module, for determining corresponding second value sequence according to first sequence of values;
And key determining module, for according to first sequence of values, second value sequence from predetermined close
Corresponding set element is chosen in key set, obtains the corresponding key of the network node.
Implement above-described embodiment to have the advantages that:Numerical operation is carried out by the node identification to network node to obtain
To the first sequence of values and second value sequence;According to first sequence of values, second value sequence from predetermined close
Corresponding set element is chosen in key set, obtains the corresponding key of the network node;I.e. according to network node in a network
Node identification be that it distributes corresponding key pair, the security of encryption key distribution has been effectively ensured, has improved wireless sensor network
The problem of security of middle device node.
Description of the drawings
Fig. 1 is the schematic flow chart of the method for distributing key of an embodiment;
Fig. 2 is the schematic diagram of the key dispatching system of an embodiment;
Fig. 3 is the schematic diagram of the encryption key distribution device of an embodiment.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right
The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and
It is not used in the restriction present invention.
The term " comprising " and " having " of the embodiment of the present invention and their any deformations, it is intended that cover non-exclusive
Comprising.Such as contain series of steps or the process, method, system, product or equipment of (module) unit are not limited to
The step of listing or unit, but optionally further include the step of not listing or unit or optionally further include for these
The intrinsic other steps of process, method, product or equipment or unit.
Referenced herein " multiple " refer to two or more."and/or", the association for describing affiliated partner are closed
System, expression may have three kinds of relations, for example, A and/or B, can represent:Individualism A exists simultaneously A and B, individualism
These three situations of B.It is a kind of relation of "or" that character "/", which typicallys represent forward-backward correlation object,.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
Although the step in various embodiments of the present invention is arranged with label, it is not used to limit the priority time of step
Sequence, based on the order of step or the execution of certain step need other steps unless expressly stated, the otherwise phase of step
Order is adjustable.
Fig. 1 is the schematic flow chart of the method for distributing key of an embodiment;As shown in Figure 1, the key in the present embodiment
Distribution method includes step:
S11 obtains the node identification of network node in a network, and carrying out numerical operation to the node identification obtains first
Sequence of values;Wherein, the node identification of each network node is unique in a network.
Wherein, node identification can be node ID, for network node different in unique identification network.
In one embodiment, before the step S11, step is further included:It is distributed for each network node in system
The node ID uniquely determined.
S12 determines corresponding second value sequence according to first sequence of values.
Wherein, the element sum that first sequence of values and second value sequence include is identical.
S13 chooses corresponding according to first sequence of values, second value sequence from predetermined cipher key sets
Set element obtains the corresponding key of the network node.
In an alternative embodiment, the above-mentioned cipher key sets include public key matrix and private key matrix, the public key square
Multiple matrix elements are included in battle array and private key matrix.Accordingly, according to first sequence of values, second value sequence from pre-
The step of choosing corresponding set element in first definite cipher key sets, obtaining the network node corresponding key includes:Root
A matrix element is chosen as public key from public key matrix according to first sequence of values, second value sequence;According to described
First sequence of values, second value sequence choose a matrix element as private key from private key matrix;Thus the net is obtained
The corresponding key of network node.
In other alternative embodiments, it can also be chosen according to first sequence of values from predetermined cipher key sets
One set element from the cipher key sets is chosen a set element according to the second value sequence, is thus obtained again
The corresponding key pair of the network node.
The above method carries out numerical operation by the node identification to network node and obtains the first sequence of values and the second number
Value sequence;Corresponding set is chosen from predetermined cipher key sets according to first sequence of values and second value sequence
Thus element obtains the corresponding key of the network node;Distributed according to the node identification of network node in a network for it
The security of encryption key distribution has been effectively ensured in corresponding key pair, improves the security of device node in wireless sensor network
The problem of.
In one embodiment, by carrying out transposition processing to first sequence of values, corresponding second value sequence is obtained
Row.It should be understood that the specific implementation for determining corresponding second value sequence by the first sequence of values can also be other
Mode, above-described embodiment are not construed as unique restriction to above-mentioned steps realization method as an alternative embodiment.
It is above-mentioned that the step of first sequence of values is obtained to node identification progress numerical operation in an alternative embodiment
Suddenly include:Hash operation is carried out to the node identification, obtains corresponding median;Modular arithmetic is carried out to the median, is obtained
To the first sequence of values.
The binary value of random length is mapped as the binary value of shorter regular length by hash algorithm, this is small by two
Hex value is known as cryptographic Hash.It is described that Hash operation is carried out to the node identification, corresponding median is obtained to get to the section
The corresponding cryptographic Hash of point identification.Then by carrying out modular arithmetic to the cryptographic Hash, obtain and the node identification relevant the
One sequence of values.The first sequence of values which not only can guarantee is related to the node identification of network node, but also can be preferably
The different network node of differentiation.It should be understood that the specific method of determination of the first sequence of values can also be other modes, on
Embodiment is stated as an alternative embodiment, is not construed as unique restriction to the process.
In an alternative embodiment, it is above-mentioned according to first sequence of values, second value sequence from public key matrix
A matrix element is chosen as public key;According to first sequence of values, second value sequence one is chosen from private key matrix
A matrix element includes as the step of private key:The row of matrix is determined according to each element in first sequence of values, according to
Each element determines matrix column in two sequence of values, according to the row and column determined, is selected respectively from public key matrix, private key matrix
Take the first matrix element as public key, the second matrix element as private key.It i.e. will be in the first sequence of values, second value sequence
The index that element is chosen as matrix element not makees the numerical value of element in the first sequence of values, second value sequence in itself
For key, the security of encryption key distribution is further improved.
In an alternative embodiment, the corresponding key of the network node is obtained to afterwards, also wrapping by above-described embodiment
It includes:The public key is sent to the network node, by the key to being sent to the corresponding service of the network node
Device.Optionally, the network node includes device label and tag recognition node, and different types of network node collectively forms
One network system.Optionally, the server is the monitoring server for equipment.
It should be understood that the method for above-described embodiment, can be applied in wireless sensor network, wherein, the network section
Point includes device label and tag recognition node, and the server is monitoring of tools server.
Below exemplified by monitoring the wireless sensor network of portable medical remote sensing equipment, to the method for distributing key of the present invention
It is illustrated.Shown in Figure 2, above-mentioned wireless sensor network includes:Portable medical remote sensing equipment, tag recognition section
Point (SRN), remote monitoring server (RMS) and key-issuing server (KMS), the portable medical remote sensing equipment are set
There is device label (SIG);The network of composition is as shown in Figure 2.Wherein, remote monitoring server has respectively with key-distribution server
Definite network identifier exists between them and is reliably connected.KMS is that each network node specifies what is uniquely determined in system
Node ID, and each network node is submitted to by way of safety before node is set.RMS records effective node in system
ID databases, for matching effective node ID in current system.In the network structure having built up, child node allows same father
Node communicates, such as:Device label (SIG) communicates with tag recognition node (SRN), tag recognition node (SRN)
It communicates with remote monitoring server (RMS).
First, KMS situation setup parameters according to actual needs construct the key of cipher key combinations using elliptic curve
Matrix A, cipher key matrix B.Wherein, cipher key matrix A is public key matrix, and cipher key matrix B is private key matrix.
Further, the step of key-issuing server (KMS) corresponding according to node ID calculating network node key is such as
Under:
S1:The node ID of network node carried out by the computing of hash function algorithm to be converted into intermediate variable X;
S2:Modular arithmetic is carried out to X and obtains the random number sequence (i of mould m0,i1,…,ih-1);(wherein m is in cipher key matrix
Line number, h are the columns in cipher key matrix);
S3:To random number sequence (i0,i1,…,ih-1) carry out transposition get sequence (j in return0,j1,…,jh-1)T;
S4:Two sequences to obtain are chosen in A and B matrixes respectively as the index of the position of matrix element
Thus corresponding matrix element obtains the corresponding key pair of each network node.
Hereafter, public key is submitted to each net by key-issuing server (KMS) before node is set by way of safety
Network node, by key to being sent to remote monitoring server (RMS) by way of safety.It tag recognition node (SRN) and sets
Standby label (SIG) sends information using respective public key, and remote monitoring server (RMS) is corresponding to obtaining according to the key
Private key, and then the information sent to tag recognition node (SRN) or device label (SIG) is decrypted, and thus obtains network
The information of middle portable medical remote sensing equipment.
It it should be noted that for foregoing each method embodiment, describes, it is all expressed as a series of for simplicity
Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement, because according to
According to the present invention, some steps may be employed other orders or be carried out at the same time.In addition, can also arbitrary group be carried out to above-described embodiment
It closes, obtains other embodiments.
Based on the thought identical with the method for distributing key in above-described embodiment, the present invention also provides encryption key distribution device,
The device can be used for performing above-mentioned method for distributing key.For convenience of description, the structure diagram of encryption key distribution device embodiment
In, illustrate only with the relevant part of the embodiment of the present invention, it will be understood by those skilled in the art that schematic structure is not formed
Restriction to device can include either combining some components or different component cloth than illustrating more or fewer components
It puts.
Fig. 3 is the schematic diagram of the encryption key distribution device of one embodiment of the invention;As shown in figure 3, the present embodiment
Encryption key distribution device includes:
First ray determining module, for obtaining the node identification of network node in a network, to the node identification into
Row numerical operation obtains the first sequence of values;Wherein, the node identification of each network node is unique in a network;
Second sequence determining module, for determining corresponding second value sequence according to first sequence of values;
And key determining module, for according to first sequence of values, second value sequence from predetermined close
Corresponding set element is chosen in key set, obtains the corresponding key of the network node.
In an alternative embodiment, the First ray determining module, specifically for carrying out Hash to the node identification
Computing obtains corresponding median;Modular arithmetic is carried out to the median, obtains the first sequence of values.
In an alternative embodiment, the second sequence determining module, specifically for being carried out to first sequence of values
Transposition obtains corresponding second value sequence.
In an alternative embodiment, the cipher key sets include public key matrix and private key matrix;The key determining module,
Specifically for a matrix element is chosen from public key matrix according to first sequence of values, second value sequence as public
Key;One matrix element is chosen as private key from private key matrix according to first sequence of values, second value sequence;Thus
Obtain the corresponding key pair of the network node.
In an alternative embodiment, the encryption key distribution device further includes:Key distribution module, for the public key to be sent out
The network node is given, by the key to being sent to the corresponding server of the network node.
Optionally, in above-described embodiment, network node includes device label and tag recognition node, and the server is
Monitoring of tools server.
It should be noted that encryption key distribution device and the method for distributing key of the present invention are based on same design, in key point
In embodiment with device, the contents such as information exchange, implementation procedure between each module are a pair of with above method embodiment one
It should.It is suitable for encryption key distribution device in the technical characteristic and its advantage of the embodiment elaboration of above-mentioned method for distributing key
In embodiment, hereby give notice that.
In addition, in the embodiment of the encryption key distribution device of above-mentioned example, the logical partitioning of each program module is only citing
Illustrate, can be as needed in practical application, such as examined for the facility of the realization of the configuration requirement or software of corresponding hardware
Consider, above-mentioned function distribution by different program modules is completed, i.e., is divided into the internal structure of the encryption key distribution device not
Same program module, to complete all or part of function described above.
It will appreciated by the skilled person that realizing all or part of flow in above-described embodiment method, being can
Relevant hardware to be instructed to complete by computer program, the program can be stored in a computer-readable storage and be situated between
In matter, production marketing or use are independent.Described program upon execution, can perform the complete of such as method of the various embodiments described above
Portion or part steps.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only
Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
Accordingly, a kind of storage medium is also provided in one embodiment, is stored thereon with computer program, wherein, the journey
It is realized when sequence is executed by processor such as any one method for distributing key in the various embodiments described above.
In addition, the storage medium can be also set in a kind of computer equipment, place is further included in the computer equipment
Manage device, when the processor performs the program in the storage medium, can realize the method for the various embodiments described above whole or
Part steps.
Accordingly, a kind of computer equipment is also provided in one embodiment, which includes memory, processor
And the computer program that can be run on a memory and on a processor is stored, wherein, processor is realized when performing described program
Such as any one method for distributing key in the various embodiments described above.
In the above-described embodiments, all emphasize particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, it may refer to the associated description of other embodiments.
It is appreciated that the term " first second " involved by the embodiment of the present invention is only to be the similar object of difference, no
Represent the particular sorted for object, it is possible to understand that ground, " first second " can exchange specific order in the case of permission
Or precedence.It should be appreciated that the object that " first second " is distinguished can exchange in the appropriate case, so that described herein
The embodiment of invention can be implemented with the order in addition to those for illustrating or describing herein.
Embodiment described above only expresses the several embodiments of the present invention, it is impossible to be interpreted as to the scope of the claims of the present invention
Limitation.It should be pointed out that for those of ordinary skill in the art, without departing from the inventive concept of the premise,
Various modifications and improvements can be made, these belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention
It should be determined by the appended claims.
Claims (10)
1. a kind of method for distributing key, which is characterized in that including:
The node identification of network node in a network is obtained, carrying out numerical operation to the node identification obtains the first numerical value sequence
Row;
Corresponding second value sequence is determined according to first sequence of values;
Corresponding set member is chosen from predetermined cipher key sets according to first sequence of values, second value sequence
Element obtains the corresponding key of the network node.
2. method for distributing key according to claim 1, which is characterized in that numerical operation is carried out to the node identification and is obtained
Include to the step of the first sequence of values:
Hash operation is carried out to the node identification, obtains corresponding median;Modular arithmetic is carried out to the median, obtains the
One sequence of values.
3. method for distributing key according to claim 1, which is characterized in that determined pair according to first sequence of values
The step of second value sequence answered, includes:
Transposition is carried out to first sequence of values, obtains corresponding second value sequence.
4. method for distributing key according to any one of claims 1 to 3, which is characterized in that the cipher key sets include public key
Matrix and private key matrix;
Corresponding set member is chosen from predetermined cipher key sets according to first sequence of values, second value sequence
Element, the step of obtaining the network node corresponding key, include:
One matrix element is chosen as public key from public key matrix according to first sequence of values, second value sequence;Root
A matrix element is chosen as private key from private key matrix according to first sequence of values, second value sequence;Thus obtain
The corresponding key pair of the network node.
5. method for distributing key according to claim 4, which is characterized in that according to first sequence of values, the second number
Value sequence chooses a matrix element as public key from public key matrix;According to first sequence of values, second value sequence
A matrix element is chosen from private key matrix to be included as the step of private key:
The row of matrix is determined according to each element in first sequence of values, matrix is determined according to each element in second value sequence
Row, according to the row and column determined, the first matrix element is chosen from public key matrix, private key matrix respectively as public key,
Two matrix elements are as private key.
6. method for distributing key according to claim 4 or 5, which is characterized in that it is corresponding close to obtain the network node
Key is to afterwards, further including:
The public key is sent to the network node, by the key to being sent to the corresponding service of the network node
Device.
7. method for distributing key according to claim 6, which is characterized in that the network node include device label and
Tag recognition node, the server are monitoring of tools server.
8. a kind of encryption key distribution device, which is characterized in that including:
First ray determining module, for obtaining the node identification of network node in a network, to the node identification into line number
Value computing obtains the first sequence of values;
Second sequence determining module, for determining corresponding second value sequence according to first sequence of values;
And key determining module, for according to first sequence of values, second value sequence from predetermined key set
Corresponding set element is chosen in conjunction, obtains the corresponding key of the network node.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor
The step of claim 1 to 7 any the method is realized during row.
10. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor
Calculation machine program, which is characterized in that the processor realizes the step of claim 1 to 7 any the method when performing described program
Suddenly.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810005853.2A CN108063667A (en) | 2018-01-03 | 2018-01-03 | Method for distributing key and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810005853.2A CN108063667A (en) | 2018-01-03 | 2018-01-03 | Method for distributing key and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108063667A true CN108063667A (en) | 2018-05-22 |
Family
ID=62141111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810005853.2A Pending CN108063667A (en) | 2018-01-03 | 2018-01-03 | Method for distributing key and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108063667A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462579A (en) * | 2018-05-23 | 2018-08-28 | 东南大学 | A kind of method for distributing key based on cipher key matrix |
CN110224811A (en) * | 2019-05-13 | 2019-09-10 | 中国联合网络通信集团有限公司 | Internet of Things cipher processing method, apparatus and system |
CN114285655A (en) * | 2021-12-27 | 2022-04-05 | 中国电信股份有限公司 | Key determination method and device, storage medium and electronic device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1832403A (en) * | 2006-04-24 | 2006-09-13 | 北京易恒信认证科技有限公司 | CPK credibility authorization system |
CN101340282A (en) * | 2008-05-28 | 2009-01-07 | 北京易恒信认证科技有限公司 | Generation method of composite public key |
US20090167489A1 (en) * | 2006-03-23 | 2009-07-02 | Nan Xianghao | Anti-forgery method and apparatus based on cpk electronic tag |
CN104378374A (en) * | 2014-11-14 | 2015-02-25 | 国家超级计算深圳中心(深圳云计算中心) | SSL-based method and system for establishing communication |
CN104780532A (en) * | 2015-05-08 | 2015-07-15 | 淮海工学院 | Cluster key management method capable of being used for wireless sensor network |
-
2018
- 2018-01-03 CN CN201810005853.2A patent/CN108063667A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090167489A1 (en) * | 2006-03-23 | 2009-07-02 | Nan Xianghao | Anti-forgery method and apparatus based on cpk electronic tag |
CN1832403A (en) * | 2006-04-24 | 2006-09-13 | 北京易恒信认证科技有限公司 | CPK credibility authorization system |
CN101340282A (en) * | 2008-05-28 | 2009-01-07 | 北京易恒信认证科技有限公司 | Generation method of composite public key |
CN104378374A (en) * | 2014-11-14 | 2015-02-25 | 国家超级计算深圳中心(深圳云计算中心) | SSL-based method and system for establishing communication |
CN104780532A (en) * | 2015-05-08 | 2015-07-15 | 淮海工学院 | Cluster key management method capable of being used for wireless sensor network |
Non-Patent Citations (1)
Title |
---|
王先博: ""基于身份的组合公钥认证体制的研究与设计"", 《山东大学硕士学位论文》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108462579A (en) * | 2018-05-23 | 2018-08-28 | 东南大学 | A kind of method for distributing key based on cipher key matrix |
CN110224811A (en) * | 2019-05-13 | 2019-09-10 | 中国联合网络通信集团有限公司 | Internet of Things cipher processing method, apparatus and system |
CN110224811B (en) * | 2019-05-13 | 2022-05-06 | 中国联合网络通信集团有限公司 | Internet of things encryption processing method, device and system |
CN114285655A (en) * | 2021-12-27 | 2022-04-05 | 中国电信股份有限公司 | Key determination method and device, storage medium and electronic device |
CN114285655B (en) * | 2021-12-27 | 2024-04-30 | 中国电信股份有限公司 | Method and device for determining secret key, storage medium and electronic device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mansouri et al. | A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme | |
Lakshmi et al. | Hopfield attractor-trusted neural network: an attack-resistant image encryption | |
Xu et al. | Image encryption based on synchronization of fractional chaotic systems | |
CN105577368B (en) | The medical diagnosis service-seeking system and method for two-way secret protection | |
CN108646983A (en) | The treating method and apparatus of storage service data on block chain | |
CN109902494A (en) | Data encryption storage method, device and document storage system | |
Mandal et al. | Symmetric key image encryption using chaotic Rossler system | |
Zhang et al. | Critical infrastructure protection using secrecy–A discrete simultaneous game | |
DE202015009156U1 (en) | Probabilistic filtering and grouping of news | |
CN108063667A (en) | Method for distributing key and device | |
CN103167213A (en) | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system | |
CN102160324A (en) | A method for secure communication in a network, a communication device, a network and a computer program therefor | |
CN106686010A (en) | Multi-mechanism attribute-based encryption method supporting strategy dynamic updating | |
CN110581839B (en) | Content protection method and device | |
CN109740364A (en) | The cipher text searching method based on attribute of controllable search permission | |
CN112100679A (en) | Data processing method and device based on privacy protection and server | |
CN108021677A (en) | The control method of cloud computing distributed search engine | |
CN116318617B (en) | Medical rescue material charity donation method based on RFID and blockchain | |
CN108833736A (en) | Asymmetric more image encryption methods based on Logistic chaotic maps | |
CN117216788A (en) | Video scene identification method based on federal learning privacy protection of block chain | |
Wang et al. | Blockchain-Enabled Lightweight Fine-Grained Searchable Knowledge Sharing for Intelligent IoT | |
CN109815715A (en) | A kind of data ciphering method and relevant apparatus | |
CN105303121B (en) | The Safety query method, apparatus and system of a kind of High dimensional space data | |
CN114338007A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
CN114726628A (en) | Unmanned aerial vehicle inspection system and encryption method thereof, unmanned aerial vehicle and ground terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180522 |