CN108063667A - Method for distributing key and device - Google Patents

Method for distributing key and device Download PDF

Info

Publication number
CN108063667A
CN108063667A CN201810005853.2A CN201810005853A CN108063667A CN 108063667 A CN108063667 A CN 108063667A CN 201810005853 A CN201810005853 A CN 201810005853A CN 108063667 A CN108063667 A CN 108063667A
Authority
CN
China
Prior art keywords
key
sequence
values
matrix
network node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810005853.2A
Other languages
Chinese (zh)
Inventor
林凡
成杰
张秋镇
张振华
杨峰
李盛阳
秦林勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GCI Science and Technology Co Ltd
Original Assignee
GCI Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GCI Science and Technology Co Ltd filed Critical GCI Science and Technology Co Ltd
Priority to CN201810005853.2A priority Critical patent/CN108063667A/en
Publication of CN108063667A publication Critical patent/CN108063667A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

The present invention relates to method for distributing key and device.The described method includes:The node identification of network node in a network is obtained, carrying out numerical operation to the node identification obtains the first sequence of values;Corresponding second value sequence is determined according to first sequence of values;Corresponding set element is chosen from predetermined cipher key sets according to first sequence of values, second value sequence, obtains the corresponding key of the network node.The present invention solves the problems, such as the security that existing key agreement mechanisms are difficult to ensure that device node in wireless sensor network, and the security of the encryption key distribution of network node has been effectively ensured.

Description

Method for distributing key and device
Technical field
The present invention relates to technical field of network security, more particularly to method for distributing key and device.
Background technology
Wearable smart machine is had been widely used in military and national defense, environmental monitoring, medical treatment & health, industry and high-risk field The fields such as data monitoring.Since the architecture of wearable smart machine is open, the Some features of its own determine The security of network is poor, and criminal can easily eavesdrop, intercept and capture and forge the information of transmission, therefore security becomes Wearable smart machine is badly in need of one of key issue solved.
Such as in the wireless sensor network being made of portable medical remote sensing equipment, due to no authentication center, and set The processing capacity of slave node is limited, therefore most of existing key agreement mechanisms cannot be directly applied to such wireless sensing In network, accordingly, it is difficult to which the security of device node in wireless sensor network is effectively ensured.
The content of the invention
Based on this, it is necessary to be difficult to ensure that the safety of device node in wireless sensor network for existing key agreement mechanisms The problem of property, provide a kind of method for distributing key and device.
Scheme provided in an embodiment of the present invention includes:
A kind of method for distributing key, including:
The node identification of network node in a network is obtained, carrying out numerical operation to the node identification obtains the first numerical value Sequence;Wherein, the node identification of each network node is unique in a network;
Corresponding second value sequence is determined according to first sequence of values;
Corresponding set is chosen from predetermined cipher key sets according to first sequence of values, second value sequence Element obtains the corresponding key of the network node.
In one embodiment, carrying out the step of numerical operation obtains the first sequence of values to the node identification includes:
Hash operation is carried out to the node identification, obtains corresponding median;Modular arithmetic is carried out to the median, is obtained To the first sequence of values.
In one embodiment, the step of determining corresponding second value sequence according to first sequence of values includes:
Transposition is carried out to first sequence of values, obtains corresponding second value sequence.
In one embodiment, the cipher key sets include public key matrix and private key matrix;
Corresponding set is chosen from predetermined cipher key sets according to first sequence of values, second value sequence Element, the step of obtaining the network node corresponding key, include:
One matrix element is chosen as public from public key matrix according to first sequence of values, second value sequence Key;One matrix element is chosen as private key from private key matrix according to first sequence of values, second value sequence;Thus Obtain the corresponding key pair of the network node.
In one embodiment, a square is chosen from public key matrix according to first sequence of values, second value sequence Array element element is used as public key;One matrix element is chosen from private key matrix according to first sequence of values, second value sequence Include as the step of private key:
The row of matrix is determined according to each element in first sequence of values, is determined according to each element in second value sequence Matrix column according to the row and column determined, chooses the first matrix element as public from public key matrix, private key matrix respectively Key, the second matrix element are as private key.
In one embodiment, the corresponding key of the network node is obtained to afterwards, further including:
The public key is sent to the network node, the key is corresponding to being sent to the network node Server.
In one embodiment, the network node includes device label and tag recognition node, and the server is to set Standby monitoring server.
A kind of encryption key distribution device, including:
First ray determining module, for obtaining the node identification of network node in a network, to the node identification into Row numerical operation obtains the first sequence of values;Wherein, the node identification of each network node is unique in a network;
Second sequence determining module, for determining corresponding second value sequence according to first sequence of values;
And key determining module, for according to first sequence of values, second value sequence from predetermined close Corresponding set element is chosen in key set, obtains the corresponding key of the network node.
Implement above-described embodiment to have the advantages that:Numerical operation is carried out by the node identification to network node to obtain To the first sequence of values and second value sequence;According to first sequence of values, second value sequence from predetermined close Corresponding set element is chosen in key set, obtains the corresponding key of the network node;I.e. according to network node in a network Node identification be that it distributes corresponding key pair, the security of encryption key distribution has been effectively ensured, has improved wireless sensor network The problem of security of middle device node.
Description of the drawings
Fig. 1 is the schematic flow chart of the method for distributing key of an embodiment;
Fig. 2 is the schematic diagram of the key dispatching system of an embodiment;
Fig. 3 is the schematic diagram of the encryption key distribution device of an embodiment.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, it is right The present invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, and It is not used in the restriction present invention.
The term " comprising " and " having " of the embodiment of the present invention and their any deformations, it is intended that cover non-exclusive Comprising.Such as contain series of steps or the process, method, system, product or equipment of (module) unit are not limited to The step of listing or unit, but optionally further include the step of not listing or unit or optionally further include for these The intrinsic other steps of process, method, product or equipment or unit.
Referenced herein " multiple " refer to two or more."and/or", the association for describing affiliated partner are closed System, expression may have three kinds of relations, for example, A and/or B, can represent:Individualism A exists simultaneously A and B, individualism These three situations of B.It is a kind of relation of "or" that character "/", which typicallys represent forward-backward correlation object,.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments It is contained at least one embodiment of the application.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
Although the step in various embodiments of the present invention is arranged with label, it is not used to limit the priority time of step Sequence, based on the order of step or the execution of certain step need other steps unless expressly stated, the otherwise phase of step Order is adjustable.
Fig. 1 is the schematic flow chart of the method for distributing key of an embodiment;As shown in Figure 1, the key in the present embodiment Distribution method includes step:
S11 obtains the node identification of network node in a network, and carrying out numerical operation to the node identification obtains first Sequence of values;Wherein, the node identification of each network node is unique in a network.
Wherein, node identification can be node ID, for network node different in unique identification network.
In one embodiment, before the step S11, step is further included:It is distributed for each network node in system The node ID uniquely determined.
S12 determines corresponding second value sequence according to first sequence of values.
Wherein, the element sum that first sequence of values and second value sequence include is identical.
S13 chooses corresponding according to first sequence of values, second value sequence from predetermined cipher key sets Set element obtains the corresponding key of the network node.
In an alternative embodiment, the above-mentioned cipher key sets include public key matrix and private key matrix, the public key square Multiple matrix elements are included in battle array and private key matrix.Accordingly, according to first sequence of values, second value sequence from pre- The step of choosing corresponding set element in first definite cipher key sets, obtaining the network node corresponding key includes:Root A matrix element is chosen as public key from public key matrix according to first sequence of values, second value sequence;According to described First sequence of values, second value sequence choose a matrix element as private key from private key matrix;Thus the net is obtained The corresponding key of network node.
In other alternative embodiments, it can also be chosen according to first sequence of values from predetermined cipher key sets One set element from the cipher key sets is chosen a set element according to the second value sequence, is thus obtained again The corresponding key pair of the network node.
The above method carries out numerical operation by the node identification to network node and obtains the first sequence of values and the second number Value sequence;Corresponding set is chosen from predetermined cipher key sets according to first sequence of values and second value sequence Thus element obtains the corresponding key of the network node;Distributed according to the node identification of network node in a network for it The security of encryption key distribution has been effectively ensured in corresponding key pair, improves the security of device node in wireless sensor network The problem of.
In one embodiment, by carrying out transposition processing to first sequence of values, corresponding second value sequence is obtained Row.It should be understood that the specific implementation for determining corresponding second value sequence by the first sequence of values can also be other Mode, above-described embodiment are not construed as unique restriction to above-mentioned steps realization method as an alternative embodiment.
It is above-mentioned that the step of first sequence of values is obtained to node identification progress numerical operation in an alternative embodiment Suddenly include:Hash operation is carried out to the node identification, obtains corresponding median;Modular arithmetic is carried out to the median, is obtained To the first sequence of values.
The binary value of random length is mapped as the binary value of shorter regular length by hash algorithm, this is small by two Hex value is known as cryptographic Hash.It is described that Hash operation is carried out to the node identification, corresponding median is obtained to get to the section The corresponding cryptographic Hash of point identification.Then by carrying out modular arithmetic to the cryptographic Hash, obtain and the node identification relevant the One sequence of values.The first sequence of values which not only can guarantee is related to the node identification of network node, but also can be preferably The different network node of differentiation.It should be understood that the specific method of determination of the first sequence of values can also be other modes, on Embodiment is stated as an alternative embodiment, is not construed as unique restriction to the process.
In an alternative embodiment, it is above-mentioned according to first sequence of values, second value sequence from public key matrix A matrix element is chosen as public key;According to first sequence of values, second value sequence one is chosen from private key matrix A matrix element includes as the step of private key:The row of matrix is determined according to each element in first sequence of values, according to Each element determines matrix column in two sequence of values, according to the row and column determined, is selected respectively from public key matrix, private key matrix Take the first matrix element as public key, the second matrix element as private key.It i.e. will be in the first sequence of values, second value sequence The index that element is chosen as matrix element not makees the numerical value of element in the first sequence of values, second value sequence in itself For key, the security of encryption key distribution is further improved.
In an alternative embodiment, the corresponding key of the network node is obtained to afterwards, also wrapping by above-described embodiment It includes:The public key is sent to the network node, by the key to being sent to the corresponding service of the network node Device.Optionally, the network node includes device label and tag recognition node, and different types of network node collectively forms One network system.Optionally, the server is the monitoring server for equipment.
It should be understood that the method for above-described embodiment, can be applied in wireless sensor network, wherein, the network section Point includes device label and tag recognition node, and the server is monitoring of tools server.
Below exemplified by monitoring the wireless sensor network of portable medical remote sensing equipment, to the method for distributing key of the present invention It is illustrated.Shown in Figure 2, above-mentioned wireless sensor network includes:Portable medical remote sensing equipment, tag recognition section Point (SRN), remote monitoring server (RMS) and key-issuing server (KMS), the portable medical remote sensing equipment are set There is device label (SIG);The network of composition is as shown in Figure 2.Wherein, remote monitoring server has respectively with key-distribution server Definite network identifier exists between them and is reliably connected.KMS is that each network node specifies what is uniquely determined in system Node ID, and each network node is submitted to by way of safety before node is set.RMS records effective node in system ID databases, for matching effective node ID in current system.In the network structure having built up, child node allows same father Node communicates, such as:Device label (SIG) communicates with tag recognition node (SRN), tag recognition node (SRN) It communicates with remote monitoring server (RMS).
First, KMS situation setup parameters according to actual needs construct the key of cipher key combinations using elliptic curve Matrix A, cipher key matrix B.Wherein, cipher key matrix A is public key matrix, and cipher key matrix B is private key matrix.
Further, the step of key-issuing server (KMS) corresponding according to node ID calculating network node key is such as Under:
S1:The node ID of network node carried out by the computing of hash function algorithm to be converted into intermediate variable X;
S2:Modular arithmetic is carried out to X and obtains the random number sequence (i of mould m0,i1,…,ih-1);(wherein m is in cipher key matrix Line number, h are the columns in cipher key matrix);
S3:To random number sequence (i0,i1,…,ih-1) carry out transposition get sequence (j in return0,j1,…,jh-1)T
S4:Two sequences to obtain are chosen in A and B matrixes respectively as the index of the position of matrix element Thus corresponding matrix element obtains the corresponding key pair of each network node.
Hereafter, public key is submitted to each net by key-issuing server (KMS) before node is set by way of safety Network node, by key to being sent to remote monitoring server (RMS) by way of safety.It tag recognition node (SRN) and sets Standby label (SIG) sends information using respective public key, and remote monitoring server (RMS) is corresponding to obtaining according to the key Private key, and then the information sent to tag recognition node (SRN) or device label (SIG) is decrypted, and thus obtains network The information of middle portable medical remote sensing equipment.
It it should be noted that for foregoing each method embodiment, describes, it is all expressed as a series of for simplicity Combination of actions, but those skilled in the art should know, the present invention and from the limitation of described sequence of movement, because according to According to the present invention, some steps may be employed other orders or be carried out at the same time.In addition, can also arbitrary group be carried out to above-described embodiment It closes, obtains other embodiments.
Based on the thought identical with the method for distributing key in above-described embodiment, the present invention also provides encryption key distribution device, The device can be used for performing above-mentioned method for distributing key.For convenience of description, the structure diagram of encryption key distribution device embodiment In, illustrate only with the relevant part of the embodiment of the present invention, it will be understood by those skilled in the art that schematic structure is not formed Restriction to device can include either combining some components or different component cloth than illustrating more or fewer components It puts.
Fig. 3 is the schematic diagram of the encryption key distribution device of one embodiment of the invention;As shown in figure 3, the present embodiment Encryption key distribution device includes:
First ray determining module, for obtaining the node identification of network node in a network, to the node identification into Row numerical operation obtains the first sequence of values;Wherein, the node identification of each network node is unique in a network;
Second sequence determining module, for determining corresponding second value sequence according to first sequence of values;
And key determining module, for according to first sequence of values, second value sequence from predetermined close Corresponding set element is chosen in key set, obtains the corresponding key of the network node.
In an alternative embodiment, the First ray determining module, specifically for carrying out Hash to the node identification Computing obtains corresponding median;Modular arithmetic is carried out to the median, obtains the first sequence of values.
In an alternative embodiment, the second sequence determining module, specifically for being carried out to first sequence of values Transposition obtains corresponding second value sequence.
In an alternative embodiment, the cipher key sets include public key matrix and private key matrix;The key determining module, Specifically for a matrix element is chosen from public key matrix according to first sequence of values, second value sequence as public Key;One matrix element is chosen as private key from private key matrix according to first sequence of values, second value sequence;Thus Obtain the corresponding key pair of the network node.
In an alternative embodiment, the encryption key distribution device further includes:Key distribution module, for the public key to be sent out The network node is given, by the key to being sent to the corresponding server of the network node.
Optionally, in above-described embodiment, network node includes device label and tag recognition node, and the server is Monitoring of tools server.
It should be noted that encryption key distribution device and the method for distributing key of the present invention are based on same design, in key point In embodiment with device, the contents such as information exchange, implementation procedure between each module are a pair of with above method embodiment one It should.It is suitable for encryption key distribution device in the technical characteristic and its advantage of the embodiment elaboration of above-mentioned method for distributing key In embodiment, hereby give notice that.
In addition, in the embodiment of the encryption key distribution device of above-mentioned example, the logical partitioning of each program module is only citing Illustrate, can be as needed in practical application, such as examined for the facility of the realization of the configuration requirement or software of corresponding hardware Consider, above-mentioned function distribution by different program modules is completed, i.e., is divided into the internal structure of the encryption key distribution device not Same program module, to complete all or part of function described above.
It will appreciated by the skilled person that realizing all or part of flow in above-described embodiment method, being can Relevant hardware to be instructed to complete by computer program, the program can be stored in a computer-readable storage and be situated between In matter, production marketing or use are independent.Described program upon execution, can perform the complete of such as method of the various embodiments described above Portion or part steps.Wherein, the storage medium can be magnetic disc, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
Accordingly, a kind of storage medium is also provided in one embodiment, is stored thereon with computer program, wherein, the journey It is realized when sequence is executed by processor such as any one method for distributing key in the various embodiments described above.
In addition, the storage medium can be also set in a kind of computer equipment, place is further included in the computer equipment Manage device, when the processor performs the program in the storage medium, can realize the method for the various embodiments described above whole or Part steps.
Accordingly, a kind of computer equipment is also provided in one embodiment, which includes memory, processor And the computer program that can be run on a memory and on a processor is stored, wherein, processor is realized when performing described program Such as any one method for distributing key in the various embodiments described above.
In the above-described embodiments, all emphasize particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, it may refer to the associated description of other embodiments.
It is appreciated that the term " first second " involved by the embodiment of the present invention is only to be the similar object of difference, no Represent the particular sorted for object, it is possible to understand that ground, " first second " can exchange specific order in the case of permission Or precedence.It should be appreciated that the object that " first second " is distinguished can exchange in the appropriate case, so that described herein The embodiment of invention can be implemented with the order in addition to those for illustrating or describing herein.
Embodiment described above only expresses the several embodiments of the present invention, it is impossible to be interpreted as to the scope of the claims of the present invention Limitation.It should be pointed out that for those of ordinary skill in the art, without departing from the inventive concept of the premise, Various modifications and improvements can be made, these belong to protection scope of the present invention.Therefore, the protection domain of patent of the present invention It should be determined by the appended claims.

Claims (10)

1. a kind of method for distributing key, which is characterized in that including:
The node identification of network node in a network is obtained, carrying out numerical operation to the node identification obtains the first numerical value sequence Row;
Corresponding second value sequence is determined according to first sequence of values;
Corresponding set member is chosen from predetermined cipher key sets according to first sequence of values, second value sequence Element obtains the corresponding key of the network node.
2. method for distributing key according to claim 1, which is characterized in that numerical operation is carried out to the node identification and is obtained Include to the step of the first sequence of values:
Hash operation is carried out to the node identification, obtains corresponding median;Modular arithmetic is carried out to the median, obtains the One sequence of values.
3. method for distributing key according to claim 1, which is characterized in that determined pair according to first sequence of values The step of second value sequence answered, includes:
Transposition is carried out to first sequence of values, obtains corresponding second value sequence.
4. method for distributing key according to any one of claims 1 to 3, which is characterized in that the cipher key sets include public key Matrix and private key matrix;
Corresponding set member is chosen from predetermined cipher key sets according to first sequence of values, second value sequence Element, the step of obtaining the network node corresponding key, include:
One matrix element is chosen as public key from public key matrix according to first sequence of values, second value sequence;Root A matrix element is chosen as private key from private key matrix according to first sequence of values, second value sequence;Thus obtain The corresponding key pair of the network node.
5. method for distributing key according to claim 4, which is characterized in that according to first sequence of values, the second number Value sequence chooses a matrix element as public key from public key matrix;According to first sequence of values, second value sequence A matrix element is chosen from private key matrix to be included as the step of private key:
The row of matrix is determined according to each element in first sequence of values, matrix is determined according to each element in second value sequence Row, according to the row and column determined, the first matrix element is chosen from public key matrix, private key matrix respectively as public key, Two matrix elements are as private key.
6. method for distributing key according to claim 4 or 5, which is characterized in that it is corresponding close to obtain the network node Key is to afterwards, further including:
The public key is sent to the network node, by the key to being sent to the corresponding service of the network node Device.
7. method for distributing key according to claim 6, which is characterized in that the network node include device label and Tag recognition node, the server are monitoring of tools server.
8. a kind of encryption key distribution device, which is characterized in that including:
First ray determining module, for obtaining the node identification of network node in a network, to the node identification into line number Value computing obtains the first sequence of values;
Second sequence determining module, for determining corresponding second value sequence according to first sequence of values;
And key determining module, for according to first sequence of values, second value sequence from predetermined key set Corresponding set element is chosen in conjunction, obtains the corresponding key of the network node.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The step of claim 1 to 7 any the method is realized during row.
10. a kind of computer equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes the step of claim 1 to 7 any the method when performing described program Suddenly.
CN201810005853.2A 2018-01-03 2018-01-03 Method for distributing key and device Pending CN108063667A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810005853.2A CN108063667A (en) 2018-01-03 2018-01-03 Method for distributing key and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810005853.2A CN108063667A (en) 2018-01-03 2018-01-03 Method for distributing key and device

Publications (1)

Publication Number Publication Date
CN108063667A true CN108063667A (en) 2018-05-22

Family

ID=62141111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810005853.2A Pending CN108063667A (en) 2018-01-03 2018-01-03 Method for distributing key and device

Country Status (1)

Country Link
CN (1) CN108063667A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462579A (en) * 2018-05-23 2018-08-28 东南大学 A kind of method for distributing key based on cipher key matrix
CN110224811A (en) * 2019-05-13 2019-09-10 中国联合网络通信集团有限公司 Internet of Things cipher processing method, apparatus and system
CN114285655A (en) * 2021-12-27 2022-04-05 中国电信股份有限公司 Key determination method and device, storage medium and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1832403A (en) * 2006-04-24 2006-09-13 北京易恒信认证科技有限公司 CPK credibility authorization system
CN101340282A (en) * 2008-05-28 2009-01-07 北京易恒信认证科技有限公司 Generation method of composite public key
US20090167489A1 (en) * 2006-03-23 2009-07-02 Nan Xianghao Anti-forgery method and apparatus based on cpk electronic tag
CN104378374A (en) * 2014-11-14 2015-02-25 国家超级计算深圳中心(深圳云计算中心) SSL-based method and system for establishing communication
CN104780532A (en) * 2015-05-08 2015-07-15 淮海工学院 Cluster key management method capable of being used for wireless sensor network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090167489A1 (en) * 2006-03-23 2009-07-02 Nan Xianghao Anti-forgery method and apparatus based on cpk electronic tag
CN1832403A (en) * 2006-04-24 2006-09-13 北京易恒信认证科技有限公司 CPK credibility authorization system
CN101340282A (en) * 2008-05-28 2009-01-07 北京易恒信认证科技有限公司 Generation method of composite public key
CN104378374A (en) * 2014-11-14 2015-02-25 国家超级计算深圳中心(深圳云计算中心) SSL-based method and system for establishing communication
CN104780532A (en) * 2015-05-08 2015-07-15 淮海工学院 Cluster key management method capable of being used for wireless sensor network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王先博: ""基于身份的组合公钥认证体制的研究与设计"", 《山东大学硕士学位论文》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108462579A (en) * 2018-05-23 2018-08-28 东南大学 A kind of method for distributing key based on cipher key matrix
CN110224811A (en) * 2019-05-13 2019-09-10 中国联合网络通信集团有限公司 Internet of Things cipher processing method, apparatus and system
CN110224811B (en) * 2019-05-13 2022-05-06 中国联合网络通信集团有限公司 Internet of things encryption processing method, device and system
CN114285655A (en) * 2021-12-27 2022-04-05 中国电信股份有限公司 Key determination method and device, storage medium and electronic device
CN114285655B (en) * 2021-12-27 2024-04-30 中国电信股份有限公司 Method and device for determining secret key, storage medium and electronic device

Similar Documents

Publication Publication Date Title
Mansouri et al. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme
Lakshmi et al. Hopfield attractor-trusted neural network: an attack-resistant image encryption
Xu et al. Image encryption based on synchronization of fractional chaotic systems
CN105577368B (en) The medical diagnosis service-seeking system and method for two-way secret protection
CN108646983A (en) The treating method and apparatus of storage service data on block chain
CN109902494A (en) Data encryption storage method, device and document storage system
Mandal et al. Symmetric key image encryption using chaotic Rossler system
Zhang et al. Critical infrastructure protection using secrecy–A discrete simultaneous game
DE202015009156U1 (en) Probabilistic filtering and grouping of news
CN108063667A (en) Method for distributing key and device
CN103167213A (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN102160324A (en) A method for secure communication in a network, a communication device, a network and a computer program therefor
CN106686010A (en) Multi-mechanism attribute-based encryption method supporting strategy dynamic updating
CN110581839B (en) Content protection method and device
CN109740364A (en) The cipher text searching method based on attribute of controllable search permission
CN112100679A (en) Data processing method and device based on privacy protection and server
CN108021677A (en) The control method of cloud computing distributed search engine
CN116318617B (en) Medical rescue material charity donation method based on RFID and blockchain
CN108833736A (en) Asymmetric more image encryption methods based on Logistic chaotic maps
CN117216788A (en) Video scene identification method based on federal learning privacy protection of block chain
Wang et al. Blockchain-Enabled Lightweight Fine-Grained Searchable Knowledge Sharing for Intelligent IoT
CN109815715A (en) A kind of data ciphering method and relevant apparatus
CN105303121B (en) The Safety query method, apparatus and system of a kind of High dimensional space data
CN114338007A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN114726628A (en) Unmanned aerial vehicle inspection system and encryption method thereof, unmanned aerial vehicle and ground terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180522