CN114302392A - Communication method, device and computer storage medium based on key agreement group - Google Patents

Communication method, device and computer storage medium based on key agreement group Download PDF

Info

Publication number
CN114302392A
CN114302392A CN202111592439.4A CN202111592439A CN114302392A CN 114302392 A CN114302392 A CN 114302392A CN 202111592439 A CN202111592439 A CN 202111592439A CN 114302392 A CN114302392 A CN 114302392A
Authority
CN
China
Prior art keywords
key
target
terminal
negotiation
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111592439.4A
Other languages
Chinese (zh)
Inventor
刘博宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN202111592439.4A priority Critical patent/CN114302392A/en
Publication of CN114302392A publication Critical patent/CN114302392A/en
Pending legal-status Critical Current

Links

Images

Abstract

The disclosure relates to the technical field of communication, and in particular relates to a communication method and device based on a key agreement group, a storage medium and an electronic device. The method comprises the following steps: determining target negotiation parameters of each terminal node in a key negotiation group, wherein the target negotiation parameters of any target terminal node in the key negotiation group at least comprise a first key negotiation parameter, a second key negotiation parameter, a current timestamp and international mobile identification codes (IMSIs) of other terminals in the key negotiation group, the first key negotiation parameter is determined according to a random number generated by the target terminal node and a target base point, and the second key negotiation parameter is determined according to a private key of the target terminal node and the first negotiation parameter; each terminal node in the key negotiation group exchanges target negotiation parameters with each other, generates a unique session key of the key negotiation group according to the target negotiation parameter negotiation before and after the exchange, and performs communication based on the unique session key. The method and the device can improve the safety of the intra-group communication and reduce the communication and calculation cost of key updating.

Description

Communication method, device and computer storage medium based on key agreement group
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a communication method based on a key agreement group, a communication apparatus based on a key agreement group, a computer storage medium, and an electronic device.
Background
With the development of technologies such as internet of things and industrial internet, requirements of various vertical industries on network transmission rate, network delay and security are gradually improved, characteristics of high rate, large capacity and low delay of 5G (5th Generation Mobile Communication Technology, fifth Generation Mobile Communication Technology) bring revolutionary changes to various industries, and 5G accelerated development releases requirements of various industries on 5G private networks. The 5G network is a heterogeneous network, different access technologies used by different network slices are different, and the types of the faced industry terminals are also different. Massive terminals of the same kind need to be accessed into the authentication framework in a unified manner for safe access, and mutual authentication of identities among various terminals is realized. How to ensure the security of multi-industry terminal communication in a 5G private network environment and ensure that the security requirement of communication encryption is met under the condition that communication members continuously join or leave becomes a problem to be solved urgently by current operators.
In the related technology, in a symmetric key system, a potential safety risk exists in a mode that an industry terminal and an analyzer share a key for a long time; in the related technology, when members join or leave in the communication group, all keys need to be updated in a centralized manner, and the industry terminal needs to interact with the server terminal again in each key updating process, so that the communication and calculation cost is high.
It is to be noted that the information invented in the background section above is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The present disclosure aims to provide a communication method and apparatus based on a key agreement group, a computer storage medium, and an electronic device, so as to overcome the problems of low communication security, high communication and calculation costs for updating keys, and the like caused by the limitations and drawbacks of the related art at least to a certain extent.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to an aspect of the present disclosure, there is provided a communication method based on a key agreement group, including: determining target negotiation parameters of each terminal node in a key negotiation group, wherein the target negotiation parameters of any target terminal node in the key negotiation group at least comprise a first key negotiation parameter, a second key negotiation parameter, a current timestamp and international mobile identification codes IMSIs of other terminals in the key negotiation group, which correspond to the target terminal node, the first key negotiation parameter is determined according to a random number generated by the target terminal node and a target base point, the target base point is a base point of an elliptic curve, the second key negotiation parameter is determined according to a private key of the target terminal node and the first key negotiation parameter, and the private key is a private key in a public and private key pair determined according to the international mobile identification codes IMSIs of the target terminal node; and exchanging target negotiation parameters of each terminal node in the key negotiation group, generating a unique session key of the key negotiation group according to the target negotiation parameter negotiation before and after the exchange, and carrying out communication based on the unique session key.
In an exemplary embodiment of the disclosure, the exchanging target negotiation parameters of each other by terminal nodes in the key negotiation group includes: any target terminal node in the key negotiation group signs the respective target negotiation parameter by adopting a corresponding private key; and each terminal node in the key negotiation group exchanges the signed target negotiation parameters and the corresponding signatures.
In an exemplary embodiment of the present disclosure, determining a public-private key pair according to the international mobile identity of the target end node includes: and determining the international mobile identity IMSI of the target terminal node as a corresponding public key, and generating a private key corresponding to the public key by adopting an asymmetric encryption algorithm.
In an exemplary embodiment of the disclosure, before determining the public-private key pair based on the international mobile identity IMSI of the destination terminal node, the method further comprises: the target terminal node sends authentication request information carrying an international mobile identity (IMSI) and a Service Node Interface (SNID) to a terminal controller, and sends the authentication request information to a terminal analyzer through the terminal controller so as to finish identity and network authentication of the target terminal node; if the authentication is passed, the terminal analyzer requests a certificate from a trusted gateway, so that the terminal analyzer transmits the certificate and the corresponding current timestamp to the target terminal node; the target terminal node verifies and confirms the authenticity of the certificate.
In an exemplary embodiment of the present disclosure, the terminal analyzer requests a certificate from a trusted gateway, so that the terminal analyzer transfers the certificate and the corresponding current timestamp to the target terminal node, including: the trusted gateway selects a random number and generates an authentication polynomial of the terminal analyzer according to the selected random number; determining public key information and private key information of the terminal analyzer based on the generated authentication polynomial; the trusted gateway signs on the authentication polynomial to obtain the certificate and transmits the certificate to the terminal analyzer, wherein the certificate comprises the public key information, the private key information and the digital signature; and the terminal analyzer transmits the certificate and the corresponding current timestamp to the target terminal node. In an exemplary embodiment of the present disclosure, the key agreement group is a target unit cluster in a communication key tree, and the target unit cluster and other unit clusters and/or other terminal nodes in the communication key tree have a common node, and the common node participates in the generation of the unique session key of the target unit cluster and the generation of the unique session key of other unit clusters and/or other terminal nodes sharing a node with the target unit cluster at the same time; each unit cluster in the communication key tree comprises at least three terminal nodes which are connected into a ring.
In an exemplary embodiment of the present disclosure, each unit cluster in the communication key tree includes three terminal nodes; and each terminal node in the key negotiation group generates a unique session key of the key negotiation group according to target negotiation parameters before and after exchange by the following formula:
Figure BDA0003430238610000031
Figure BDA0003430238610000032
Figure BDA0003430238610000033
wherein Z isA、ZBAnd ZCFor a determined unique session key, SA、SBAnd SCIs the private key of three terminal nodes, rA、rBAnd rCRandom numbers, X, corresponding to three terminal nodesA、XBAnd XCNegotiate a parameter, Ω, for the first keys corresponding to the three terminalsA=sA×P,ΩB=sB×P,ΩC=sC×P。
In an exemplary embodiment of the present disclosure, if there is an industry terminal requesting to join the target unit cluster, and the number of terminal nodes in the target unit cluster is greater than a target capacity value, the method further includes: redistributing each target terminal node in the target unit cluster to obtain a plurality of updating unit clusters with the capacity values as the target capacity values; determining target negotiation parameters of all terminal nodes in an updated key negotiation group corresponding to an updated unit cluster in which the industry terminal is located, exchanging the target negotiation parameters of all terminal nodes in the updated key negotiation group, and generating an updated unique session key of the updated key negotiation group according to the target negotiation parameters before and after exchange; and distributing the updated unique session key to each terminal node in the target unit cluster through a trusted gateway.
In an exemplary embodiment of the present disclosure, if there is a single-terminal node departure in the target unit cluster, the method further includes: if the single terminal node is a leaf node which only participates in the generation of the unique session key in one unit cluster, the cluster structure of the target unit cluster is communicated, and other terminals in the target unit cluster continue to use the unique session key corresponding to the target unit cluster for communication; if the single terminal node is an intermediate node participating in generation of the unique session keys of the multiple unit clusters at the same time, cluster structures of the multiple unit clusters are not communicated, the intermediate node is determined again, other terminal nodes in the multiple unit clusters are recombined into an updated unit cluster with a capacity value as a target capacity value based on the determined intermediate node, and the unique session key of the updated unit cluster is determined.
In an exemplary embodiment of the present disclosure, if there are multiple target unit cluster merges, the method further includes: determining an intermediate node in the terminal nodes in the target unit clusters, and connecting the target unit clusters through the intermediate node to obtain a plurality of updated target unit clusters; and respectively determining the unique session key of each updated target unit cluster, and distributing the unique session keys to each terminal node in the plurality of target unit clusters.
According to an aspect of the present disclosure, there is provided a key agreement group-based communication apparatus, including: a node key determining module, configured to determine target negotiation parameters of each terminal node in a key negotiation group, where the target negotiation parameters of any target terminal node in the key negotiation group at least include a first key negotiation parameter, a second key negotiation parameter, a current timestamp, and an international mobile identity IMSI of another terminal in the key negotiation group, where the first key negotiation parameter is determined according to a random number generated by the target terminal node and a target base point, the target base point is a base point of an elliptic curve, the second key negotiation parameter is determined according to a private key of the target terminal node and the first key negotiation parameter, and the private key is a private key in a public-private key pair determined according to the international mobile identity IMSI of the target terminal node; and the intra-group session key determining module is used for exchanging target negotiation parameters of each terminal node in the key negotiation group, generating a unique session key of the key negotiation group according to the target negotiation parameter negotiation before and after the exchange, and performing communication based on the unique session key.
According to an aspect of the present disclosure, there is provided a computer storage medium having stored thereon a computer program that, when executed by a processor, implements the key agreement group based communication method of any one of the above.
According to an aspect of the present disclosure, there is provided an electronic device including: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform any one of the above-described key agreement group-based communication methods via execution of the executable instructions.
In the method for communication based on the key agreement group in the exemplary embodiment of the present disclosure, the target agreement parameter of each terminal node in the key agreement group is determined, the terminal nodes in the key agreement group exchange the target agreement parameters of each other, and a unique session key of the key agreement group is generated according to the target agreement parameter negotiation before and after the exchange, so as to perform communication based on the unique session key. The international mobile identity IMSI based on the terminal nodes in the key negotiation group adopts an asymmetric key mechanism and a mode of exchanging negotiation parameters through the terminal nodes in the group to negotiate to obtain a unique session key of the key negotiation group, so that each terminal in the key negotiation group communicates based on the unique session key, the front and back safety of communication in the group is ensured, meanwhile, the key negotiation group is taken as a unit, when part of terminals join or leave, only the unique session key of the related key negotiation group needs to be updated, all keys do not need to be updated, and the problem of communication and calculation consumption caused by interaction between all terminals and a server terminal in the key updating process is solved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present disclosure will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the present disclosure are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
fig. 1 illustrates a flowchart of a key agreement group based communication method according to an exemplary embodiment of the present disclosure;
FIG. 2 shows a schematic diagram of a communication key tree, according to an example embodiment of the present disclosure;
fig. 3 shows a flowchart of a target end node applying for and verifying a certificate according to an example embodiment of the present disclosure;
FIG. 4 is a diagram illustrating portions of a process for participating in a unique session key agreement process, according to an illustrative embodiment of the present disclosure;
fig. 5 shows a flowchart of a terminal analyzer requesting a certificate from a trusted gateway for the terminal analyzer to pass the certificate and a corresponding current timestamp to a target terminal node according to an exemplary embodiment of the present disclosure;
FIG. 6 shows a multi-party communication unique session key agreement flow diagram, according to an example embodiment of the present disclosure;
FIG. 7 illustrates a flowchart for determining an updated unique session key when the number of terminal nodes in a target cell cluster is greater than a target capacity value if there is an industry terminal requesting to join the target cell cluster, according to an exemplary embodiment of the present disclosure;
FIG. 8 is a diagram illustrating a target terminal node forming a tetrahedron in accordance with an exemplary embodiment of the present disclosure;
fig. 9 shows a schematic structural diagram of a communication apparatus based on a key agreement group according to an exemplary embodiment of the present disclosure;
FIG. 10 shows a schematic diagram of a storage medium according to an example embodiment of the present disclosure; and
fig. 11 shows a block diagram of an electronic device according to an exemplary embodiment of the present disclosure.
In the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Detailed Description
Exemplary embodiments will now be described more fully with reference to the accompanying drawings. The exemplary embodiments, however, may be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of exemplary embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar structures, and thus their detailed description will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known structures, methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. That is, these functional entities may be implemented in the form of software, or in one or more software-hardened modules, or in different networks and/or processor devices and/or microcontroller devices.
In the related art in the field, the main security threats faced in network communication include truncation, interruption, tampering and forgery, and in the network architecture defined by the existing 3GPP (3th Generation Partnership Project), the 5G unified Authentication requirement is satisfied by an Extensible Authentication Protocol (EAP) Authentication framework. Various access modes can be accessed to the 5G core network CN under an EAP framework, and different access networks use the authentication service unified in logic function. The Authentication mechanism of the 5G network still adopts bidirectional AKA (Authentication and Key Agreement) Authentication. And performing bidirectional authentication on the industry terminal and the network in the authentication and key agreement process, and performing key agreement on the basis. And the key agreement adopts a symmetric key system to ensure the confidentiality, the integrity and the availability of information in the communication process, but still has the security defects that an industry terminal authentication vector is easy to intercept, a malicious intruder can imitate the terminal identity access after the industry terminal identity is leaked, and the like, and even obtains a confidential communication key by intercepting the industry terminal authentication vector.
Meanwhile, the terminal UE and the analyzer in the symmetric key system share the key for a long time, and potential safety risks exist in the aspects of not supporting data signature and the like. In addition, in the related art, a symmetric key system is adopted to realize the management mode of the shared key, the number of members in the group is large, when the members join or leave, all keys need to be updated in a centralized manner, and all industry terminals need to interact with the server side again in each key updating process, so that the communication and calculation costs are high.
Based on this, in the exemplary embodiment of the present disclosure, a communication method based on a key agreement group is first provided. Referring to fig. 1, the communication method based on the key agreement group includes the following steps:
step S110: determining target negotiation parameters of each terminal node in a key negotiation group, wherein the target negotiation parameters of any target terminal node in the key negotiation group at least comprise a first key negotiation parameter, a second key negotiation parameter, a current timestamp and international mobile identification codes IMSI of other terminals in the key negotiation group, which correspond to the target terminal node, the first key negotiation parameter is determined according to a random number generated by the target terminal node and a target base point, the target base point is a base point of an elliptic curve, the second key negotiation parameter is determined according to a private key of the target terminal node and the first negotiation parameter, and the private key is a private key in a public and private key pair determined according to the international mobile identification codes IMSI of the target terminal node;
step S120: each terminal node in the key negotiation group exchanges target negotiation parameters with each other, generates a unique session key of the key negotiation group according to the target negotiation parameter negotiation before and after the exchange, and performs communication based on the unique session key.
According to the communication method based on the key agreement group in the embodiment of the present invention, based on the international mobile identity IMSI of the terminal node in the key agreement group, an asymmetric key mechanism is adopted and a negotiation parameter is exchanged by the terminal nodes in the group, a unique session key of the key agreement group is obtained through negotiation, so that each terminal in the key agreement group performs communication based on the unique session key, not only is the front and back security of communication in the group ensured, but also the key agreement group is taken as a unit, when a part of terminals join or leave, only the unique session key of a part of related key agreement groups needs to be updated, all keys do not need to be updated, and thus the problem of communication and calculation consumption caused by interaction between all terminals and a server terminal in the key updating process is reduced.
The key agreement group based communication method in the exemplary embodiment of the present disclosure is further explained below with reference to fig. 1.
In step S110, target negotiation parameters of each terminal node in the key negotiation group are determined.
In an exemplary embodiment of the present disclosure, a terminal node refers to a communication industry terminal, including but not limited to a production monitoring device, an intelligent terminal, an unmanned locomotive, a data acquisition device, and the like. The key negotiation group is a target unit cluster in the communication key tree, the target unit cluster and other unit clusters and/or other terminal nodes in the communication key tree have a shared node, and the shared node simultaneously participates in the generation of the unique session key of the target unit cluster and the generation of the unique session key of other unit clusters and/or other terminal nodes sharing the node with the target unit cluster; each unit cluster in the communication key tree comprises at least three terminal nodes which are connected into a ring.
Fig. 2 is a schematic diagram of a communication key tree according to an exemplary embodiment of the present disclosure, and as shown in fig. 2, a plurality of key agreement groups exist in the communication key tree, each key agreement group is a unit cluster, and is similar to a binary tree structure except that an edge exists between two child nodes to connect, so that each unit cluster forms a ring structure, where terminal nodes in a unit cluster include leaf nodes and intermediate nodes, the leaf nodes participate in generation of only one session key in the unit cluster, and the intermediate nodes participate in generation of only one session key in the unit cluster and also participate in generation of only one session key in an adjacent upper unit cluster.
It should be noted that the unit cluster with the capacity value of 3 in fig. 2 is only an example, and the present disclosure may also adjust the capacity value of the terminal node in each unit cluster according to the actual communication requirement, for example, the capacity value may be 4, 5, and so on, and the present disclosure does not make a special limitation on the number of terminal nodes in each unit cluster.
In an exemplary embodiment of the present disclosure, the target negotiation parameters of any target terminal node in the key negotiation group at least include a first key negotiation parameter, a second key negotiation parameter, a current timestamp, and an international mobile identity IMSI of another terminal in the key negotiation group, which correspond to the target terminal node. The first key agreement parameter is determined according to the random number generated by the target terminal node and a target base point, and the target base point is a base point of an elliptic curve. For example, if the target terminal generates a random number r and the base point of the elliptic curve is P, the first key agreement parameter of the target terminal is X ═ r × P, and the first key agreement parameter is determined based on the product of the base point of the elliptic curve and the random number, so as to ensure the irreversibility of the first key agreement parameter.
Further, the second key negotiation parameter is determined according to the private key of the target terminal node and the first negotiation parameter, and the private key is a private key in a public and private key pair determined according to the international mobile identity IMSI of the target terminal node.
In some possible embodiments, the international mobile identity IMSI of the target terminal node is determined as a corresponding public key, and a private key corresponding to the public key is generated by using an asymmetric encryption algorithm, so as to obtain a public-private key pair of the target terminal node. The asymmetric encryption algorithm may be a conventional algorithm for generating a private key corresponding to a public key, such as an algorithm of an elliptic curve, and the specific type of the asymmetric encryption algorithm is not particularly limited in this disclosure.
In some possible embodiments, the second key agreement parameter is determined according to the private key of the target terminal node and the first key agreement parameter. Referring to the above example, the determined first key agreement parameter is X ═ r × P, and if the generated private key is S ═ f (imsi), the second key agreement parameter is Y ═ S × X ═ S × r × P. Based on this, since the irreversibility of the first key agreement parameter has been determined, correspondingly, the second key agreement parameter also has irreversibility.
According to the exemplary embodiment, the international mobile identity IMSI of the target terminal node is determined as the corresponding public key, the private key is obtained based on the public key, the public and private key pair is generated based on the international mobile identity IMSI of the target terminal, the first key negotiation parameter and the second key negotiation parameter of the target terminal are generated, and the irreversibility of the key negotiation parameters is determined, so that the communication security of the subsequent key negotiation result is improved.
In some possible embodiments, before determining the public-private key pair according to the international mobile identity IMSI of the target end node, as shown in fig. 3, the exemplary manner of the present disclosure may further cause the target end node to apply for and verify a certificate by:
in step S310, the target terminal node sends authentication request information carrying the international mobile identity IMSI and the service node interface SNID to the terminal controller, and sends the authentication request information to the terminal analyzer via the terminal controller, so as to complete identity and network authentication of the target terminal node.
In an exemplary embodiment of the present disclosure, the terminal controller is a core component of the security control plane, and provides authentication service, dynamic service authorization, and centralized policy management capability for the trusted gateway. And the terminal controller checks the authority for all the access requests, and the authority judgment is not based on a simple static rule any more, but is based on dynamic judgment such as identity, authority, trust level, security policy and the like. The terminal analyzer is in contact with call control and session management entities in different domains and subsystems, is a database for storing industry terminal information, and can store mobile industry terminal information including but not limited to industry terminal identification, serial numbers, industry terminal safety information, industry terminal position information and profile information. The terminal analyzer is responsible for completing network access control of authentication and authorization when the industry terminal is accessed to the network, and generating industry terminal safety information for integrity protection and encryption. And the terminal analyzer provides trust level evaluation for the terminal controller as an authorization judgment basis. And combining the data of the identity library and the authority library to continuously analyze the access behavior and continuously evaluate a new task. The identity is determined to confirm whether the international mobile identity IMSI is a legitimate IMSI, rather than being illegitimate or forged, etc., such as whether the IMSI is sent by a fake base station, etc. Network authentication then authenticates whether the target terminal node belongs to the target network, e.g. to which operator network.
Referring to fig. 4, a schematic diagram of portions participating in a unique session key agreement process according to an exemplary embodiment of the present disclosure is shown, as shown in fig. 4, a target terminal node (e.g., an industry terminal UE)1Industry terminal UE2And industry terminal UE3) To the terminal controller C1Sending authentication request information carrying international mobile identification code IMSI and service node interface SNID, and passing through the terminal controller C1Sending the authentication request information to the terminal analyzer A1To complete the identity and network authentication of the target terminal node, and the industry terminal UE4By means of a terminal controller C2Sending authentication request information carrying international mobile identity IMSI and service node interface SNID to pass through the terminal controller C2Sending the authentication request information to the terminal analyzer A2The procedure of (a) is the same as the above-described procedure.
In step S320, if the identity of the target terminal node and the network authentication pass, the terminal analyzer requests the certificate from the trusted gateway, so that the terminal analyzer transmits the certificate and the corresponding current timestamp to the target terminal node.
In an exemplary embodiment of the present disclosure, if the identity of the target end node and the network authentication pass, the terminal analyzer requests the trusted gateway for the certificate, so that the terminal analyzer transmits the certificate and the corresponding current timestamp to the target end node.
The trusted gateway is used as a network access node of an industry terminal surface and is a policy execution point with dynamic access control capability. And authenticating an access subject according to the access control requirement of the 5G industry terminal through a terminal controller, and dynamically judging the authority of the access subject. The third party responsible for generating, storing and transmitting the Key is a trusted third party in a Public Key Infrastructure (PKI) system, and can obtain the trust behavior of all nodes in the network with non-repudiation. The trusted gateway can verify the public key information of others through a mechanism of issuing a certificate, and the certificate is bound with public key data and the identity information of a corresponding private key owner and is provided with a digital signature of the trusted gateway. The industry terminal can confirm the identity of the analyzer through the digital signature, and the bidirectional authentication of the access layer is realized.
With continued reference to FIG. 4, terminal analyzer A1And terminal analyzer A2The certificate and the current timestamp can be transmitted to the target terminal node after the certificate and the current timestamp are received.
In some possible implementations, fig. 5 shows a flowchart of a terminal analyzer according to an exemplary embodiment of the present disclosure requesting a certificate from a trusted gateway, so that the terminal analyzer transfers the certificate and a corresponding current timestamp to a target terminal node, as shown in fig. 5, where the process includes:
in step S510, the trusted gateway selects a random number and generates an authentication polynomial of the terminal analyzer according to the selected random number.
In an exemplary embodiment of the disclosure, the trusted gateway may select k +1 random numbers
Figure BDA0003430238610000111
And generating an authentication polynomial f (x) d of the terminal analyzer0+d1x+…dkxk∈Zq[x]. Wherein, P is used as a generator.
In step S520, public key information and private key information of the terminal analyzer are determined based on the generated authentication polynomial.
In an exemplary embodiment of the disclosure, the trusted gateway calculates V0=d0P,V1=d1P,...Vk=dkP, and will { P, V0,V1,…,VkBroadcast as public key of terminal analyzer, will { d }0,d1,…,dkAnd obtaining the public key information and the private key information of the terminal analyzer as the private key of the terminal analyzer.
In step S530, the trusted gateway signs a certificate on the authentication polynomial, and transmits the certificate to the terminal analyzer, where the certificate includes public key information, private key information, and a digital signature.
In an exemplary embodiment of the disclosure, after signing on the authentication polynomial f (x) of the terminal analyzer, the trusted gateway transmits the signature information and the public and private key information of the terminal analyzer over a secure channel.
In step S540, the terminal analyzer transmits the certificate and the corresponding current timestamp to the target terminal node. In an exemplary embodiment of the present disclosure, the certificate and the corresponding current timestamp are transmitted to the target terminal node via the terminal analyzer, wherein by transmitting the current timestamp at the same time, playback and alteration prevention of the information is ensured, and information security is improved.
In step S330, the target terminal node verifies and confirms the authenticity of the certificate.
In an exemplary embodiment of the present disclosure, the target terminal node verifies the authenticity of the certificate and confirms the certificate after the authentication is passed. The authenticity of the certificate is confirmed, for example, by a digital signature.
According to the exemplary embodiment of the disclosure, before determining the public and private key pair according to the international mobile identity IMSI of the target terminal node, the terminal analyzer needs to send a certificate which is verified by a trusted third party (such as a trusted gateway) to the target terminal node when connection is established for the first time, so that identity confirmation of the target terminal node on the terminal analyzer is ensured, security risks caused by one-way authentication of a pseudo base station and the like are avoided, and security of subsequent generation and multiparty communication based on a unique session key is improved.
FIG. 6 is a schematic diagram illustrating a multi-party communication unique session key agreement flow according to an exemplary embodiment of the disclosure, and referring to FIG. 6, each unit cluster in a communication key tree includes three terminal nodes UEA、UEBAnd UECFor example, a process of determining a target negotiation parameter of a target terminal node will be described.
In step S610, the target terminal node a sends a registration request to the terminal controller, and is requested to upload the IMSI carrying the international mobile identity numberAThe authentication request of (1);
in step S620 and stepIn step S630, the target terminal node a sends the IMSI to the terminal controller after receiving the authentication request from the terminal controllerA
In step S640, the terminal controller forwards the IMSI to the terminalASending to the terminal analyzer and simultaneously sending SNID to the service networkARequesting to authenticate the identity and the network of the target terminal node A;
in step S650, the terminal analyzer receives the authentication request and then analyzes the SNIDAVerifying the service network where the target terminal node A is located, and if the verification fails, rejecting the request; if the verification is passed, requesting a certificate from the trusted gateway;
in step S660, the trusted gateway selects a random number, and generates an authentication polynomial and public-private key information of the terminal analyzer based on the random number, which is the same as steps S510 to S520 and is not described herein again.
In step S670 and step S680, after the trusted gateway signs on the authentication polynomial f (x) of the analyzer, the trusted gateway transmits the signature information and the public and private key information of the terminal analyzer on the secure channel;
in step S690, the terminal analyzer compares the function f (x), the certificate, and the current timestamp TAReturned to the UEA
In step S6100, the UEAFirstly, the credibility of the certificate of the terminal analyzer is verified, the certificate transmitted by the terminal analyzer is confirmed, and the IMSI is analyzed on the basis of f (x)AAs a public key, SA=f(IMSIA) As a private key;
in step S6110 and step S6120, the target terminal node UE follows the above procedureBAnd a target terminal node UECAnd obtaining corresponding public and private key pairs and generating random numbers corresponding to each target terminal node
Figure BDA0003430238610000121
Determining a first key negotiation parameter and a second key negotiation parameter by using a base point based on the generated random number and the elliptic curve and a determined public and private key pair, and obtaining each target terminal node respectivelyThe target negotiation parameters for a point are as follows:
target terminal node UEATarget negotiation parameters of (1): (IMSI)B,IMSIC,XA,YA,TA);
Target terminal node UEBTarget negotiation parameters: (IMSI)A,IMSIC,XB,YB,TB);
Target terminal node UECTarget negotiation parameters: (IMSI)B,IMSIA,XC,YC,TC);
Wherein, Xi(i ═ a/B/C) is a first key agreement parameter, Xi=ri×P,YiNegotiating parameters for the second key, Yi=Si×ri×P,riIs a random number, P is the base point of the elliptic curve, SiIs the private key of the target terminal node, TiIs a current timestamp corresponding to the target terminal node, and
Figure BDA0003430238610000131
i identifies the target terminal node.
It should be noted that, for different target terminal nodes, P is a base point of an elliptic curve, and is an irreversibility of a first key negotiation parameter and a second key negotiation parameter determined for identification, P values of the target terminal nodes may be the same or different, and this disclosure does not specially limit this.
In step S120, the terminal nodes in the key agreement group exchange target agreement parameters with each other, generate a unique session key of the key agreement group according to the target agreement parameter agreement before and after the exchange, and perform communication based on the unique session key.
In the exemplary embodiment of the present disclosure, the terminal nodes in the key agreement group exchange target agreement parameters with each other, and generate a unique session key of the key agreement group according to the target agreement parameters before and after the exchange, that is, each target terminal node in the same key agreement group negotiates to obtain the same and unique session key.
The above steps are continuedStep S6110 and step S6120 each unit cluster in the communication key tree includes three terminal nodes UEA、UEBAnd UECFor example, a process of determining a unique session key will be described.
First, the following definitions are made:
Figure BDA0003430238610000132
wherein, ViComputing V for trusted gateways0=d0P,V1=d1P,...Vk=dkP, see steps S510 to S520.
Second, the UEACalculating XA=rAX P and YA=SA×rA×P,UEBCalculating XB=rBX P and YB=SB×rB×P,UECCalculating XC=rCX P and YC=SC×rC×P;
Next, the UEAWill MA,SigA(MA) To the UEBAnd UECWherein M isA=(IMSIB,IMSIC,XA,YA,TA);SigA(MA) For industry terminal UEAUsing its own private key at MATo prevent information from being maliciously altered;
accordingly, the UEBWill MB,SigB(MB) To the UEAAnd UECWherein M isB=(IMSIA,IMSIC,XB,YB,TB),UECWill MC,SigC(MC) To the UEAAnd UEBWherein M isC=(IMSIA,IMSIB,XC,YC,TC);
The operation algorithm based on the elliptic curve can know that:
Figure BDA0003430238610000141
Figure BDA0003430238610000142
Figure BDA0003430238610000143
thus, the target terminal node UEATarget terminal node UEBAnd a target terminal node UECRespectively calculating to obtain unique session key ZA、ZBAnd ZCComprises the following steps:
Figure BDA0003430238610000144
Figure BDA0003430238610000145
Figure BDA0003430238610000146
from this, ZA=ZB=ZCNamely, through key agreement, each target terminal node belonging to the same key agreement group obtains the same and unique session key by three parties through key exchange calculation on the basis of the private key of each target terminal node, wherein the unique session key comprises the private key of each terminal node in the key agreement group and the corresponding random number.
Of course, when the number of target terminal nodes in the key agreement group is other values, a correlation algorithm may also be employed to obtain a unique session key belonging to the key agreement group.
Further, after obtaining the unique session key of the key agreement group, each target terminal of the key agreement group may communicate with the unique session key as a credential. Continuing with fig. 6, in step S6130, the target terminal node generates the same and unique session key Z based on the session key agreement algorithm; in step S6140, each target terminal node performs session encryption, authentication, and the like based on the unique session key Z.
In some possible implementation manners, the unique session key can be used for encrypting other session keys of each target terminal in the communication process of the key negotiation group, and a symmetric encryption algorithm is used for encrypting and decrypting actually transmitted data, so that in the communication process, the encryption speed is improved, the security performance is ensured, and the optimal performance of key negotiation and key management is realized by combining an encryption algorithm system and a non-encryption algorithm system.
In some possible embodiments, if there is an industry terminal requesting to join the target unit cluster, and the number of terminal nodes in the target unit cluster is greater than the target capacity value, the unique session key may be further updated by:
in step S710, each target terminal node in the target cell cluster is redistributed to obtain a plurality of updated cell clusters with the capacity value as the target capacity value. For example, the target capacity value is 3, that is, the number of terminal nodes in each unit cluster is 3, if there is an nth (N ≧ 4) industry terminal joining value target unit cluster, after the calling number sends a new terminal joining message to the trusted gateway, the trusted gateway first updates the communication key tree, that is, each target terminal node existing in the target unit cluster is redistributed into a plurality of small clusters having 3 nodes, so as to obtain a plurality of updated unit clusters.
In step S720, the target negotiation parameters of each terminal node in the updated key negotiation group corresponding to the updated cell cluster in which the industry terminal is located are determined, and the terminal nodes in the updated key negotiation group exchange the target negotiation parameters with each other, and an updated unique session key of the updated key negotiation group is generated according to the target negotiation parameters before and after the exchange.
In an exemplary embodiment of the present disclosure, the key agreement group corresponding to the update unit cluster is an update key agreement group. After obtaining a plurality of updated key negotiation groups, determining the updated unique session key of the updated key negotiation group by using the same method for determining the unique session key, which is described in step S110 to step S120 for details, and is not described herein again.
In some possible embodiments, if the original target unit cluster has a plurality of leaf nodes, the newly added industry terminal is preferentially connected to the leaf node with a lower height, so that the communication and calculation amount of the updated key can be reduced.
In step S730, the updated unique session key is distributed to each terminal node in the target unit cluster through the trusted gateway.
In the exemplary embodiment of the disclosure, the updated unique session key may be distributed to each terminal node in the target unit cluster through the trusted gateway, and through the exemplary implementation, after only the unique session key of the update unit cluster where the industry terminal is located is updated, by distributing the updated unique session key to each terminal node, all terminal nodes are not required to participate in key update, and communication and calculation consumption of key update are greatly reduced.
In some possible embodiments, if there is a single-terminal node leaving in the target unit cluster, the following two processing methods may be further included:
if the single terminal node is a leaf node which only participates in the generation of the unique session key in one unit cluster, the cluster structure of the target unit cluster is kept connected, and other terminals in the target unit cluster continue to use the unique session key corresponding to the target unit cluster for communication.
If the single terminal node is an intermediate node which simultaneously participates in the generation of the unique session keys of the multiple unit clusters, the cluster structures of the multiple unit clusters are not communicated, the intermediate node is determined again, other terminal nodes in the multiple unit clusters are recombined into an updating unit cluster with the capacity value as the target capacity value based on the determined intermediate node, and the unique session key of the updating unit cluster is determined.
Wherein the re-determined intermediate node may be any node from the plurality of unit clusters. For example, the target capacity value is 3, if the terminal node 1, the terminal node 2 and the terminal node 3 are a first unit cluster, and the terminal node 3, the terminal node 4 and the terminal node 5 are a second unit cluster, when the terminal node 3 leaves, an intermediate node, for example, the terminal node 1, is determined again from the terminal node 1, the terminal node 2, the terminal node 4 and the terminal node 5, and then the terminal node 2, the terminal node 4 and the terminal node 5 are recombined into an updated unit cluster with the capacity value of 3 based on the terminal node 1, for example, the terminal node 1, the terminal node 2 and the terminal node 4 are sequentially connected to form a closed loop, and the terminal node 5 is directly connected to the terminal node 1; for another example, if an intermediate node is determined to be the terminal node 4 again, the terminal node 4, the terminal node 1, and the terminal node 2 may be sequentially connected to form a closed loop, and the terminal node 5 is directly connected to the terminal node 4.
Through the exemplary embodiment of the disclosure, if there is a single terminal node leaving, all middle and high-end nodes do not need to perform key updating, but the terminal nodes of the key negotiation group related to the single terminal node perform cluster re-grouping and generate a unique session key in the cluster, so that the key updating efficiency can be improved, and the communication network resource consumption caused by key updating can be reduced.
In some possible embodiments, if there are multiple target unit cluster combinations, an intermediate node may be determined from the terminal nodes in the multiple target unit clusters, and the multiple target unit clusters are connected through the intermediate node to obtain multiple updated target unit clusters, and a unique session key of each updated target unit cluster is determined and distributed to each terminal node in the multiple target unit clusters. For example, the target cell cluster includes terminal node A, terminal node B, and terminal node C, which have negotiated a unique session key Z1If there is a fourth terminal node D merged with the target unit cluster, the terminal node D and the target unit cluster form a tetrahedron as shown in fig. 8, and accordingly, the target unit cluster corresponding to the tetrahedron can correspond to 4 unique session keys as shown in table 1 below:
TABLE 1 update unique Session Key for target Unit Cluster
Updating a target cell cluster A-B-C A-B-D A-C-D B-C-D
Unique session key Z1 Z2 Z3 Z4
As can be seen from Table 1 above, terminal node A and terminal node B can either pass the unique session key Z corresponding to the original target cell cluster (e.g., A-B-C)1The communication can be carried out according to the unique session key Z corresponding to the newly generated updating target unit cluster (such as A-B-D)2Communication is carried out, so that multiparty communication can be realized in a mode of combining the old key with the new key for assistance.
It should be noted that the method for determining the unique session key of the updated target unit cluster is the same as the process for determining the unique session key described above, and details are not repeated here.
Through the exemplary embodiment, if the key negotiation groups are combined or the key negotiation group and a single terminal node are combined, only the unique session key of the related key negotiation group can be updated, and the pressure of the communication network for updating the key is greatly reduced.
In some possible embodiments, if there is a split key agreement group, two separated key agreement groups may re-determine a new central node, and the two cluster structures remain unchanged, and re-generate an updated unique session key.
According to the communication method based on the key agreement group in the embodiment of the present invention, based on the international mobile identity IMSI of the terminal node in the key agreement group, an asymmetric key mechanism is adopted and a negotiation parameter is exchanged by the terminal nodes in the group, a unique session key of the key agreement group is obtained through negotiation, so that each terminal in the key agreement group performs communication based on the unique session key, not only is the front and back security of communication in the group ensured, but also the key agreement group is taken as a unit, when a part of terminals join or leave, only the unique session key of a part of related key agreement groups needs to be updated, all keys do not need to be updated, and thus the problem of communication and calculation consumption caused by interaction between all terminals and a server terminal in the key updating process is reduced.
In an exemplary embodiment of the present disclosure, there is also provided a key agreement group-based communication apparatus. Referring to fig. 9, the key agreement group based communication device 900 may include a node key determination module 910 and an intra-group session key determination module 920. In particular, the amount of the solvent to be used,
a node key determining module 910, configured to determine target negotiation parameters of each terminal node in a key negotiation group, where the target negotiation parameters of any target terminal node in the key negotiation group at least include a first key negotiation parameter, a second key negotiation parameter, a current timestamp, and an international mobile identity IMSI of another terminal in the key negotiation group, where the first key negotiation parameter is determined according to a random number generated by the target terminal node and a target base point, the target base point is a base point of an elliptic curve, the second key negotiation parameter is determined according to a private key of the target terminal node and the first key negotiation parameter, and the private key is a private key in a public-private key pair determined according to the international mobile identity IMSI of the target terminal node;
the intra-group session key determining module 920 is configured to exchange target negotiation parameters of each terminal node in the key negotiation group, generate a unique session key of the key negotiation group according to target negotiation parameter negotiation before and after the exchange, and perform communication based on the unique session key.
Since each functional module of the communication apparatus based on the key agreement group in the exemplary embodiment of the present disclosure is the same as that in the inventive embodiment of the communication method based on the key agreement group, it is not described herein again.
It should be noted that although in the above detailed description several modules or units of the communication device based on a key agreement group are mentioned, this division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
In addition, in the exemplary embodiments of the present disclosure, a computer storage medium capable of implementing the above method is also provided. On which a program product capable of implementing the above-described method of the present specification is stored. In some possible embodiments, aspects of the present disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to perform the steps according to various exemplary embodiments of the present disclosure described in the "exemplary methods" section above of this specification, when the program product is run on the terminal device.
Referring to fig. 10, a program product 1000 for implementing the above method according to an exemplary embodiment of the present disclosure is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided. As will be appreciated by one skilled in the art, aspects of the present disclosure may be embodied as a system, method or program product. Accordingly, various aspects of the present disclosure may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 1100 according to such an embodiment of the disclosure is described below with reference to fig. 11. The electronic device 1100 shown in fig. 11 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present disclosure.
As shown in fig. 11, electronic device 1100 is embodied in the form of a general purpose computing device. The components of the electronic device 1100 may include, but are not limited to: the at least one processing unit 1110, the at least one memory unit 1120, a bus 1130 connecting different system components (including the memory unit 1120 and the processing unit 1110), and a display unit 1140.
Wherein the storage unit stores program code that is executable by the processing unit 1110 to cause the processing unit 1110 to perform steps according to various exemplary embodiments of the present disclosure as described in the above section "exemplary methods" of the present specification.
The storage unit 1120 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)1121 and/or a cache memory unit 1122, and may further include a read-only memory unit (ROM) 1123.
The storage unit 1120 may also include a program/utility 1124 having a set (at least one) of program modules 1125, such program modules 1125 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 1130 may be representative of one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 1100 may also communicate with one or more external devices 1200 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 1100, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 1100 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 1150. Also, the electronic device 1100 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the internet) via the network adapter 1160. As shown, the network adapter 1160 communicates with the other modules of the electronic device 1100 over the bus 1130. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 1100, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Furthermore, the above-described figures are merely schematic illustrations of processes included in methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the terms of the appended claims.

Claims (10)

1. A communication method based on a key agreement group, comprising:
determining target negotiation parameters of each terminal node in a key negotiation group, wherein the target negotiation parameters of any target terminal node in the key negotiation group at least comprise a first key negotiation parameter, a second key negotiation parameter, a current timestamp and international mobile identification codes IMSIs of other terminals in the key negotiation group, which correspond to the target terminal node, the first key negotiation parameter is determined according to a random number generated by the target terminal node and a target base point, the target base point is a base point of an elliptic curve, the second key negotiation parameter is determined according to a private key of the target terminal node and the first key negotiation parameter, and the private key is a private key in a public and private key pair determined according to the international mobile identification codes IMSIs of the target terminal node;
and exchanging target negotiation parameters of each terminal node in the key negotiation group, generating a unique session key of the key negotiation group according to the target negotiation parameter negotiation before and after the exchange, and carrying out communication based on the unique session key.
2. The method of claim 1, wherein the exchanging target negotiation parameters of each terminal node in the key negotiation group comprises:
any target terminal node in the key negotiation group signs the respective target negotiation parameter by adopting a corresponding private key;
and each terminal node in the key negotiation group exchanges the signed target negotiation parameters and the corresponding signatures.
3. The method of claim 1, wherein determining a public-private key pair based on the international mobile identity of the target end node comprises:
and determining the international mobile identity IMSI of the target terminal node as a corresponding public key, and generating a private key corresponding to the public key by adopting an asymmetric encryption algorithm.
4. The method of claim 1, wherein prior to determining a public-private key pair based on the international mobile identity, IMSI, of the destination terminal node, the method further comprises:
the target terminal node sends authentication request information carrying an international mobile identity (IMSI) and a Service Node Interface (SNID) to a terminal controller, and sends the authentication request information to a terminal analyzer through the terminal controller so as to finish identity and network authentication of the target terminal node;
if the authentication is passed, the terminal analyzer requests a certificate from a trusted gateway, so that the terminal analyzer transmits the certificate and the corresponding current timestamp to the target terminal node;
the target terminal node verifies and confirms the authenticity of the certificate.
5. The method of claim 4, wherein the terminal analyzer requests a certificate from a trusted gateway to cause the terminal analyzer to communicate the certificate and the corresponding current timestamp to the target terminal node, comprising:
the trusted gateway selects a random number and generates an authentication polynomial of the terminal analyzer according to the selected random number;
determining public key information and private key information of the terminal analyzer based on the generated authentication polynomial;
the trusted gateway signs on the authentication polynomial to obtain the certificate and transmits the certificate to the terminal analyzer, wherein the certificate comprises the public key information, the private key information and the digital signature;
and the terminal analyzer transmits the certificate and the corresponding current timestamp to the target terminal node.
6. The method according to any one of claims 1 to 5, wherein the key agreement group is a target unit cluster in a communication key tree, and the target unit cluster and other unit clusters and/or other terminal nodes in the communication key tree have a common node, and the common node simultaneously participates in the generation of the unique session key of the target unit cluster and the generation of the unique session key of other unit clusters and/or other terminal nodes sharing a node with the target unit cluster;
each unit cluster in the communication key tree comprises at least three terminal nodes which are connected into a ring.
7. The method of claim 6, wherein each unit cluster in the communication key tree comprises three terminal nodes;
and each terminal node in the key negotiation group generates a unique session key of the key negotiation group according to target negotiation parameters before and after exchange by the following formula:
Figure FDA0003430238600000021
Figure FDA0003430238600000022
Figure FDA0003430238600000023
wherein Z isA、ZBAnd ZCFor a determined unique session key, SA、SBAnd SCIs the private key of three terminal nodes, rA、rBAnd rCRandom numbers, X, corresponding to three terminal nodesA、XBAnd XCNegotiate a parameter, Ω, for the first keys corresponding to the three terminalsA=sA×P,ΩB=sB×P,ΩC=sCAnd x P is the target base point.
8. The method of claim 6, wherein if there is an industry terminal requesting to join the target cell cluster, the number of terminal nodes in the target cell cluster is greater than a target capacity value, the method further comprising:
redistributing each target terminal node in the target unit cluster to obtain a plurality of updating unit clusters with the capacity values as the target capacity values;
determining target negotiation parameters of all terminal nodes in an updated key negotiation group corresponding to an updated unit cluster in which the industry terminal is located, exchanging the target negotiation parameters of all terminal nodes in the updated key negotiation group, and generating an updated unique session key of the updated key negotiation group according to the target negotiation parameters before and after exchange;
distributing the updated unique session key to each terminal node in the target unit cluster through a trusted gateway;
if there is a single terminal node leaving in the target unit cluster, the method further includes:
if the single terminal node is a leaf node which only participates in the generation of the unique session key in one unit cluster, the cluster structure of the target unit cluster is communicated, and other terminals in the target unit cluster continue to use the unique session key corresponding to the target unit cluster for communication;
if the single terminal node is an intermediate node participating in generation of the unique session keys of the multiple unit clusters at the same time, cluster structures of the multiple unit clusters are not communicated, the intermediate node is determined again, other terminal nodes in the multiple unit clusters are recombined into an updated unit cluster with a capacity value as a target capacity value based on the determined intermediate node, and the unique session key of the updated unit cluster is determined.
9. The method of claim 6, wherein if there are multiple target unit cluster merges, the method further comprises:
determining an intermediate node in the terminal nodes in the target unit clusters, and connecting the target unit clusters through the intermediate node to obtain a plurality of updated target unit clusters;
and respectively determining the unique session key of each updated target unit cluster, and distributing the unique session keys to each terminal node in the plurality of target unit clusters.
10. A communication apparatus based on a key agreement group, the communication apparatus comprising:
a node key determining module, configured to determine target negotiation parameters of each terminal node in a key negotiation group, where the target negotiation parameters of any target terminal node in the key negotiation group at least include a first key negotiation parameter, a second key negotiation parameter, a current timestamp, and an international mobile identity IMSI of another terminal in the key negotiation group, where the first key negotiation parameter is determined according to a random number generated by the target terminal node and a target base point, the target base point is a base point of an elliptic curve, the second key negotiation parameter is determined according to a private key of the target terminal node and the first key negotiation parameter, and the private key is a private key in a public-private key pair determined according to the international mobile identity IMSI of the target terminal node;
and the intra-group session key determining module is used for exchanging target negotiation parameters of each terminal node in the key negotiation group, generating a unique session key of the key negotiation group according to the target negotiation parameter negotiation before and after the exchange, and performing communication based on the unique session key.
CN202111592439.4A 2021-12-23 2021-12-23 Communication method, device and computer storage medium based on key agreement group Pending CN114302392A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111592439.4A CN114302392A (en) 2021-12-23 2021-12-23 Communication method, device and computer storage medium based on key agreement group

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111592439.4A CN114302392A (en) 2021-12-23 2021-12-23 Communication method, device and computer storage medium based on key agreement group

Publications (1)

Publication Number Publication Date
CN114302392A true CN114302392A (en) 2022-04-08

Family

ID=80970444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111592439.4A Pending CN114302392A (en) 2021-12-23 2021-12-23 Communication method, device and computer storage medium based on key agreement group

Country Status (1)

Country Link
CN (1) CN114302392A (en)

Similar Documents

Publication Publication Date Title
CN112003889B (en) Distributed cross-link system and cross-link information interaction and system access control method
Yang et al. Delegating authentication to edge: A decentralized authentication architecture for vehicular networks
CN113194469B (en) 5G unmanned aerial vehicle cross-domain identity authentication method, system and terminal based on block chain
US10250383B1 (en) Dynamic domain key exchange for authenticated device to device communications
US7596690B2 (en) Peer-to-peer communications
US10516654B2 (en) System, apparatus and method for key provisioning delegation
US20090240941A1 (en) Method and apparatus for authenticating device in multi domain home network environment
EP1343345A2 (en) Mobile authentication system with reduced authentication delay
Chai et al. CyberChain: Cybertwin empowered blockchain for lightweight and privacy-preserving authentication in Internet of Vehicles
WO2019041809A1 (en) Registration method and apparatus based on service-oriented architecture
WO2019110018A1 (en) Message authentication method for communication network system, communication method and communication network system
CN113193961B (en) Digital certificate management method and device
Liu et al. LVAP: Lightweight V2I authentication protocol using group communication in VANET s
Anand et al. EECDH to prevent MITM attack in cloud computing
Dougherty et al. APECS: A distributed access control framework for pervasive edge computing services
Zhao et al. A novel decentralized cross‐domain identity authentication protocol based on blockchain
CN114051031A (en) Encryption communication method, system, equipment and storage medium based on distributed identity
CN111709053B (en) Operation method and operation device based on loose coupling transaction network
Gu et al. An efficient blockchain-based cross-domain authentication and secure certificate revocation scheme
Almulla et al. An efficient k‐Means authentication scheme for digital certificates revocation validation in vehicular ad hoc networks
CN114302392A (en) Communication method, device and computer storage medium based on key agreement group
US11611541B2 (en) Secure method to replicate on-premise secrets in a cloud environment
CN114091009A (en) Method for establishing secure link by using distributed identity
Lu et al. Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network
Babu et al. Fog‐Sec: Secure end‐to‐end communication in fog‐enabled IoT network using permissioned blockchain system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination