WO2009143765A1 - 密钥分配方法、在线新更密钥分配中心的公钥方法及装置 - Google Patents

密钥分配方法、在线新更密钥分配中心的公钥方法及装置 Download PDF

Info

Publication number
WO2009143765A1
WO2009143765A1 PCT/CN2009/071976 CN2009071976W WO2009143765A1 WO 2009143765 A1 WO2009143765 A1 WO 2009143765A1 CN 2009071976 W CN2009071976 W CN 2009071976W WO 2009143765 A1 WO2009143765 A1 WO 2009143765A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
communication entity
communication
distribution center
public
Prior art date
Application number
PCT/CN2009/071976
Other languages
English (en)
French (fr)
Inventor
铁满霞
曹军
赖晓龙
黄振海
Original Assignee
西安西电捷通无线网络通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安西电捷通无线网络通信有限公司 filed Critical 西安西电捷通无线网络通信有限公司
Priority to US12/994,690 priority Critical patent/US20110103589A1/en
Priority to EP09753483A priority patent/EP2282442A1/en
Publication of WO2009143765A1 publication Critical patent/WO2009143765A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Definitions

  • the present invention relates to the field of data security, and in particular, to a key distribution method using public key cryptography, a method for public key of an online new key distribution center, a key distribution center, a communication entity, and a key management system.
  • Key management is one of the key technologies when secure communication between communication network entities is required.
  • Small networks can use a method of sharing a key for each pair of users, but not in large networks.
  • a system with N users in order to achieve secure communication between any two users, it is necessary to generate and allocate N (N-1) 12 keys to ensure secure communication between any two users in the network.
  • N N
  • N 12 keys
  • a centralized key management method is usually adopted, and a trusted online server is used as a key distribution center (KDC, Key Distribution Center) or a key transfer center (KTC, Key Transportation Center).
  • KDC Key Distribution Center
  • KTC Key Transportation Center
  • step 1 the first communication entity A requests the key distribution center to distribute the key used for communication with the second communication entity B, and the key distribution center generates k, and transmits k to the first communication respectively.
  • Entity A and second communication entity B, steps 2 and 3, are implemented by using a key distribution center and a pre-shared key encryption of A and key distribution center and B, respectively.
  • step 1 the first communication entity A requests the key distribution center to distribute the key used for communication with the second communication entity B, and the key distribution center generates k, and passes k to the first communication entity.
  • step 2 the first entity A forwards k to the second communication entity B, that is, step 3, the transfer (transfer) process uses the key distribution center and the A and the key distribution center and the pre-shared B respectively.
  • Key encryption implementation the first communication entity A requests the key distribution center to distribute the key used for communication with the second communication entity B, and the key distribution center generates k, and passes k to the first communication entity.
  • step 2 the first entity A forwards k to the second communication entity B, that is, step 3, the transfer (transfer) process uses the key distribution center and the A and the key distribution center and the pre-shared B respectively.
  • Key encryption implementation the first communication entity A requests the key distribution center to distribute the key used for communication with the second communication entity B, and the key distribution center generates k, and passes k to the first communication entity.
  • step 3
  • step 1 the first communication entity A will communicate with the second communication entity B.
  • the key k is transmitted to the key transfer center, and the key transfer center passes the K to the second communication entity B, that is, step 2; the transfer process utilizes the key transfer center and the A and the key transfer center, respectively.
  • step 1 the first communication entity A transmits the communication key k with the second communication entity B to the key transfer center, and the key transfer center transmits the k to the first entity A.
  • the notification to the second communication entity B, that is, step 2 after receiving the notification, the first entity A transfers the k to the second entity B, that is, step 3, the transfer (transfer) process respectively uses the key transfer
  • each pair of entities can use a new communication key for each communication, but each user needs to save a share with the key distribution center or key transfer center.
  • the secret management key used for a long time, and for the key distribution center and the key transfer center not only need to store a huge number of secret management keys, but also bear a large security risk, because if there is a problem, it will directly Threatening the security of the entire system, and none of the above key distribution methods have the perfect forward secrecy (PFS).
  • PFS forward secrecy
  • the present invention solves the above technical problems in the background art, and based on the principle of Tri-element Peer Authentication (Tea), uses a public key cryptographic technique to propose a key distribution method and an online new key.
  • a method for allocating a public key of a central center, a key distribution center, a communication entity, and a key management system that not only securely distributes communication keys for each pair of entities, but also has keys with PFS attributes, and reduces system key management.
  • Complexity, and the implementation of the public key online update function of the trusted third party - key distribution center is based on the principle of Tri-element Peer Authentication (Tea), uses a public key cryptographic technique to propose a key distribution method and an online new key.
  • the technical solution of the present invention is: Providing a key distribution method, the key distribution center having a pair of public and private key pairs, the method comprising:
  • the key distribution center receives a key request message forwarded by the first communication entity by the bearer device, where the key request message includes a temporary public key of the first communication entity;
  • the key distribution center queries the database whether the first communication entity and the second communication entity both register the security service, and after the security service is registered, generates a communication session key between the first communication entity and the second communication entity;
  • the key distribution center utilizes the temporary public key of the first communication entity to the communication session key After the encryption is performed, the signature is calculated by using the private key of the key distribution center to form a key response message; the key distribution center returns the key response message to the first communication entity through the bearer device; Transmitting, by the second communication entity, a key request message forwarded by the bearer device, where the key request message includes a temporary public key of the second communication entity;
  • the key distribution center encrypts the communication session key between the second communication entity and the first communication entity by using the temporary public key of the second communication entity, and then calculates the signature by using the private key of the key distribution center. , forming a key response message;
  • the key distribution center returns the key response message formed by the temporary public key of the second communication entity to the second communication entity by the bearer device.
  • the present invention also provides a key distribution method, in which a communication entity obtains a public key of a key distribution center before secure communication; the method includes:
  • the first communication entity and the second communication entity that need to communicate each generate a pair of temporary public-private key pairs, respectively;
  • the first communication entity and the second communication entity respectively send a key request message to the key distribution center through the bearer device by using the generated temporary public key, where the key request message includes a corresponding first communication entity or second communication The temporary public key of the entity;
  • the key response message including a communication session key between the first communication entity and the second communication entity;
  • the first communication entity and the second communication entity respectively perform signature verification on the key response message by using the public key of the key distribution center, and after the verification is passed, respectively respond to the key by using the corresponding temporary private key.
  • the message is decrypted to get the communication session key.
  • the method further includes: deleting, by the first entity and the second entity, the respective temporary public-private key pair after communicating by using the communication session key; and updating the communication when starting the secure communication next time or during the secure communication process
  • the session key is used, the temporary public-private key pair is re-generated, and the key request message is sent to the key distribution center by the bearer device, and the above steps are repeated to obtain a new communication session key.
  • the key request message and the key response message further include: a security parameter, completing negotiation and advertisement of an encryption algorithm, a working mode, or a working parameter.
  • the key request message forwarded by the first communication entity by the bearer device further includes: Entity information;
  • the key request message forwarded by the second communication entity by the bearer device further includes: information of the first communication entity.
  • the present invention also provides a method for dynamically updating a public key of a key distribution center, comprising: a key distribution center querying a database to obtain a list of communication entities of a registered secret service; and a key distribution center generating a public key update notification message, the message a new public key containing the key distribution center and a signature made using the old private key of the key distribution center;
  • the key distribution center transmits the public key update notification message to the communication entity of the registered confidential service through the bearer device according to the list of communication entities of the registered secret service.
  • the method further includes:
  • the communication entity After receiving the public key update notification message sent by the key distribution center by the bearer device, the communication entity verifies whether the signature is correct by using the public key of the locally stored key distribution center, and stores the locality after the verification is passed.
  • the public key of the key distribution center is updated to the new public key in the public key update notification message.
  • the method further includes:
  • the public key update confirmation message is sent to the key distribution center by the bearer device;
  • the key distribution center receives the public key update confirmation message sent by the communication entity by using the bearer device, and the public key update confirmation message includes: the communication entity has completed the public key update information of the key distribution center.
  • the present invention further provides a key distribution center having a pair of public and private key pairs, the key distribution center comprising:
  • a first receiving unit configured to receive a key request message forwarded by the first communications entity by the bearer device, where the key request message includes a temporary public key of the first communications entity, and information of a second communications entity with which the communications entity communicates; and receiving a second key request message forwarded by the second communication entity by the bearer device, the second key request message including a temporary public key of the second communication entity, and information of the first communication entity with which the second communication entity communicates;
  • a query unit configured to query the database whether the first communication entity and the second communication entity both register the confidential service, and send the query result
  • a first generating unit configured to generate a communication session key between the first communication entity and the second communication entity after receiving the security service sent by the query unit
  • the encryption unit is configured to encrypt the communication session key generated by the generating unit by using the temporary public key of the first communication entity, and then calculate the signature by using the private key of the key distribution center to form a key response message; And encrypting the communication session key between the second communication entity and the first communication entity by using the temporary public key of the second communication entity, and then calculating the signature by using the private key of the key distribution center to form a key response Message
  • a first sending unit configured to return a key response message formed by the encryption unit by using a temporary public key of the first communication entity to the first communication entity by using the bearer device; and temporarily using the second communication entity
  • the key response message formed by the public key is returned to the second communication entity by the bearer device.
  • the key distribution center further includes:
  • the second generating unit is configured to generate a public key update notification message, where the public key update notification message includes a new public key and a utilization key of the key distribution center The signature of the old private key of the distribution center;
  • a second sending unit configured to send the public key update notification message to the communication entity of the registered secret service by using the bearer device according to the communication entity list of the registered secret service acquired by the acquiring unit.
  • the key distribution center further includes:
  • the key distribution center receives the public key update confirmation message sent by the communication entity by the bearer device, and the public key update confirmation message includes: the communication entity has completed the public key update information of the key distribution center.
  • the present invention further provides a communication entity that obtains a public key of a key distribution center before the secure communication, the communication entity comprising:
  • a generating unit configured to generate a pair of temporary public-private key pairs
  • a receiving unit configured to receive a key response message sent by a key distribution center, where the key response The message includes a communication session key between the communication entity and a communication entity with which it communicates;
  • a verification unit is configured to perform signature verification on the key response message by using the public key of the key distribution center, after the verification is passed, The key response message is decrypted using the temporary private key of the communication entity to obtain a communication session key.
  • the communication entity further includes:
  • a key deletion unit configured to: after the communication entity communicates by using the communication session key, delete the temporary public-private key pair, and when the next time the secure communication is started or the communication session key needs to be updated during the secure communication process, The generating unit sends a notification to regenerate the temporary public-private key pair.
  • the communication entity further includes: a key update unit, configured to verify the signature of the public key of the locally stored key distribution center after receiving the public key update notification message sent by the bearer device in the key distribution core Whether it is correct, and after the verification is passed, the public key of the locally stored key distribution center is updated to the new public key in the public key update notification message.
  • a key update unit configured to verify the signature of the public key of the locally stored key distribution center after receiving the public key update notification message sent by the bearer device in the key distribution core Whether it is correct, and after the verification is passed, the public key of the locally stored key distribution center is updated to the new public key in the public key update notification message.
  • the communication entity further includes:
  • a key update confirmation unit configured to send, by the bearer device, a public key update confirmation message to the key distribution center after the key update unit updates the public key of the locally stored key distribution center, where the public key update confirmation message includes: The communication entity has completed the public key update information of the key distribution center.
  • the present invention also provides a key management system, the system comprising a communication entity, a bearer device, a key distribution center, and a database, wherein
  • the bearer device is configured to forward a key request message, a key response message, a public key update notification, or a public key update confirmation message in a key distribution process and a public key update process;
  • the database is configured to store whether a communication service is registered by each communication entity, and provide a service for the key distribution center; or feed back to the key distribution center a list of communication entities that have registered the security service; the key distribution center, and the bearer
  • the device is connected to the database, and is configured to determine whether to generate a communication session key according to the result of the query database after receiving the key request message forwarded by the bearer device, and perform cryptographic signature on the generated communication session key to form a key.
  • the communication entity is configured to generate a pair of temporary public-private key pairs, send a key request message to the key distribution center by using the bearer device, and use the public key of the key distribution center and the communication entity for the received key response message
  • the temporary private key is used for verification and decryption of the signature to obtain the communication session key; or after the public key update notification sent by the key distribution center is received by the bearer device, the stored public key is updated, and the key is transmitted to the key through the bearer device.
  • the distribution center sends a public key update confirmation message.
  • the communication entities are two or more.
  • the bearer device is: a short message system, a global mobile communication system, a code division multiple access system, a public switched telephone network, or the Internet.
  • the invention is based on the principle of ternary peer-to-peer authentication (TePA), adopts public key cryptography technology, distributes keys for entities requiring communication through the key distribution center KDC, realizes secure distribution and dynamic update of communication keys, and has perfect Forward Secrecy PFS solves the problem that the traditional method key distribution center KDC needs to manage a large number of keys, the user needs to store long-term secret keys, and the communication keys do not have forward confidentiality; at the same time, the present invention supports the key distribution center KDC
  • the public key online update feature is applicable to mobile communication network systems, and can also be applied to other communication systems.
  • Figure 1 - 4 is a schematic diagram of a conventional key distribution method based on a key distribution center or a key transfer center;
  • FIG. 5 is a schematic diagram of a key distribution system using public key cryptography according to the present invention.
  • FIG. 6 is a schematic diagram of a key distribution method using public key cryptography according to the present invention.
  • FIG. 7 is a schematic diagram of a method for publicly updating a public key of a key distribution center using a public key cryptography technique according to the present invention.
  • the key distribution system includes: communication entities A1, A2, ..., An, bearer devices, and secrets.
  • GSM Global System for Mobile
  • CDMA Code Division Multiple Access
  • PSTN Public Switched Telephone Network
  • Internet Internet
  • the embodiment of the present invention further provides a key distribution method, where the key distribution center has a pair of public and private key pairs, and the method includes:
  • the key distribution center receives a key request message forwarded by the first communication entity by the bearer device, the key request message includes a temporary public key of the first communication entity; the key distribution center queries the database for the first communication entity and the second Whether the communication entity is registered with the security service, and after the security service is registered, the communication session key between the first communication entity and the second communication entity is generated;
  • the key distribution center encrypts the communication session key by using the temporary public key of the first communication entity, and then calculates the signature by using the private key of the key distribution center to form a key response message;
  • the key distribution center returns the key response message to the first communication entity through the bearer device;
  • the key distribution center receives a key request message forwarded by the second communication entity by the bearer device, where the key request message includes a temporary public key of the second communication entity;
  • the key distribution center encrypts the communication session key between the second communication entity and the first communication entity by using the temporary public key of the second communication entity, and then calculates the private key of the key distribution center Its signature, which constitutes a key response message;
  • the key distribution center returns the key response message formed by the temporary public key of the second communication entity to the second communication entity by the bearer device.
  • the present invention also provides a key distribution method, in which a communication entity obtains a public key of a key distribution center before performing confidential communication; the method includes:
  • each of the first communication entity and the second communication entity that need to communicate generates a pair of temporary public-private key pairs
  • the first communication entity and the second communication entity respectively send a key request message to the key distribution center through the bearer device by using the generated temporary public key, where the key request message includes a corresponding first communication entity or a temporary public key of the second communicating entity;
  • the first communication entity and the second communication entity respectively use the public key pair of the key distribution center
  • the key response message is used for signature verification. After the verification is passed, the key response message is decrypted by using the corresponding temporary private key to obtain a communication session key.
  • FIG. 6 is a specific flowchart of a key distribution method using public key cryptography, and the method includes the following steps:
  • the key distribution center has a pair of public and private key pairs X and Px.
  • the communication entity (taking communication entities A and B as an example) should obtain the public key Px of the key distribution center before communication and store it locally.
  • the communication session key is obtained by the key distribution method.
  • the first communication entity A generates a pair of temporary public-private key pairs a and Pa, and sends a key request message to the key distribution center by the bearer device, the key request message including the temporary public key Pa of the first communication entity A; Steps 1 and 2 in the figure;
  • the key distribution center After receiving the key request message of the first communication entity A forwarded by the bearer device, the key distribution center queries the database whether the first communication entity A and the second communication entity B are all registered with the secret service, that is, After receiving the key request message, the key distribution center sends a request to the database to query whether the first communication entity A and the second communication entity B both register the confidential service, and receives the query result fed back by the database, that is, Steps 3 and 4; if the result of the query received by the key distribution center is that both the first communication entity A and the second communication entity B have registered the secret service, the key distribution center generates the first communication entity A and the second communication entity B.
  • the key response message is formed by the bearer.
  • the device returns to the first communication entity A, ie steps 5 and 6 in the figure; if the result of the query received by the key distribution center is the first communication entity A and the Communication entity B have no or only a registered service registered confidential confidentiality service, the key distribution center returns an error message to the first communication entity through the carrier device, not shown;
  • the first communication entity A After receiving the key response message forwarded by the bearer device, the first communication entity A performs signature verification by using the public key Px of the locally stored key distribution center, and then uses the temporary of the first communication entity A after the verification is passed.
  • the private key a is decrypted to obtain the communication session key k; if the first communication entity A receives the error message sent by the key distribution center forwarded by the bearer device, the current secret communication fails;
  • the second communication entity generates a pair of temporary public-private key pairs b and Pb, and sends a key request message to the key distribution center by the bearer device, the message containing the temporary public key Pb of the second communication entity B, That is, the second communication entity B sends a key request message to the bearer device, the message containing the temporary public key Pb of the second communication entity B; the bearer device forwards the received key request message to the key distribution center, That is, steps 1' and 2' in Figure 6;
  • the key distribution center After receiving the key request message of the second communication entity B forwarded by the bearer device, the key distribution center uses the second communication entity with the communication session key k between the first communication entity A and the second communication entity B. After the temporary public key Pb of B is encrypted, the signature is calculated by using the private key X of the key distribution center, and the key response message is returned to the second communication entity B through the bearer device, that is, the key distribution center will The configured key response message is sent to the bearer device, and the bearer device forwards the received key response message to the second communication entity B, that is, steps 3' and 4' in FIG. 6;
  • the second communication entity B After receiving the key response message forwarded by the bearer device, the second communication entity B performs signature verification by using the public key Px of the locally stored key distribution center KDC, and then uses the temporary second communication entity B after the verification is passed.
  • the private key b decrypts to obtain the communication session key k;
  • the first communication entity A and the second communication entity B then use the communication session key k as the session key for secure communication.
  • the first communication entity A and the second communication entity B do not need to store the respective temporary public-private key pairs, and may delete them in time, and need to update the communication when the confidential communication is started next time or during the secure communication process.
  • the session key is generated, the temporary public-private key pair is re-generated, a key request message is sent to the key distribution center, and the above steps are repeated to obtain a new communication session key.
  • the key request message and the key response message may carry security parameters, and complete negotiation and notification of the encryption algorithm, working mode, working parameters, and the like.
  • the key request message sent by the first communication entity A and the second communication entity B to the key distribution center may also carry the information of the counterpart entity.
  • the key distribution method using the public key cryptography technology of the present invention can be extended to the application of the secret communication session key between three or more entities for each communication, and the specific implementation process is similar to the two entities. For details, see the above, and I will not repeat them here.
  • the public-private key pair of the key distribution center needs to be updated periodically or dynamically, and the new public-private key pairs are respectively recorded as x' and ⁇ ', where the new public key Px, the implementation method of online notification to each communication entity is as follows:
  • the present invention further provides a method for dynamically updating a public key of a key distribution center.
  • the specific implementation process is shown in FIG. 7.
  • the online update process of the public key of the key distribution center includes:
  • the key distribution center queries the database to obtain a list of communication entities that have registered the confidential service, that is, the key distribution center sends a request for obtaining a list of communication entities of the registered confidential service to the database, and receives the registered confidentiality of the database feedback.
  • the response of the list of communicating entities of the service ie steps 1 and 2;
  • the key distribution center generates a public key update notification message, which includes the new public key Px of the key distribution center, and the signature made by the old private key X of the key distribution center;
  • the key distribution center sends the public key update notification message to the communication entity of the registered confidential service through the bearer device, that is, the key distribution center is based on the communication of the registered secret service.
  • the entity list sends the generated public key update notification message to the communication entity of the registered secret service through the bearer device, that is, steps 3 and 4;
  • the communication entity After receiving the public key update notification message, the communication entity uses the locally stored key distribution center public key Px to verify whether the signature is correct. If the verification succeeds, the local public key is updated with the new public key Px. ; Otherwise, discard the message.
  • the key distribution center needs to know whether each communication entity obtains a new public key ⁇ ', and after receiving the public key update notification message and verifying the communication, the communication entity sends the public key to the key distribution center through the bearer device. An update confirmation message reporting that the communication entity has completed the public key update of the key distribution center.
  • the present invention provides a key distribution center, where the key distribution center has a pair of public and private key pairs, and the key distribution center includes: a first receiving unit, a query unit, a first generating unit, and an encryption a unit and a first sending unit, where the first receiving unit is configured to receive a key request message forwarded by the first communications entity by the bearer device, where the key request message includes a temporary public key of the first communications entity, and communicates with the same Information of the second communication entity; and receiving a second key request message forwarded by the second communication entity by the bearer device, the second key request message including the temporary public key of the second communication entity and the first communication entity communicating therewith Information; the inquiry a unit, configured to query, to the database, whether the first communication entity and the second communication entity both register the security service, and send the query result; the first generating unit is configured to: after receiving the confidential service sent by the query unit, Generating a communication session key between the first communication entity and the second communication entity; the
  • the key distribution center may further include: an obtaining unit, a second generating unit, and a second sending unit, wherein the acquiring unit obtains a list of communicating entities of the registered secret service by querying a database; Generating a public key update notification message, the public key update notification message including a new public key of the key distribution center and a signature made by using the old private key of the key distribution center; the second sending unit, configured to acquire according to the The unit obtains a list of communication entities of the registered secret service, and sends the public key update notification message to the communication entity of the registered secret service through the bearer device.
  • the key distribution center may further include: a second receiving unit, configured to receive, by the key distribution center, a public key update confirmation message sent by the communication entity by using the bearer device, where the public key update confirmation message includes: the communication entity has Complete the public key update information of the key distribution center.
  • the present invention further provides a communication entity, which obtains a public key of a key distribution center before the secure communication
  • the communication entity includes: a generating unit, a sending unit, a receiving unit, and a verifying unit, wherein the generating unit uses Generating a pair of temporary public-private key pairs; the sending unit, by using the generated temporary public key, sends a key request message to the key distribution center through the bearer device, where the key request message includes the temporary public key of the communication entity, and And a receiving unit, configured to receive a key response message sent by the key distribution center, where the key response message includes a communication session key between the communication entity and a communication entity with which the communication entity communicates;
  • the verification unit is configured to perform signature verification on the key response message by using a public key of the key distribution center, and verify After passing, the key response message is decrypted by using the temporary private key of the communication entity to obtain a communication session key.
  • the communication entity may further include: a key deletion unit, configured to: after the communication entity communicates by using the communication session key, delete the temporary public-private key pair, and need to be in the next time to start confidential communication or in a secure communication process When the communication session key is updated, a notification to regenerate the temporary public-private key pair is sent to the generating unit.
  • a key deletion unit configured to: after the communication entity communicates by using the communication session key, delete the temporary public-private key pair, and need to be in the next time to start confidential communication or in a secure communication process
  • a notification to regenerate the temporary public-private key pair is sent to the generating unit.
  • the communication entity may further include: a key update unit, configured to verify, by using a public key of the locally stored key distribution center, whether the signature is correct after receiving the public key update notification message sent in the key distribution core And after the verification is passed, the new public key in the public key update notification message is updated with the locally stored public key.
  • a key update unit configured to verify, by using a public key of the locally stored key distribution center, whether the signature is correct after receiving the public key update notification message sent in the key distribution core And after the verification is passed, the new public key in the public key update notification message is updated with the locally stored public key.
  • the communication entity may further include: a key update confirmation unit, configured to send a public key update confirmation message to the key distribution center by the bearer device after the key update unit updates the locally stored public key, the public key update confirmation message Including: The communication entity has completed the public key update information of the key distribution center.
  • a key update confirmation unit configured to send a public key update confirmation message to the key distribution center by the bearer device after the key update unit updates the locally stored public key
  • the public key update confirmation message Including: The communication entity has completed the public key update information of the key distribution center.
  • the present invention further provides a key management system, the system comprising a communication entity, a bearer device, a key distribution center, and a database, wherein the bearer device is used in a process of forwarding a key distribution process and a public key update process.
  • Key request message, key response message, public key update notification or public key update confirmation message; the database is used to store whether each communication entity registers a secret service and provides a service to the key distribution center; or to a key The distribution center feeds back a list of the communication entities that have registered the security service; the key distribution center is connected to the bearer device and the database, and is configured to determine whether to generate the communication according to the result of the query database after receiving the key request message forwarded by the bearer device After the session key is encrypted and signed, the key response message is formed, and the key response message is sent to each communication entity by using the bearer device; or the communication of the registered confidential service is obtained by querying the database.
  • Entity list and generate the generated public key update notification message by bearer And sending, by the bearer device, a public key update confirmation message sent by each communication entity;
  • the communication entity is configured to generate a pair of temporary public and private key pairs, and send a key request message to the key distribution center by using the bearer device And obtaining, by using the public key of the key distribution center and the temporary private key of the communication entity, the verification and decryption of the received key response message to obtain a communication session key; or receiving the key distribution center by the bearer device Public key update notification, after storage After the public key is updated, the public key update confirmation message is sent to the key distribution center by the bearer device.
  • the communication entities are two or more.
  • the bearer device is: a short message system, a global mobile communication system, a code division multiple access system, a public switched telephone network, or the Internet.
  • the present invention can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is a better implementation. the way.
  • the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product, which may be stored in a storage medium such as a ROM/RAM or a disk. , an optical disk, etc., includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform the methods described in various embodiments of the present invention or portions of the embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

密钥分配方法、 在线新更密钥分配中心的公钥方法及装置
本申请要求于 2008 年 5 月 29 日提交中国专利局、 申请号为 200810018334.6、发明名称为"一种利用公钥密码技术的密钥分配方法及其系 统"的中国专利申请的优先权, 其全部内容通过引用结合在本申请中。
技术领域
本发明涉及数据安全领域,特别涉及一种利用公钥密码技术的密钥分配 方法、 在线新更密钥分配中心的公钥的方法、 密钥分配中心、 通信实体及密 钥管理系统。
背景技术
当通信网络实体之间需要进行保密通信时, 密钥管理是其中的关键技术 之一。 小型网络可采用每对用户共享一个密钥的方法, 但在大型网络中却不 可行。 一个具有 N个用户的系统, 为实现任意两个用户之间的保密通信, 则 需要生成和分配 N ( N-1 ) 12个密钥才能保证网络中任意两用户之间的保密 通信。 随着系统规模的增大, 复杂性剧增, 对于 N为 1000的网络而言, 就 需要约 50万个密钥进行分配、 存储等。 为了降低复杂性, 通常采用中心化 密钥管理方式, 由一个可信赖的联机月良务器作为密钥分配中心 (KDC, Key Distribution Center )或密钥转递中心 ( KTC, Key Transportation Center )来 实现, 图 1-4给出常见的几种基本模式, 其中 k为第一通信实体 A和第二通 信实体 B之间的通信会话密钥。
图 1中,在步骤①中, 第一通信实体 A向密钥分配中心请求分发与第二 通信实体 B通信所用的密钥, 则密钥分配中心生成 k, 并将 k分别传递给第 一通信实体 A和第二通信实体 B, 即步骤②和③, 该传递过程分别利用密钥 分配中心与 A和密钥分配中心与 B的预共享密钥加密实现。
图 2中,在步骤①中, 第一通信实体 A向密钥分配中心请求分发与第二 通信实体 B通信所用的密钥, 则密钥分配中心生成 k, 并将 k传递给第一通 信实体 A, 即步骤②, 第一实体 A将 k转递给第二通信实体 B , 即步骤③, 该传(转)递过程分别利用密钥分配中心与 A和密钥分配中心与 B的预共 享密钥加密实现。
图 3中, 在步骤①中, 第一通信实体 A将与第二通信实体 B的通信密 钥 k传送给密钥转递中心, 密钥转递中心再将该 K传递给第二通信实体 B , 即步骤②; 该传递过程分别利用密钥转递中心与 A和密钥转递中心与 B的 预共享密钥加密实现。
图 4中, 在步骤①中, 第一通信实体 A将与第二通信实体 B的通信密 钥 k传送给密钥转递中心,密钥转递中心向第一实体 A发送将该 k转递给第 二通信实体 B的通知, 即步骤②, 第一实体 A接收到该通知后, 将该 k转 递给第二实体 B, 即步骤③, 该传(转)递过程分别利用密钥转递中心与 A 和密钥转递中心与 B的预共享密钥加密实现。
由于有密钥分配中心或密钥转递中心参与,可实现每对实体每次通信时 使用一个新的通信密钥,但各用户需保存一个与密钥分配中心或密钥转递中 心共享的较长期使用的秘密管理密钥,且对于密钥分配中心和密钥转递中心 而言, 不仅需存储数量巨大的秘密管理密钥, 而且承担较大的安全风险, 因 为其一旦出现问题将直接威胁整个系统的安全,再者上述这些密钥分配方法 均不具有密钥的完善前向保密性( PFS , Perfect Forward Secrecy )。
发明内容
本发明为解决背景技术中存在的上述技术问题 ,基于三元对等鉴别 TePA ( Tri-element Peer Authentication )原理, 利用公钥密密码技术, 而提出一种 密钥分配方法、 在线新更密钥分配中心的公钥的方法、 密钥分配中心、 通信 实体及密钥管理系统, 该密钥管理系统不仅安全地为每对实体分发通信密 钥, 使密钥具有 PFS属性, 降低系统密钥管理复杂度, 而且实现了可信第三 方——密钥分配中心的公钥在线更新功能。
本发明的技术解决方案是: 提供一种密钥分配方法, 密钥分配中心具有 一对公私钥对, 该方法包括:
密钥分配中心接收第一通信实体通过承载设备转发的密钥请求消息,该 密钥请求消息包括第一通信实体的临时公钥;
密钥分配中心向数据库查询第一通信实体和第二通信实体是否均注册 了保密服务, 并在均注册了保密服务后, 产生第一通信实体和第二通信实体 间的通信会话密钥;
密钥分配中心利用所述第一通信实体的临时公钥对所述通信会话密钥 进行加密后, 再利用密钥分配中心的私钥计算其签名, 构成密钥响应消息; 密钥分配中心通过承载设备将所述密钥响应消息返回给第一通信实体; 密钥分配中心接收第二通信实体通过承载设备转发的密钥请求消息,该 密钥请求消息包括第二通信实体的临时公钥;
密钥分配中心利用所述第二通信实体的临时公钥对所述第二通信实体 和第一通信实体之间的通信会话密钥进行加密后,再利用密钥分配中心的私 钥计算其签名, 构成密钥响应消息;
密钥分配中心通过承载设备将所述利用所述第二通信实体的临时公钥 构成的密钥响应消息返回给第二通信实体。
本发明还提供一种密钥分配方法,通信实体在保密通信之前先获得密钥 分配中心的公钥; 该方法包括:
需要进行通信的第一通信实体和第二通信实体各自分别产生一对临时 公私钥对;
所述第一通信实体和第二通信实体分别利用所述产生的临时公钥通过 承载设备向密钥分配中心发送密钥请求消息, 该密钥请求消息包括对应的第 一通信实体或第二通信实体的临时公钥;
接收密钥分配中心发送的密钥响应消息,所述密钥响应消息包括第一通 信实体和第二通信实体间的通信会话密钥;
第一通信实体和第二通信实体分别利用所述密钥分配中心的公钥对所 述密钥响应消息进行签名验证, 在验证通过后, 再利用对应的临时私钥分别 对所述密钥响应消息进行解密, 得到通信会话密钥。
所述方法还包括: 所述第一实体和第二实体在利用所述通信会话密钥通 信后, 删除各自的临时公私钥对; 并在下次开始保密通信时或在保密通信过 程中需要更新通信会话密钥时, 重新再生成临时公私钥对, 通过承载设备向 密钥分配中心发送密钥请求消息, 重复上述步骤, 重新获得新的通信会话密 钥。
所述密钥请求消息和密钥响应消息还包括: 安全参数, 完成加密算法、 工作模式或者工作参数等的协商与通告。
所述第一通信实体通过承载设备转发的密钥请求消息还包括: 第二通信 实体的信息;
所述第二通信实体通过承载设备转发的密钥请求消息还包括: 第一通信 实体的信息。
本发明还提供一种在线更新密钥分配中心的公钥的方法, 包括: 密钥分配中心查询数据库, 获得已注册保密服务的通信实体列表; 密钥分配中心生成公钥更新通知消息, 该消息包含密钥分配中心的新公 钥和利用密钥分配中心的旧私钥所做的签名;
密钥分配中心根据已注册保密服务的通信实体列表,将公钥更新通知消 息通过承载设备发送给已注册保密服务的通信实体。
所述方法还包括:
所述通信实体在接收到密钥分配中心通过承载设备发送的公钥更新通 知消息后, 利用本地保存的密钥分配中心的公钥验证其中的签名是否正确, 并在验证通过后,将本地存储的密钥分配中心的公钥更新为所述公钥更新通 知消息中的新公钥。
所述方法还包括:
所述通信实体完成本地存储的密钥分配中心的公钥更新后,通过承载设 备向密钥分配中心发送公钥更新确认消息;
密钥分配中心通过承载设备接收所述通信实体发送的公钥更新确认消 息, 所述公钥更新确认消息包括: 该通信实体已完成密钥分配中心的公钥更 新信息。
相应的, 本发明还提供一种密钥分配中心, 该密钥分配中心具有一对公 私钥对, 所述密钥分配中心包括:
第一接收单元,用于接收第一通信实体通过承载设备转发的密钥请求消 息, 该密钥请求消息包括第一通信实体的临时公钥, 以及与其通信的第二通 信实体的信息; 以及接收第二通信实体通过承载设备转发的第二密钥请求消 息, 该第二密钥请求消息包括第二通信实体的临时公钥, 以及与其通信的第 一通信实体的信息;
查询单元,用于向数据库查询第一通信实体和第二通信实体是否均注册 了保密服务, 并发送查询结果; 第一生成单元, 用于在接收到查询单元发送的均注册了保密服务后, 产 生第一通信实体和第二通信实体间的通信会话密钥;
加密单元,用于利用所述第一通信实体的临时公钥对所述生成单元产生 的通信会话密钥进行加密后, 再利用密钥分配中心的私钥计算其签名, 构成 密钥响应消息; 以及利用第二通信实体的临时公钥对所述第二通信实体和第 一通信实体之间的通信会话密钥进行加密后,再利用密钥分配中心的私钥计 算其签名, 构成密钥响应消息;
第一发送单元,用于将所述加密单元利用所述第一通信实体的临时公钥 构成的密钥响应消息通过承载设备返回给第一通信实体; 以及将利用所述第 二通信实体的临时公钥构成的密钥响应消息通过承载设备返回给第二通信 实体。
所述密钥分配中心还包括:
获取单元, 通过查询数据库, 获得已注册保密服务的通信实体列表; 第二生成单元, 用于生成公钥更新通知消息, 该公钥更新通知消息包括 密钥分配中心的新公钥和利用密钥分配中心的旧私钥所做的签名;
第二发送单元,用于根据所述获取单元获取的已注册保密服务的通信实 体列表,将所述公钥更新通知消息通过承载设备发送给已注册保密服务的通 信实体。
所述密钥分配中心还包括:
密钥分配中心接收所述通信实体通过承载设备发送的公钥更新确认消 息, 所述公钥更新确认消息包括: 该通信实体已完成密钥分配中心的公钥更 新信息。
相应, 本发明还提供一种通信实体, 在保密通信之前先获得密钥分配中 心的公钥, 所述通信实体包括:
生成单元, 用于生成一对临时公私钥对;
发送单元, 利用所述产生的临时公钥通过承载设备向密钥分配中心发送 密钥请求消息, 该密钥请求消息包括该通信实体的临时公钥, 以及与其通信 的对应通信实体的信息;
接收单元, 用于接收密钥分配中心发送的密钥响应消息, 所述密钥响应 消息包括该通信实体和与其通信的通信实体间的通信会话密钥; 验证单元,用于利用所述密钥分配中心的公钥对所述密钥响应消息进行 签名验证, 在验证通过后, 再利用该通信实体的临时私钥对所述密钥响应消 息进行解密, 得到通信会话密钥。
所述通信实体还包括:
密钥删除单元, 用于该通信实体利用所述通信会话密钥通信后, 删除所 述临时公私钥对, 并在下次开始保密通信时或在保密通信过程中需要更新通 信会话密钥时, 向所述生成单元发送重新生成临时公私钥对的通知。
所述通信实体还包括: 密钥更新单元, 用于在接收到所述密钥分配心中 通过承载设备发送的公钥更新通知消息后, 利用本地保存的密钥分配中心的 公钥验证其中的签名是否正确, 并在验证通过后, 将本地存储的密钥分配中 心的公钥更新为所述公钥更新通知消息中的新公钥。
所述通信实体还包括:
密钥更新确认单元, 用于在密钥更新单元更新本地存储的密钥分配中心 的公钥后通过承载设备向密钥分配中心发送公钥更新确认消息,所述公钥更 新确认消息包括: 该通信实体已完成密钥分配中心的公钥更新信息。
本发明还提供一种密钥管理系统, 该系统包括通信实体、 承载设备、 密 钥分配中心和数据库, 其中,
所述承载设备,用于转递密钥分配过程和公钥更新过程中的密钥请求消 息、 密钥响应消息、 公钥更新通知或公钥更新确认消息;
所述数据库, 用于存储各通信实体是否注册了保密服务, 并为密钥分配 中心提供服务; 或者向密钥分配中心反馈已注册保密服务的通信实体列表; 所述密钥分配中心, 与承载设备和数据库相接, 用于在接收到承载设备 转发的密钥请求消息后, 根据查询数据库的结果决定是否生成通信会话密 钥, 并对生成的通信会话密钥进行加密签名后, 构成密钥响应消息, 并通过 承载设备将所述密钥响应消息发送各个通信实体; 或者通过查询数据库获得 已注册保密服务的通信实体列表, 并将生成的公钥更新通知消息通过承载设 备发送给各个通信实体, 以及通过承载设备接收各个通信实体发送的公钥更 新确认消息; 所述通信实体, 用于生成一对临时公私钥对, 通过承载设备向密钥分配 中心发送密钥请求消息, 并对接收到的密钥响应消息利用密钥分配中心的公 钥和该通信实体的临时私钥进行签名的验证和解密, 得到通信会话密钥; 或 者通过承载设备接收到密钥分配中心发送的公钥更新通知后,对存储的公钥 进行更新后, 通过承载设备向密钥分配中心发送公钥更新确认消息。
所述通信实体为两个或两个以上。
所述承载设备为: 短信系统、 全球移动通信系统、 码分多址接入系统、 公共交换电话网络或因特网。
本发明基于三元对等鉴别(TePA )原理, 采用公钥密码技术, 通过密钥 分配中心 KDC为需要通信的实体分发密钥, 实现了通信密钥的安全分发、 动态更新, 并具有完善的前向保密性 PFS , 解决了传统方法密钥分配中心 KDC 需要管理大量密钥、 用户需要存储长期秘密密钥且通信密钥不具备前 向保密性等问题; 同时本发明支持密钥分配中心 KDC的公钥在线更新功能。 本发明可应用于移动通信网络系统, 也可应用于其他通信系统。
附图说明
图 1一 4为传统的基于密钥分配中心或密钥转递中心的密钥分配方法示 意图;
图 5为本发明的利用公钥密码技术的密钥分配系统示意图;
图 6为本发明的利用公钥密码技术的密钥分配方法示意图;
图 7为本发明的利用公钥密码技术在线更新密钥分配中心的公钥方法的 示意图。
具体实施方式
参见图 5 , 为本发明的利用公钥密码技术的密钥分配系统的示意图, 在 该图中, 所述密钥分配系统包括: 通信实体 Al , A2, ... , An、 承载设备、 密钥分配中心 KDC、 数据库(DB, Data Base ), 其中, 承载设备用于承载 或转递密钥分配过程和公钥更新过程中的消息, 它可以是短信系统、 全球移 动通信系统(GSM, Global System for Mobile ), 码分多址接入 ( CDMA, Code Division Multiple Access ) 系统、 公共交换电话网络 PSTN ( Public Switched Telephone Network )或因特网 ( internet )等, 数据库 DB存储各通 信实体是否注册了保密服务, 通信实体 Ai ( i=l,2, . . . ,n )有可能注册了保密 服务, 也有可能没有注册保密服务。
本发明实施例还提供一种密钥分配方法, 密钥分配中心具有一对公私钥 对, 该方法包括:
1 )密钥分配中心接收第一通信实体通过承载设备转发的密钥请求消息, 该密钥请求消息包括第一通信实体的临时公钥; 密钥分配中心向数据库查询 第一通信实体和第二通信实体是否均注册了保密服务, 并在均注册了保密服 务后, 产生第一通信实体和第二通信实体间的通信会话密钥;
2 ) 密钥分配中心利用所述第一通信实体的临时公钥对所述通信会话密 钥进行加密后,再利用密钥分配中心的私钥计算其签名,构成密钥响应消息;
3 ) 密钥分配中心通过承载设备将所述密钥响应消息返回给第一通信实 体;
4 )密钥分配中心接收第二通信实体通过承载设备转发的密钥请求消息, 该密钥请求消息包括第二通信实体的临时公钥;
5 ) 密钥分配中心利用所述第二通信实体的临时公钥对所述第二通信实 体和第一通信实体之间的通信会话密钥进行加密后,再利用密钥分配中心的 私钥计算其签名, 构成密钥响应消息;
6 ) 密钥分配中心通过承载设备将所述利用所述第二通信实体的临时公 钥构成的密钥响应消息返回给第二通信实体。
相应的, 本发明还提供一种密钥分配方法, 通信实体在保密通信之前先 获得密钥分配中心的公钥; 该方法包括:
1 ) 需要进行通信的第一通信实体和第二通信实体各自分别产生一对临 时公私钥对;
2 )所述第一通信实体和第二通信实体分别利用所述产生的临时公钥通 过承载设备向密钥分配中心发送密钥请求消息,该密钥请求消息包括对应的 第一通信实体或第二通信实体的临时公钥;
3 )接收密钥分配中心发送的密钥响应消息, 所述密钥响应消息包括第 一通信实体和第二通信实体间的通信会话密钥;
4 ) 第一通信实体和第二通信实体分别利用所述密钥分配中心的公钥对 所述密钥响应消息进行签名验证, 在验证通过后, 再利用对应的临时私钥分 别对所述密钥响应消息进行解密, 得到通信会话密钥。
结合上述系统, 所述密钥分配方法的具体实现过程详见图 6, 为本发明 提供的一种利用公钥密码技术的密钥分配方法的具体流程图,所述方法包括 步骤:
密钥分配中心具有一对公私钥对 X和 Px, 通信实体(以通信实体 A和 B为例)在通信之前应事先获得密钥分配中心的公钥 Px, 并进行本地存储。 当第一通信实体 A和第二通信实体 B需要进行保密通信时, 通过密钥分配 方法获得通信会话密钥。
1 )第一通信实体 A产生一对临时公私钥对 a和 Pa, 通过承载设备向密 钥分配中心发送密钥请求消息,该密钥请求消息包含第一通信实体 A的临时 公钥 Pa; 即图中的步骤①和步骤②;
2 ) 密钥分配中心收到承载设备转递来的第一通信实体 A的密钥请求消 息后, 向数据库查询第一通信实体 A和第二通信实体 B是否均注册了保密 服务, 也就是说, 密钥分配中心在接收到所述密钥请求消息后, 向数据库发 送查询第一通信实体 A和第二通信实体 B是否均注册了保密服务的请求, 并接收到数据库反馈的查询结果, 即步骤③和④; 如果密钥分配中心接收到 的查询结果为第一通信实体 A和第二通信实体 B都注册了保密服务, 则密 钥分配中心产生第一通信实体 A和第二通信实体 B之间的通信会话密钥 k, 且使用第一通信实体 A的临时公钥 Pa加密通信会话密钥 k后, 并利用密钥 分配中心的私钥 X计算其签名,构成密钥响应消息通过承载设备返回给第一 通信实体 A, 即图中的步骤⑤和⑥; 如果密钥分配中心接收到的查询结果为 第一通信实体 A和第二通信实体 B都没有注册保密服务或者只有一个注册 了保密服务, 则密钥分配中心通过承载设备向第一通信实体返回错误信息, 图中未示;
3 )第一通信实体 A收到承载设备转递来的密钥响应消息后, 利用本地 存储的密钥分配中心的公钥 Px进行签名验证, 验证通过后, 再利用第一通 信实体 A的临时私钥 a解密得到通信会话密钥 k;若第一通信实体 A收到承 载设备转递来的密钥分配中心发来的错误消息, 则本次保密通信失败; 4 )相应的, 第二通信实体 Β产生一对临时公私钥对 b和 Pb, 通过承载 设备向密钥分配中心发送密钥请求消息,该消息包含第二通信实体 B的临时 公钥 Pb, 也就是说, 第二通信实体 B向承载设备发送密钥请求消息, 该消 息包含第二通信实体 B的临时公钥 Pb; 承载设备将接收到的所述密钥请求 消息转发给密钥分配中心, 即图 6中的步骤①' 和②';
5 ) 密钥分配中心收到承载设备转发来的第二通信实体 B的密钥请求消 息后, 将第一通信实体 A和第二通信实体 B之间的通信会话密钥 k使用第 二通信实体 B的临时公钥 Pb加密后, 并利用密钥分配中心的私钥 X计算其 签名, 构成密钥响应消息通过承载设备返回给第二通信实体 B , 也就是说, 密钥分配中心将所述构成的密钥响应消息发送给承载设备, 所述承载设备将 接收的所述密钥响应消息转发给第二通信实体 B,即图 6中的步骤③'和④';
6 )第二通信实体 B收到承载设备转递来的密钥响应消息后, 利用本地 存储的密钥分配中心 KDC的公钥 Px进行签名验证,验证通过后,再利用临 时第二通信实体 B的私钥 b解密得到通信会话密钥 k;
7 )然后第一通信实体 A和第二通信实体 B使用通信会话密钥 k作为会 话密钥进行保密通信。
其中, 在该实施例中, 第一通信实体 A和第二通信实体 B均不用存储 各自的临时公私钥对, 可适时删除之, 待下次开始保密通信时或在保密通信 过程中需要更新通信会话密钥时, 重新再生成临时公私钥对, 向密钥分配中 心发出密钥请求消息, 重复上述步骤, 获得新的通信会话密钥。
其中,密钥请求消息和密钥响应消息可以携带安全参数,完成加密算法、 工作模式、 工作参数等的协商与通告。
第一通信实体 A和第二通信实体 B发送给密钥分配中心的密钥请求消 息中, 也可以携带对方实体的信息。
本发明的利用公钥密码技术的密钥分配方法均可推广到每次通信三个 及三个以上实体之间的保密通信会话密钥的分配应用,具体的实现过程与两 个实体之间类似, 具体详见上述, 在此不再赘述。
处于安全性的考虑或为了满足通信业务的需求等, 密钥分配中心的公私 钥对需要定期或动态更新, 新的公私钥对分别记为 x'和 Ρχ' , 其中, 新公钥 Px,在线通知给各通信实体的实施方法如下:
在上述实施例的基础上,本发明还提供一种在线更新密钥分配中心的公 钥的方法, 其具体的实现过程详见图 7 , 密钥分配中心的公钥在线更新过程 包括:
1 ) 密钥分配中心查询数据库, 获得已注册保密服务的通信实体列表, 也就是说, 密钥分配中心向数据库发送获取已注册保密服务的通信实体列表 的请求, 并接收数据库反馈的已注册保密服务的通信实体列表的响应, 即步 骤①和②;
2 ) 密钥分配中心生成公钥更新通知消息, 该消息包含密钥分配中心的 新公钥 Px,和利用密钥分配中心的旧私钥 X所做的签名;
3 )依据已注册保密服务的通信实体列表, 密钥分配中心将公钥更新通 知消息通过承载设备发送给已注册保密服务的通信实体, 也就是说, 密钥分 配中心依据已注册保密服务的通信实体列表将生成的所述公钥更新通知消 息通过承载设备将所述公钥更新通知消息发送给已注册保密服务的通信实 体, 即步骤③和④;
4 )通信实体收到公钥更新通知消息后, 利用本地保存的密钥分配中心 公钥 Px验证其中的签名是否正确,若验证通过, 则以其中的新公钥 Px,更新 本地存储的公钥; 否则, 丟弃该消息。
在某些应用中,密钥分配中心需要得知各通信实体是否得到新公钥 Ρχ' , 则通信实体收到公钥更新通知消息并验证通过后,通过承载设备向密钥分配 中心发送公钥更新确认消息,报告该通信实体已完成了密钥分配中心的公钥 更新。
基于上述方法的实现过程, 本发明提供一种密钥分配中心, 密钥分配中 心具有一对公私钥对, 所述密钥分配中心包括: 第一接收单元, 查询单元, 第一生成单元, 加密单元和第一发送单元, 其中, 该第一接收单元, 用于接 收第一通信实体通过承载设备转发的密钥请求消息, 该密钥请求消息包括第 一通信实体的临时公钥, 以及与其通信的第二通信实体的信息; 以及接收第 二通信实体通过承载设备转发的第二密钥请求消息, 该第二密钥请求消息包 括第二通信实体的临时公钥以及与其通信的第一通信实体的信息; 该查询单 元, 用于向数据库查询第一通信实体和第二通信实体是否均注册了保密服 务, 并发送查询结果; 该第一生成单元, 用于在接收到查询单元发送的均注 册了保密服务后, 产生第一通信实体和第二通信实体间的通信会话密钥; 该 加密单元,用于利用所述第一通信实体的临时公钥对所述生成单元产生的通 信会话密钥进行加密后, 再利用密钥分配中心的私钥计算其签名, 构成密钥 响应消息; 以及利用第二通信实体的临时公钥对所述第二通信实体和第一通 信实体之间的通信会话密钥进行加密后,再利用密钥分配中心的私钥计算其 签名, 构成密钥响应消息; 该第一发送单元, 用于将所述加密单元利用所述 第一通信实体的临时公钥构成的密钥响应消息通过承载设备返回给第一通 信实体; 以及将利用所述第二通信实体的临时公钥构成的密钥响应消息通过 承载设备返回给第二通信实体。
所述密钥分配中心还可以包括: 获取单元, 第二生成单元, 第二发送单 元, 其中, 该获取单元, 通过查询数据库, 获得已注册保密服务的通信实体 列表; 该第二生成单元, 用于生成公钥更新通知消息, 该公钥更新通知消息 包括密钥分配中心的新公钥和利用密钥分配中心的旧私钥所做的签名; 该第 二发送单元, 用于根据所述获取单元获取的已注册保密服务的通信实体列 表,将所述公钥更新通知消息通过承载设备发送给已注册保密服务的通信实 体。
所述密钥分配中心还可以包括: 第二接收单元, 用于密钥分配中心接收 所述通信实体通过承载设备发送的公钥更新确认消息,所述公钥更新确认消 息包括: 该通信实体已完成密钥分配中心的公钥更新信息。
相应, 本发明还提供一种通信实体, 在保密通信之前先获得密钥分配中 心的公钥, 所述通信实体包括: 生成单元,发送单元,接收单元和验证单元, 其中, 该生成单元, 用于生成一对临时公私钥对; 该发送单元, 利用所述产 生的临时公钥通过承载设备向密钥分配中心发送密钥请求消息,该密钥请求 消息包括该通信实体的临时公钥, 以及与其通信的对应通信实体的信息; 该 接收单元, 用于接收密钥分配中心发送的密钥响应消息, 所述密钥响应消息 包括该通信实体和与其通信的通信实体间的通信会话密钥; 该验证单元, 用 于利用所述密钥分配中心的公钥对所述密钥响应消息进行签名验证,在验证 通过后, 再利用该通信实体的临时私钥对所述密钥响应消息进行解密, 得到 通信会话密钥。
所述通信实体还可以包括: 密钥删除单元, 用于该通信实体利用所述通 信会话密钥通信后, 删除所述临时公私钥对, 并在下次开始保密通信时或在 保密通信过程中需要更新通信会话密钥时, 向所述生成单元发送重新生成临 时公私钥对的通知。
所述通信实体还可以包括: 密钥更新单元, 用于在接收到所述密钥分配 心中发送的公钥更新通知消息后, 利用本地保存的密钥分配中心的公钥验证 其中的签名是否正确, 并在验证通过后, 将所述公钥更新通知消息中的新公 钥更新本地存储的公钥。
所述通信实体还可以包括: 密钥更新确认单元, 用于在密钥更新单元更 新本地存储的公钥后通过承载设备向密钥分配中心发送公钥更新确认消息, 所述公钥更新确认消息包括: 该通信实体已完成密钥分配中心的公钥更新信 息。
相应的, 本发明还提供一种密钥管理系统, 该系统包括通信实体、 承载 设备、 密钥分配中心和数据库, 其中, 该承载设备, 用于转递密钥分配过程 和公钥更新过程中的密钥请求消息、 密钥响应消息、 公钥更新通知或公钥更 新确认消息; 该数据库, 用于存储各通信实体是否注册了保密服务, 并为密 钥分配中心提供服务; 或者向密钥分配中心反馈已注册保密服务的通信实体 列表; 该密钥分配中心, 与承载设备和数据库相接, 用于在接收到承载设备 转发的密钥请求消息后, 根据查询数据库的结果决定是否生成通信会话密 钥, 并对生成的通信会话密钥进行加密签名后, 构成密钥响应消息, 并通过 承载设备将所述密钥响应消息发送各个通信实体; 或者通过查询数据库获得 已注册保密服务的通信实体列表, 并将生成的公钥更新通知消息通过承载设 备发送给各个通信实体, 以及通过承载设备接收各个通信实体发送的公钥更 新确认消息; 该通信实体, 用于生成一对临时公私钥对, 通过承载设备向密 钥分配中心发送密钥请求消息, 并对接收到的密钥响应消息利用密钥分配中 心的公钥和该通信实体的临时私钥进行签名的验证和解密,得到通信会话密 钥; 或者通过承载设备接收到密钥分配中心发送的公钥更新通知后, 对存储 的公钥进行更新后, 通过承载设备向密钥分配中心发送公钥更新确认消息。 所述通信实体为两个或两个以上。
所述承载设备为: 短信系统、 全球移动通信系统、 码分多址接入系统、 公共交换电话网络或因特网。
所述系统中各个设备或实体的功能和作用详见上述方法的对应过程,在 此不再赘述。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到本发 明可借助软件加必需的通用硬件平台的方式来实现, 当然也可以通过硬件, 但很多情况下前者是更佳的实施方式。 基于这样的理解, 本发明的技术方案 本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来, 该计算机软件产品可以存储在存储介质中, 如 ROM/RAM、 磁碟、 光盘等, 包括若干指令用以使得一台计算机设备(可以是个人计算机, 服务器, 或者 网络设备等)执行本发明各个实施例或者实施例的某些部分所述的方法。
以上所述仅是本发明的优选实施方式, 应当指出, 对于本技术领域的普 通技术人员来说, 在不脱离本发明原理的前提下, 还可以作出若干改进和润 饰, 这些改进和润饰也应视为本发明的保护范围。

Claims

权利 要求 书
1、 一种密钥分配方法, 其特征在于: 密钥分配中心具有一对公私钥对, 该方法包括:
密钥分配中心接收第一通信实体通过承载设备转发的密钥请求消息,该 密钥请求消息包括第一通信实体的临时公钥;
密钥分配中心向数据库查询第一通信实体和第二通信实体是否均注册 了保密服务, 并在均注册了保密服务后, 产生第一通信实体和第二通信实体 间的通信会话密钥;
密钥分配中心利用所述第一通信实体的临时公钥对所述通信会话密钥 进行加密后, 再利用密钥分配中心的私钥计算其签名, 构成密钥响应消息; 密钥分配中心通过承载设备将所述密钥响应消息返回给第一通信实体; 密钥分配中心接收第二通信实体通过承载设备转发的密钥请求消息,该 密钥请求消息包括第二通信实体的临时公钥;
密钥分配中心利用所述第二通信实体的临时公钥对所述第二通信实体 和第一通信实体之间的通信会话密钥进行加密后,再利用密钥分配中心的私 钥计算其签名, 构成密钥响应消息;
密钥分配中心通过承载设备将所述利用所述第二通信实体的临时公钥 构成的密钥响应消息返回给第二通信实体。
2、 一种密钥分配方法, 其特征在于: 通信实体在保密通信之前先获得 密钥分配中心的公钥; 该方法包括:
需要进行通信的第一通信实体和第二通信实体各自分别产生一对临时 公私钥对;
所述第一通信实体和第二通信实体分别利用所述产生的临时公钥通过 承载设备向密钥分配中心发送密钥请求消息, 该密钥请求消息包括对应的第 一通信实体或第二通信实体的临时公钥;
接收密钥分配中心通过承载设备发送的密钥响应消息,所述密钥响应消 息包括第一通信实体和第二通信实体间的通信会话密钥;
第一通信实体和第二通信实体分别利用所述密钥分配中心的公钥对所 述密钥响应消息进行签名验证, 在验证通过后, 再利用对应的临时私钥分别 对所述密钥响应消息进行解密, 得到通信会话密钥。
3、 根据权利要求 2所述的密钥分配方法, 其特征在于: 还包括: 所述第一实体和第二实体在利用所述通信会话密钥通信后,删除各自的 临时公私钥对; 并在下次开始保密通信时或在保密通信过程中需要更新通信 会话密钥时, 重新再生成临时公私钥对, 通过承载设备向密钥分配中心发送 密钥请求消息, 重复上述步骤, 重新获得新的通信会话密钥。
4、 根据权利要求 1至 3任一项所述的密钥分配方法, 其特征在于: 所 述密钥请求消息和密钥响应消息还包括: 安全参数, 完成加密算法、 工作模 式或者工作参数等的协商与通告。
5、 根据权利要求 1至 3任一项所述的密钥分配方法, 其特征在于: 所述第一通信实体通过承载设备转发的密钥请求消息还包括: 第二通信 实体的信息;
所述第二通信实体通过承载设备转发的密钥请求消息还包括: 第一通信 实体的信息。
6、 一种基于权利要求 1或 2在线更新密钥分配中心的公钥的方法, 其 特征在于: 包括:
密钥分配中心查询数据库, 获得已注册保密服务的通信实体列表; 密钥分配中心生成公钥更新通知消息, 该消息包含密钥分配中心的新公 钥和利用密钥分配中心的旧私钥所做的签名;
密钥分配中心根据已注册保密服务的通信实体列表,将公钥更新通知消 息通过承载设备发送给已注册保密服务的通信实体。
7、 根据权利要求 6所述在线更新密钥分配中心的公钥的方法, 其特征 在于: 所述方法还包括:
所述通信实体在接收到密钥分配中心通过承载设备发送的公钥更新通 知消息后, 利用本地保存的密钥分配中心的公钥验证其中的签名是否正确, 并在验证通过后,将本地存储的密钥分配中心的公钥更新为所述公钥更新通 知消息中的新公钥。
8、 根据权利要求 7所述在线更新密钥分配中心的公钥的方法, 其特征 在于: 所述方法还包括: 所述通信实体完成本地存储的密钥分配中心的公钥更新后,通过承载设 备向密钥分配中心发送公钥更新确认消息;
密钥分配中心通过承载设备接收所述通信实体发送的公钥更新确认消 息, 所述公钥更新确认消息包括: 该通信实体已完成密钥分配中心的公钥更 新信息。
9、 一种密钥分配中心, 其特征在于: 密钥分配中心具有一对公私钥对, 所述密钥分配中心包括:
第一接收单元,用于接收第一通信实体通过承载设备转发的密钥请求消 息, 该密钥请求消息包括第一通信实体的临时公钥, 以及与其通信的第二通 信实体的信息; 以及接收第二通信实体通过承载设备转发的第二密钥请求消 息, 该第二密钥请求消息包括第二通信实体的临时公钥, 以及与其通信的第 一通信实体的信息;
查询单元,用于向数据库查询第一通信实体和第二通信实体是否均注册 保密服务, 并发送查询结果;
第一生成单元, 用于在接收到查询单元发送的均注册了保密服务后, 产 生第一通信实体和第二通信实体间的通信会话密钥;
加密单元,用于利用所述第一通信实体的临时公钥对所述生成单元产生 的通信会话密钥进行加密后, 再利用密钥分配中心的私钥计算其签名, 构成 密钥响应消息; 以及利用第二通信实体的临时公钥对所述第二通信实体和第 一通信实体之间的通信会话密钥进行加密后,再利用密钥分配中心的私钥计 算其签名, 构成密钥响应消息;
第一发送单元,用于将所述加密单元利用所述第一通信实体的临时公钥 构成的密钥响应消息通过承载设备返回给第一通信实体; 以及将利用所述第 二通信实体的临时公钥构成的密钥响应消息通过承载设备返回给第二通信 实体。
10、 根据权利要求 9所述的密钥分配中心, 其特征在于: 还包括: 获取单元, 通过查询数据库, 获得已注册保密服务的通信实体列表; 第二生成单元, 用于生成公钥更新通知消息, 该公钥更新通知消息包括 密钥分配中心的新公钥和利用密钥分配中心的旧私钥所做的签名; 第二发送单元,用于根据所述获取单元获取的已注册保密服务的通信实 体列表,将所述公钥更新通知消息通过承载设备发送给已注册保密服务的通 信实体。
11、 根据权利要求 10所述密钥分配中心, 其特征在于: 还包括: 第二接收单元,用于接收所述通信实体通过承载设备发送的公钥更新确 认消息, 所述公钥更新确认消息包括: 该通信实体已完成密钥分配中心的公 钥更新信息。
12、 一种通信实体, 其特征在于: 在保密通信之前先获得密钥分配中心 的公钥, 所述通信实体包括:
生成单元, 用于生成一对临时公私钥对;
发送单元, 利用所述产生的临时公钥通过承载设备向密钥分配中心发送 密钥请求消息, 该密钥请求消息包括该通信实体的临时公钥, 以及与其通信 的对应通信实体的信息;
接收单元, 用于接收密钥分配中心发送的密钥响应消息, 所述密钥响应 消息包括该通信实体和与其通信的通信实体间的通信会话密钥;
验证单元,用于利用所述密钥分配中心的公钥对所述密钥响应消息进行 签名验证, 在验证通过后, 再利用该通信实体的临时私钥对所述密钥响应消 息进行解密, 得到通信会话密钥。
13、 根据权利要求 12所述的通信实体, 其特征在于: 还包括: 密钥删除单元, 用于该通信实体利用所述通信会话密钥通信后, 删除所 述临时公私钥对, 并在下次开始保密通信时或在保密通信过程中需要更新通 信会话密钥时, 向所述生成单元发送重新生成临时公私钥对的通知。
14、 根据权利要求 12所述的通信实体, 其特征在于: 还包括: 密钥更新单元,用于在接收到所述密钥分配心中通过承载设备发送的公 钥更新通知消息后, 利用本地保存的密钥分配中心的公钥验证其中的签名是 否正确, 并在验证通过后, 将本地存储的密钥分配中心的公钥更新为所述公 钥更新通知消息中的新公钥。
15、 根据权利要求 14所述通信实体, 其特征在于: 还包括:
密钥更新确认单元, 用于在密钥更新单元更新本地存储的密钥分配中心 的公钥后通过承载设备向密钥分配中心发送公钥更新确认消息,所述公钥更 新确认消息包括: 该通信实体已完成密钥分配中心的公钥更新信息。
16、一种密钥管理系统, 其特征在于: 该系统包括通信实体、承载设备、 密钥分配中心和数据库, 其中,
所述承载设备,用于转递密钥分配过程和公钥更新过程中的密钥请求消 息、 密钥响应消息、 公钥更新通知或公钥更新确认消息;
所述数据库, 用于存储各通信实体是否注册了保密服务, 并为密钥分配 中心提供服务; 或者向密钥分配中心反馈已注册保密服务的通信实体列表; 所述密钥分配中心, 与承载设备和数据库相接, 用于在接收到承载设备 转发的密钥请求消息后, 根据查询数据库的结果决定是否生成通信会话密 钥, 并对生成的通信会话密钥进行加密签名后, 构成密钥响应消息, 并通过 承载设备将所述密钥响应消息发送各个通信实体; 或者通过查询数据库获得 已注册保密服务的通信实体列表, 并将生成的公钥更新通知消息通过承载设 备发送给各个通信实体, 以及通过承载设备接收各个通信实体发送的更新确 认消息;
所述通信实体, 用于生成一对临时公私钥对, 通过承载设备向密钥分配 中心发送密钥请求消息, 并对接收到的密钥响应消息利用密钥分配中心的公 钥和该通信实体的临时私钥进行签名的验证和解密, 得到通信会话密钥; 或 者通过承载设备接收到密钥分配中心发送的公钥更新通知后,对存储的公钥 进行更新后, 通过承载设备向密钥分配中心发送公钥更新确认消息。
17、 根据权利要求 16所述的密钥管理系统, 其特征在于: 所述通信实 体为两个或两个以上。
18、 根据权利要求 16或 17所述的密钥管理系统, 其特征在于: 所述承 载设备为: 短信系统、 全球移动通信系统、 码分多址接入系统、 公共交换电 话网络或因特网。
PCT/CN2009/071976 2008-05-29 2009-05-26 密钥分配方法、在线新更密钥分配中心的公钥方法及装置 WO2009143765A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US12/994,690 US20110103589A1 (en) 2008-05-29 2009-05-26 Key distributing method, public key of key distribution centre online updating method and device
EP09753483A EP2282442A1 (en) 2008-05-29 2009-05-26 Key distributing method, public key of key distribution centre online updating method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200810018334.6A CN101286840B (zh) 2008-05-29 2008-05-29 一种利用公钥密码技术的密钥分配方法及其系统
CN200810018334.6 2008-05-29

Publications (1)

Publication Number Publication Date
WO2009143765A1 true WO2009143765A1 (zh) 2009-12-03

Family

ID=40058824

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/071976 WO2009143765A1 (zh) 2008-05-29 2009-05-26 密钥分配方法、在线新更密钥分配中心的公钥方法及装置

Country Status (4)

Country Link
US (1) US20110103589A1 (zh)
EP (1) EP2282442A1 (zh)
CN (1) CN101286840B (zh)
WO (1) WO2009143765A1 (zh)

Families Citing this family (33)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101286840B (zh) * 2008-05-29 2014-07-30 西安西电捷通无线网络通信股份有限公司 一种利用公钥密码技术的密钥分配方法及其系统
CN100581107C (zh) 2008-11-04 2010-01-13 西安西电捷通无线网络通信有限公司 一种基于三元对等鉴别(TePA)的可信平台验证方法
JP2011008701A (ja) * 2009-06-29 2011-01-13 Sony Corp 情報処理サーバ、情報処理装置、および情報処理方法
CN101640593B (zh) * 2009-08-28 2011-11-02 西安西电捷通无线网络通信股份有限公司 一种引入在线第三方的实体双向鉴别方法
WO2011063566A1 (zh) * 2009-11-27 2011-06-03 西安西电捷通无线网络通信股份有限公司 一种基于多个密钥分配中心的实体密话建立系统及其方法
US8839357B2 (en) * 2010-12-22 2014-09-16 Canon U.S.A., Inc. Method, system, and computer-readable storage medium for authenticating a computing device
US9026805B2 (en) 2010-12-30 2015-05-05 Microsoft Technology Licensing, Llc Key management using trusted platform modules
US9009475B2 (en) * 2011-04-05 2015-04-14 Apple Inc. Apparatus and methods for storing electronic access clients
US8713314B2 (en) 2011-08-30 2014-04-29 Comcast Cable Communications, Llc Reoccuring keying system
TWI489899B (zh) * 2011-10-28 2015-06-21 智邦科技股份有限公司 應用於無線網路之連線方法以及應用其之無線網路裝置以及無線網路存取點
JP2013207376A (ja) * 2012-03-27 2013-10-07 Toshiba Corp 情報処理装置およびプログラム
US9008316B2 (en) * 2012-03-29 2015-04-14 Microsoft Technology Licensing, Llc Role-based distributed key management
CN102624741A (zh) * 2012-03-30 2012-08-01 奇智软件(北京)有限公司 一种基于tlv的数据传输方法及系统
WO2013152383A1 (en) * 2012-04-13 2013-10-17 Department Of Industry, Innovation, Science, Research And Tertiary Education System and method for facilitating secure communication of data over a communications network
CN102780558A (zh) * 2012-04-28 2012-11-14 华为终端有限公司 数据加密、传输方法、算法分配方法、设备和系统
EP2785010A1 (en) * 2013-03-28 2014-10-01 Astrium Limited Key distribution in a satellite system
CN104702450A (zh) * 2013-12-04 2015-06-10 腾讯科技(北京)有限公司 合法性检测方法、装置及系统
US9641488B2 (en) * 2014-02-28 2017-05-02 Dropbox, Inc. Advanced security protocol for broadcasting and synchronizing shared folders over local area network
US10659232B2 (en) 2014-04-09 2020-05-19 Ictk Holdings Co., Ltd. Message authentication apparatus and method based on public-key cryptosystems
WO2015156621A1 (ko) * 2014-04-09 2015-10-15 (주) 아이씨티케이 인증 장치 및 방법
EP3164960B1 (en) * 2014-07-03 2019-05-15 Apple Inc. Methods and apparatus for establishing a secure communication channel
CN105721409B (zh) * 2014-12-03 2019-06-25 西安西电捷通无线网络通信股份有限公司 具有wlan功能的设备接入网络的方法及实现该方法的设备
CN106027474B (zh) * 2016-01-21 2019-11-15 李明 一种身份证认证系统中的身份证读卡终端
CN107040367B (zh) * 2016-02-04 2020-11-20 宁波巨博信息科技有限公司 会话密钥协商的方法、装置和系统
CN106961326A (zh) * 2016-12-22 2017-07-18 中国银联股份有限公司 Pos终端远程密钥更新系统以及更新方法
US11381386B2 (en) * 2017-07-31 2022-07-05 Cisco Technology, Inc. Secure network communication
CN107645378A (zh) * 2017-09-12 2018-01-30 中国联合网络通信集团有限公司 密钥管理平台、通信加密方法及终端
CN108647968A (zh) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 一种区块链数据处理方法、装置、处理设备及系统
CN109547208B (zh) * 2018-11-16 2021-11-09 交通银行股份有限公司 金融电子设备主密钥在线分发方法及系统
CN109639680B (zh) * 2018-12-14 2021-06-29 杭州安司源科技有限公司 一种三元对等的即时通信身份认证和权限控制方法
US11469903B2 (en) * 2019-02-28 2022-10-11 Microsoft Technology Licensing, Llc Autonomous signing management operations for a key distribution service
CN110602058B (zh) * 2019-08-22 2020-10-30 卓尔智联(武汉)研究院有限公司 芯片激活装置、方法及计算机可读存储介质
US11765582B2 (en) * 2020-08-20 2023-09-19 T-Mobile Usa, Inc. Asymmetric key exchange between user equipment using SIP

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1444386A (zh) * 2001-12-31 2003-09-24 西安西电捷通无线网络通信有限公司 宽带无线ip系统移动终端的安全接入方法
US20040161110A1 (en) * 2003-02-19 2004-08-19 Kabushiki Kaisha Toshiba Server apparatus, key management apparatus, and encrypted communication method
CN1992593A (zh) * 2005-12-27 2007-07-04 中兴通讯股份有限公司 应用于分组网络的基于h.323协议的终端接入方法
CN101282211A (zh) * 2008-05-09 2008-10-08 西安西电捷通无线网络通信有限公司 一种密钥分配方法
CN101286840A (zh) * 2008-05-29 2008-10-15 西安西电捷通无线网络通信有限公司 一种利用公钥密码技术的密钥分配方法及其系统
CN101286842A (zh) * 2008-05-26 2008-10-15 西安西电捷通无线网络通信有限公司 一种利用公钥密码技术的密钥分配及其公钥在线更新方法

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6058188A (en) * 1997-07-24 2000-05-02 International Business Machines Corporation Method and apparatus for interoperable validation of key recovery information in a cryptographic system
WO2000062507A1 (en) * 1999-04-09 2000-10-19 General Instrument Corporation Key management between a cable telephony adapter and associated signaling controller
US20030035547A1 (en) * 2001-03-27 2003-02-20 John Newton Server with multiple encryption libraries
US7181620B1 (en) * 2001-11-09 2007-02-20 Cisco Technology, Inc. Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
US7243366B2 (en) * 2001-11-15 2007-07-10 General Instrument Corporation Key management protocol and authentication system for secure internet protocol rights management architecture
US7334125B1 (en) * 2001-11-27 2008-02-19 Cisco Technology, Inc. Facilitating secure communications among multicast nodes in a telecommunications network
CN1534936A (zh) * 2003-03-31 2004-10-06 华为技术有限公司 一种无线局域网中基于公钥证书机制的密钥分发方法
US20050120203A1 (en) * 2003-12-01 2005-06-02 Ryhwei Yeh Methods, systems and computer program products for automatic rekeying in an authentication environment
KR100582546B1 (ko) * 2003-12-26 2006-05-22 한국전자통신연구원 암호화/복호화 키를 이용한 메시지 송수신 방법
JP4692284B2 (ja) * 2004-01-23 2011-06-01 日本電気株式会社 グループ署名システム、方法、装置、およびプログラム
KR100759489B1 (ko) * 2004-11-18 2007-09-18 삼성전자주식회사 이동통신망에서 공개키 기반구조를 이용한 아이피보안터널의 보안 방법 및 장치
US8467535B2 (en) * 2005-01-18 2013-06-18 Certicom Corp. Accelerated verification of digital signatures and public keys
ATE374478T1 (de) * 2005-08-05 2007-10-15 Sap Ag System und verfahren für das erneuern von schlüsseln, welche in public-key kryptographie genutzt werden
US7831998B2 (en) * 2005-09-16 2010-11-09 Ntt Docomo, Inc. Changing states of communication links in computer networks in an authenticated manner
US7788484B2 (en) * 2005-11-30 2010-08-31 Microsoft Corporation Using hierarchical identity based cryptography for authenticating outbound mail
US20100242102A1 (en) * 2006-06-27 2010-09-23 Microsoft Corporation Biometric credential verification framework
CN104283880A (zh) * 2008-02-22 2015-01-14 安全第一公司 安全工作组管理和通信的系统和方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1444386A (zh) * 2001-12-31 2003-09-24 西安西电捷通无线网络通信有限公司 宽带无线ip系统移动终端的安全接入方法
US20040161110A1 (en) * 2003-02-19 2004-08-19 Kabushiki Kaisha Toshiba Server apparatus, key management apparatus, and encrypted communication method
CN1992593A (zh) * 2005-12-27 2007-07-04 中兴通讯股份有限公司 应用于分组网络的基于h.323协议的终端接入方法
CN101282211A (zh) * 2008-05-09 2008-10-08 西安西电捷通无线网络通信有限公司 一种密钥分配方法
CN101286842A (zh) * 2008-05-26 2008-10-15 西安西电捷通无线网络通信有限公司 一种利用公钥密码技术的密钥分配及其公钥在线更新方法
CN101286840A (zh) * 2008-05-29 2008-10-15 西安西电捷通无线网络通信有限公司 一种利用公钥密码技术的密钥分配方法及其系统

Also Published As

Publication number Publication date
CN101286840A (zh) 2008-10-15
EP2282442A1 (en) 2011-02-09
US20110103589A1 (en) 2011-05-05
CN101286840B (zh) 2014-07-30

Similar Documents

Publication Publication Date Title
WO2009143765A1 (zh) 密钥分配方法、在线新更密钥分配中心的公钥方法及装置
TWI748853B (zh) 用於基於區塊鏈的系統結合錢包管理系統中的安全多方防遺失儲存及加密金鑰轉移
US9166778B2 (en) Secure group messaging
WO2009143766A1 (zh) 一种密钥分配方法及系统和在线更新公钥的方法及系统
US7957320B2 (en) Method for changing a group key in a group of network elements in a network system
WO2009135444A1 (zh) 一种密钥分配方法、终端设备及密钥分配中心
US6987855B1 (en) Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups
US8386780B2 (en) Cryptographic communication system, terminal device, server, and decryption method
EP3813298B1 (en) Method and apparatus for establishing trusted channel between user and trusted computing cluster
CN111404950B (zh) 一种基于区块链网络的信息共享方法、装置和相关设备
CN108540436B (zh) 基于量子网络实现信息加解密传输的通信系统和通信方法
EP2767029B1 (en) Secure communication
CN107113314B (zh) 用于云计算中的异构数据存储管理的方法和装置
CN103534975A (zh) 根据公开密钥发现用于密钥管理的安全关联
CN108847928B (zh) 基于群组型量子密钥卡实现信息加解密传输的通信系统和通信方法
Wan et al. A secure privacy-preserving roaming protocol based on hierarchical identity-based encryption for mobile networks
CN116684093B (zh) 身份认证与密钥交换方法及系统
CN111865948A (zh) 基于匿名身份的对等云认证和密钥协商方法、系统和计算机存储介质
CN114448636B (zh) 基于数字证书的抗量子计算数字货币系统及匿名通信方法
CN112019553B (zh) 一种基于ibe/ibbe数据共享方法
CN1929377B (zh) 一种通信认证查询方法和系统
Yan et al. A scheme to secure instant community data access based on trust and contexts
US20230041783A1 (en) Provision of digital content via a communication network
US20240163080A1 (en) System and method for distribution of key generation data in a secure network
KR101275830B1 (ko) 그룹키 관리 장치 및 방법, 그리고 그 방법을 컴퓨터에서 실행시키기 위한 프로그램을 기록한 기록매체

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09753483

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2009753483

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 12994690

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE