CN114726545A - Block chain based decentralized group encryption session maintaining method - Google Patents

Block chain based decentralized group encryption session maintaining method Download PDF

Info

Publication number
CN114726545A
CN114726545A CN202210420043.XA CN202210420043A CN114726545A CN 114726545 A CN114726545 A CN 114726545A CN 202210420043 A CN202210420043 A CN 202210420043A CN 114726545 A CN114726545 A CN 114726545A
Authority
CN
China
Prior art keywords
group
intelligent contract
public key
message
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210420043.XA
Other languages
Chinese (zh)
Inventor
杨山河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Yuezhi Computer Co ltd
Original Assignee
Guangzhou Yuezhi Computer Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Yuezhi Computer Co ltd filed Critical Guangzhou Yuezhi Computer Co ltd
Priority to CN202210420043.XA priority Critical patent/CN114726545A/en
Publication of CN114726545A publication Critical patent/CN114726545A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/50Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a block chain intelligent contract and distributed storage technology, in particular to a block chain decentralized group encryption session maintaining method, which realizes the generation and verification of an invitation code by using an asymmetric encryption algorithm technology, invitees can enhance the account security without exposing the block chain account numbers of the invitees in the whole process, when a group speaks, the message to be submitted is encrypted by using a communication public key on a group address book to obtain a set of encrypted versions of the message sent to other users of the group, the set file is stored in a distributed storage network to obtain the hash of the file, the user in any group can obtain an encrypted ciphertext by using the hash, namely, the communication data is stored on the distributed storage network, a group message queue is maintained by using a data structure of the block chain intelligent contract, the hash of the encrypted file of the message is maintained in the queue, and the establishment of a decentralized social group and the encryption communication process are realized.

Description

Block chain based decentralized group encryption session maintaining method
Technical Field
The invention relates to the field of blockchain and web3.0 social groups, in particular to a method for establishing a group and maintaining encrypted communication based on blockchain decentralization.
Background
Communication group establishment and communication maintenance in the current social field need to rely on a centralized social network, a user establishes a group after verifying identity through registering an account, and actively or passively invites the user with the existing centralized network account to join the group, and communication sending and receiving in the group all rely on a centralized service facility.
Most of the prior art schemes are realized by adopting a centralization method, but the realization of the prior art adopting a decentralization method has a certain privacy security problem more or less.
Disclosure of Invention
The invention aims to provide a method for establishing a decentralized communication group based on a block chain by utilizing a block chain intelligent contract technology, which is characterized by comprising the following steps of:
s1, a group creator creates a communication group with any theme, describes the group by using a group keyword, sets configuration parameters of the group, and submits a block chain intelligent contract for realizing the group function, wherein the configuration parameters comprise the number of participants and the group name;
s2, the group creator uses the asymmetric encryption algorithm to generate a group invitation code private key as the invitation code, the invitation code private key deduces the invitation code public key through the asymmetric encryption algorithm, the group creator submits the group invitation code public key to the intelligent contract through the intelligent contract to establish the data structure invitecodes { User0_ public key, User1 public key, User N public key } which is formed by the invitee public key and the public key, and at the same time, the group creator creates the data structure of the User public key list for group communication, namely the data structure of the group address book, which is formed by the public key, the signature information: user _ key _ list ([ { [ Chat _ Pub ]: [ invite _ sign _ text) ]), where the public key will be derived by the private key asymmetric encryption algorithm of group communication purposes that the group members individually generate and hold for group communication purposes; the signature information is the information signed by the private key of the user communication destination, and the signature information can be easily verified by the public key; the asymmetric encryption algorithm can be an elliptic curve and RSA encryption algorithm; each time a public key item is added to the group address book, the public key item indicates that a user is invited to successfully join a group;
s3, the group creator informs the invitee of the invitation code private key through the non-intelligent contract interaction approach, the non-intelligent contract interaction approach includes but is not limited to mail, short message, instant chat, voice chat tools;
s4, invitee receives the invitation code private key, generates the group communication private key of the corresponding group communication usage, and then deduces the group communication public key by using the asymmetric encryption algorithm based on the group communication private key, which is used for the invitee to communicate with other group members after joining the group;
s5, the invitee signs the public key for group communication by the received invitation code private key and submits the public key to the intelligent contract;
s6, the intelligent contract receives the signature information submitted by the invitee, firstly verifies whether the signature information is signed by the invitation code private key through the invitation code public key, and after confirmation, the intelligent contract executes the following operations:
a) deleting the invitation code public key which is submitted by the invitee and has been verified to be used;
b) adding a group communication public key generated by an invitee into an invitee list in the intelligent contract, wherein the invitee list becomes a group address book;
and S7, other invitees join the group through the steps S3-S6 until the invitation codes are all used, and the public keys of the invitation codes are deleted after the user joins.
A method for maintaining a group encryption session through blockchain decentralization, comprising the steps of:
s1, after the invitee joins the group address book of the intelligent contract, the invitee indicates that the group chat is entered, and before the group speaker sends the message, the group address book of the intelligent contract is downloaded;
s2, performing asymmetric encryption calculation on the message to be sent one by one according to the group communication public key of each invitee in the group address book to obtain an encrypted ciphertext array file, wherein the data structure of the ciphertext array file is composed of the group communication public key and the encrypted message;
s3, submitting the obtained ciphertext array file to a distributed storage network;
s4, obtaining a hash value of a ciphertext array file in the distributed storage network, and submitting the hash value to a message queue of an intelligent contract, wherein the message queue takes the block height as a key and the hash value as a value;
s5, downloading the message queue of the intelligent contract according to the block height in sequence by the group members, searching the ciphertext array file from the distributed storage network through the hash value, finding the group communication public key of each group member, and decrypting by using the group communication private key of each group member to obtain the message.
The invention has the beneficial effects that: the establishment of the group is established through a decentralized block chain intelligent contract, and is different from the traditional social group establishment relying on centralized service facilities.
The group is established through the invitation code, the invention realizes the generation and verification of the invitation code by using the asymmetric encryption algorithm technology, invitees can not expose own block chain accounts with digital assets in the whole process so as to enhance the account safety,
when a group speaks, a message to be submitted is encrypted by using a communication public key on a group address book, so that a set of encrypted versions of the message sent to other users in the group is obtained, the set file is stored in a distributed storage network, the hash of the file is obtained, the user in any group can obtain an encrypted ciphertext by using the hash, namely, the communication data is stored on the distributed storage network, a group message queue is maintained through a data structure of a block chain intelligent contract, and the hash of the encrypted file of the message is maintained in the queue.
And (4) enabling the group members to exit the group, and utilizing the private key signature to submit to the intelligent contract to realize the elimination from the group address book, safely exiting the group and not receiving the messages in the group any more.
Meanwhile, the group establishment and maintenance can be independent of any centralized service facility as long as the blockchain exists and the intelligent contract can be executed.
Drawings
For ease of illustration, the present invention is described in detail by the following preferred embodiments and the accompanying drawings.
FIG. 1 is a schematic diagram of the establishment of a blockchain decentralized group according to the present invention;
fig. 2 is a timing diagram of establishment of a session and maintenance of an encrypted session based on a blockchain decentralized group according to the present invention, which explains how the session is securely established and maintained by encryption techniques.
Detailed Description
In order to make the implementation objects, technical solutions and features of the present application clearer, the technical solutions implemented by the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some examples of the present application, but not all implementation cases. The embodiments of the subject application, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Therefore, the detailed description of the embodiments provided in the present application is not intended to limit the scope of the claims of the present application, but is merely representative of particular embodiments of the present application. All other embodiments obtained by a person skilled in the art without any inventive step based on the embodiments in this application are within the scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present application, it is further noted that the terms group, communication session, session channel, communication channel, asymmetric encryption, smart contract are to be understood in a broad sense unless explicitly stated or limited otherwise. The specific meaning of the above terms in this application will be understood to be a specific case for those of ordinary skill in the art.
In view of this, the present embodiment provides a method for establishing a decentralized group based on a block chain, and the following describes the scheme provided by the embodiment of the present invention in detail:
first, referring to fig. 1 and 2, the method comprises the following steps:
s1, a group creator creates a communication group with any theme, describes the group by using a group keyword, sets configuration parameters of the group, and submits a block chain intelligent contract for realizing the group function, wherein the configuration parameters comprise the number of participants and the group name;
s2, the group creator uses the asymmetric encryption algorithm to generate a group of invitation code private keys as invitation codes, the invitation code private keys derive invitation code public keys through the asymmetric encryption algorithm, the group creator submits the group of invitation code public keys to an intelligent contract through an intelligent contract to establish a data structure of an invitation code array formed by invitechnologies { User0_ public key, User1 public key, User public key }, and simultaneously creates a data structure of a User public key list for group communication: user _ key _ list ({ [ Chat _ Pub ]: [ invite _ sign _ text ]), the public key is derived from the group communication private key which is independently generated and held by the group members for group communication; the signature information is the information obtained by the user signing the private key corresponding to the public key of the received invitation code; the asymmetric encryption algorithm can be an elliptic curve encryption algorithm or an RSA encryption algorithm;
s3, the group creator informs the invitee of the private key of the invitation code through a non-intelligent contract interaction way; non-intelligent contract interaction approaches include, but are not limited to, email, SMS, instant chat, voice chat tools
S4, invitee receives the invitation code private key, generates the group communication private key of the corresponding group communication usage, and then deduces the group communication public key by using the asymmetric encryption algorithm based on the group communication private key, which is used for the invitee to communicate with other group members after joining the group;
s5, the invitee signs the public key for group communication by the received invitation code private key and submits the public key to the intelligent contract;
s6, the intelligent contract receives the signature information submitted by the invitee, firstly verifies whether the signature information is signed by the invitation code private key through the invitation code public key, and after confirmation, the intelligent contract executes the following operations:
a) deleting the invitation code public key which is submitted by the invitee and has been verified to be used;
b) adding a group communication public key generated by an invitee into an invitee list in the intelligent contract, wherein the invitee list becomes a group address book at the moment;
and S7, other invitees join the group through the steps S3-S6 until the invitation codes are all used, and the public keys of the invitation codes are deleted after the user joins.
A method for maintaining a group encryption session through blockchain decentralization, comprising the steps of:
s1, after the invitee joins the group address book of the intelligent contract, the invitee enters into group chat, and before the group user X sends the message msg, the group address book of the intelligent contract is downloaded;
s2, performing asymmetric encryption calculation on the message one by one according to the group communication public key Chat _ Pub of each invitee in the group address book to obtain an encrypted ciphertext CryptoMsg ciphertext array file, wherein the data structure of the ciphertext array file is formed by the group communication public key Chat _ Pub-encrypted message CryptoMsg
sender: [ public key of user X ],
timestamp: [ current transmission Timestamp ],
Messagess:[
{
【Chat_Pub_0】: CryptoMsg0
},
......
{
【Chat_Pub_X】: CryptoMsgX
}
];
s3, submitting the obtained ciphertext array file to a distributed storage network, wherein IPFS is adopted in the embodiment;
s4, obtaining a hash value msgHash of a ciphertext array file in the distributed storage network, submitting the hash value msgHash to a message queue of an intelligent contract, wherein the message queue takes the block height as a key, and takes the hash value msgHash as a value:
{
[ Block height H ]: the msgHash0 is sent to the mobile station,
msgxHash1 [ height of the sector Hx ],
......
};
s5, the group members download the message queues of the intelligent contracts in sequence according to the block heights, the ciphertext array files are searched from the distributed storage network through the hash values, the group members try to decrypt the message ciphertexts sent to the group members at each height by using the group communication private keys of the group members, and the message plaintexts are obtained after decryption is successful.
The message of this embodiment may be plain text information, or a format file such as json or xml for describing a rich media format.
The invention has the beneficial effects that: different from the traditional social group establishment relying on centralized service facilities, the group establishment of the invention is established through a block chain intelligent contract
The group is established through an invitation code, the invention is characterized in that the generation and verification of the invitation code are realized by using an asymmetric encryption algorithm technology, invitees can enhance the safety of digital assets without exposing own account numbers with the digital assets in the whole process, meanwhile, when a group talks, messages to be submitted are encrypted by using public keys on a group address book, so that a set of encrypted versions of the messages sent to other users of the group is obtained, the set file is stored in a distributed storage network to obtain the hash of the file, the users in any group can obtain an encrypted ciphertext by using the hash, namely, the communication data of the invention is stored in the distributed storage network, a group message queue is maintained through a data structure of a block chain intelligent contract, and the hash of the encrypted file of the message is maintained in the queue.
The group members quit the group, and the group members can be removed from the group address book by submitting the intelligent contract with the private key signature, and the group members safely quit the group without receiving the information in the group.
Meanwhile, the group establishment and maintenance can be independent of any centralized service facility as long as the blockchain exists and the intelligent contract can be executed.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part. The block chain in the invention is not limited to a certain block chain, but comprises all block chains supporting the intelligent contract function, and the distributed storage network is not limited to a distributed storage network realized by a certain technology, but supports a storage network which is distributed and stored in file blocks and can be referred to by a unique hash value and utilize the hash value to access the file. The public key corresponding to the private key of the invention takes asymmetric encryption algorithms such as an elliptic algorithm and the like as an example of a derivation algorithm from the private key to the public key, and practically any algorithm meeting the following characteristics can be adopted:
1. the private key may derive the public key;
2. the public key can not directly derive the private key, or the deduction needs to be cracked and calculated resources which can not be met by a real production environment, so that the public key can not derive the private key;
3. the cipher text encrypted by the public key can be decrypted by the private key, and if the private key is not correct, the decryption operation cannot be completed;
4. the submitted information may be signed with the private key and the public key may be used to verify that the information is indeed an operation by the person holding the private key.
It is noted that terms such as communication session, session channel, communication channel, etc. are industry colloquial calls herein. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element recited by the phrase "comprising" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above description is only for various embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and all such changes or substitutions are included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (1)

1. A method for maintaining a group encryption session based on block chain decentralized is characterized by comprising the following steps:
s1, after the invitee joins the group address book of the intelligent contract, the invitee enters into group chat, and before the group speaker sends the message, the group address book of the intelligent contract is downloaded;
s2, performing asymmetric encryption calculation on the messages one by one according to the group communication public key of each invitee in the group address book to obtain an encrypted ciphertext array file, wherein the data structure of the ciphertext array file is formed by the group communication public key-encrypted messages;
s3, submitting the obtained ciphertext array file to a distributed storage network;
s4, obtaining a hash value of a ciphertext array file in the distributed storage network, and submitting the hash value to a message queue of an intelligent contract, wherein the message queue takes the block height as a key and the hash value as a value;
s5, downloading the message queue of the intelligent contract according to the block height in sequence by the group members, searching the ciphertext array file from the distributed storage network through the hash value, finding the group communication public key of each group member, and decrypting by using the group communication private key of each group member to obtain the message.
CN202210420043.XA 2022-03-02 2022-03-02 Block chain based decentralized group encryption session maintaining method Pending CN114726545A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210420043.XA CN114726545A (en) 2022-03-02 2022-03-02 Block chain based decentralized group encryption session maintaining method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210420043.XA CN114726545A (en) 2022-03-02 2022-03-02 Block chain based decentralized group encryption session maintaining method
CN202210194819.0A CN114338046B (en) 2022-03-02 2022-03-02 Decentralized group establishing method based on block chain

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202210194819.0A Division CN114338046B (en) 2022-03-02 2022-03-02 Decentralized group establishing method based on block chain

Publications (1)

Publication Number Publication Date
CN114726545A true CN114726545A (en) 2022-07-08

Family

ID=81030279

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202210194819.0A Active CN114338046B (en) 2022-03-02 2022-03-02 Decentralized group establishing method based on block chain
CN202210420043.XA Pending CN114726545A (en) 2022-03-02 2022-03-02 Block chain based decentralized group encryption session maintaining method

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202210194819.0A Active CN114338046B (en) 2022-03-02 2022-03-02 Decentralized group establishing method based on block chain

Country Status (1)

Country Link
CN (2) CN114338046B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115334025A (en) * 2022-10-12 2022-11-11 北京百度网讯科技有限公司 Decentralized instant messaging method, decentralized instant messaging device, decentralized instant messaging equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100959074B1 (en) * 2007-12-12 2010-05-20 한국전자통신연구원 The security group creation and authentication on the p2p network
CN106850195B (en) * 2016-04-18 2020-05-19 中国科学院信息工程研究所 Group key negotiation and communication method in instant communication
CN110035002B (en) * 2019-04-01 2021-09-10 达闼机器人有限公司 Method for implementing instant messaging, terminal equipment and storage medium
CN110264354B (en) * 2019-05-31 2020-09-01 阿里巴巴集团控股有限公司 Method and device for creating block chain account and verifying block chain transaction
CN111669434B (en) * 2020-05-18 2023-07-04 支付宝实验室(新加坡)有限公司 Method, system, device and equipment for establishing communication group

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115334025A (en) * 2022-10-12 2022-11-11 北京百度网讯科技有限公司 Decentralized instant messaging method, decentralized instant messaging device, decentralized instant messaging equipment and storage medium

Also Published As

Publication number Publication date
CN114338046B (en) 2022-05-24
CN114338046A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
US11050563B2 (en) Method of exchanging keys by smart contract implemented on a blockchain
US8972731B2 (en) Systems, devices, and methods for securely transmitting a security parameter to a computing device
US7996673B2 (en) System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient
CN109639828A (en) Conversation message treating method and apparatus
EP2282442A1 (en) Key distributing method, public key of key distribution centre online updating method and device
US20130246794A1 (en) Systems, devices, and methods for securely transmitting a security parameter to a computing device
US20100268943A1 (en) Method and System for Source Authentication in Group Communications
CN102484583A (en) Ecure key management in multimedia communication system
CN113037499B (en) Block chain encryption communication method and system
KR20080046593A (en) System and method for secure record protocol using shared knowledge of mobile user credentials
CN110048849A (en) A kind of session cipher negotiating method of multilayer protection
CN114338046B (en) Decentralized group establishing method based on block chain
US10530581B2 (en) Authenticated broadcast encryption
CN107104938B (en) Method for establishing secure data exchange channel, client and computer readable medium
Valkonen et al. Ad hoc security associations for groups
EP2239918B1 (en) Systems, devices and methods for securely transmitting a security parameter to a computing device
CN113468580A (en) Multi-party collaborative signature method and system
EP2239919B1 (en) Systems, devices and methods for securely transmitting a security parameter to a computing device
CN116865970A (en) Multiparty cooperative key generation and digital signature method and system based on national cryptographic algorithm
Sandoval et al. Pakemail: authentication and key management in decentralized secure email and messaging via pake
CN112235320B (en) Cipher-based video networking multicast communication method and device
EP4106264A1 (en) System and method for performing secure key exchange
Shin et al. A verifier-based password-authenticated key exchange using tamper-proof hardware
CN112235799B (en) Network access authentication method and system for terminal equipment
Saxena et al. BAS-VAS: A novel secure protocol for value added service delivery to mobile devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination