WO2017133411A1 - 会话密钥协商的方法、装置和系统 - Google Patents

会话密钥协商的方法、装置和系统 Download PDF

Info

Publication number
WO2017133411A1
WO2017133411A1 PCT/CN2017/070797 CN2017070797W WO2017133411A1 WO 2017133411 A1 WO2017133411 A1 WO 2017133411A1 CN 2017070797 W CN2017070797 W CN 2017070797W WO 2017133411 A1 WO2017133411 A1 WO 2017133411A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
long
key
private key
public key
Prior art date
Application number
PCT/CN2017/070797
Other languages
English (en)
French (fr)
Inventor
雷浩
马文平
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP17746731.3A priority Critical patent/EP3404868A4/en
Publication of WO2017133411A1 publication Critical patent/WO2017133411A1/zh
Priority to US16/055,660 priority patent/US20180351736A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/067Network architectures or network communication protocols for network security for supporting key management in a packet data network using one-time keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Definitions

  • the present invention relates to information security and communication technologies, and in particular, to a method, device and system for session key negotiation.
  • the key exchange protocol in the prior art can ensure that two or more users establish a shared session key through the interaction information in the open network environment, and the user participating in the communication encrypts the communication data through the shared session key to ensure the network.
  • the authentication key exchange protocol is a key negotiation with an authentication function, which can authenticate the identity of both parties participating in the key agreement, thereby effectively resisting third-party attacks.
  • modulus function Mod 2 (w, b) is defined as follows:
  • ⁇ q/2, then Mod 2 (v, Cha(v)) Mod 2 (w, Cha(v)).
  • the common feature function Cha(v) is used, respectively, based on w, v, through the modulus function Mod 2 (w, b) Can calculate a common secret bit
  • the present invention provides a session key negotiation method, apparatus and system to overcome the problems of high traffic and computational cost in the prior art.
  • a first aspect of the present invention provides a session key negotiation method, including:
  • the first user equipment receives the long-term public key P A and the temporary public key x A corresponding to the second user equipment negotiated with the first user equipment session;
  • the first user equipment acquires a vector ⁇ B according to the long-term private key s B and the temporary private key y B corresponding to the first user equipment, and the long-term public key P A and the temporary public key x A ;
  • the first user equipment adopts a formula according to the vector ⁇ B Obtain
  • the first user equipment according to the Adopt formula Obtain semaphore v B ;
  • the first user equipment adopts a formula according to the semaphore v B Obtain a session key K;
  • the acquisition vector ⁇ B mode may be:
  • the first user equipment adopts a formula according to the long-term private key s B corresponding to the first user equipment, the d and e, and the long-term public key P A and the temporary private key x A corresponding to the second user equipment.
  • ⁇ B g ⁇ (x A + d ⁇ P A ) ⁇ (r B + e ⁇ s B ) ⁇ R q , obtain ⁇ B ;
  • r B ⁇ ;f B ⁇ ;g is a system parameter, and g ⁇ R;R is a circular algebraic integer ring, and The remaining ring R q is on; m is a positive integer.
  • the identity information A and B are bit strings representing an identity card number or fingerprint information.
  • the method further includes:
  • the method further includes:
  • a second aspect of the present invention provides a session key negotiation method, where the method includes:
  • the second user equipment acquires a vector ⁇ A according to the long-term public key P B and the temporary private key y B , and the long-term private key s A and the temporary private key x A corresponding to the second user equipment;
  • K rec( ⁇ A , v B ) according to the vector ⁇ A and the semaphore v B within the preset error range.
  • the preset error range is q is an even number and is not equal to 2.
  • the method further includes:
  • the second user equipment calculates the acquisition vector ⁇ A according to the long-term public key P B and the temporary private key y B , and the long-term private key s A and the temporary private key x A corresponding to the second user equipment, including:
  • the second user equipment is configured according to the temporary private key x A corresponding to the first user equipment, the temporary private key y B , the identity information B corresponding to the first user equipment, and the second user equipment.
  • the second user equipment adopts a formula according to the long-term private key s A corresponding to the second user equipment, the d and e, and the long-term public key P B and the temporary private key y B corresponding to the first user equipment.
  • ⁇ A g ⁇ (y B + d ⁇ P B ) ⁇ (r A + e ⁇ s A ) ⁇ R q , obtain the vector ⁇ A ;
  • r A ⁇ ;f A ⁇ ;g is a system parameter, and g ⁇ R;R is a circular algebraic integer ring, and The remaining ring R q is on; m is a positive integer.
  • the identity information A and B are bit strings representing an identity card number or fingerprint information.
  • the method further includes:
  • a third aspect of the present invention provides a session key agreement apparatus, where the apparatus includes:
  • transceiver module configured to receive a long-term public key P A and a temporary public key x A corresponding to the second user equipment negotiated with the session key negotiation device session;
  • a vector obtaining module configured to acquire a vector ⁇ B according to the long-term private key s B and the temporary private key y B corresponding to the session key negotiation device, and according to the long-term public key P A and the temporary public key x A ;
  • a first calculation module configured to adopt a formula according to the vector ⁇ B Obtain
  • a session key obtaining module configured to adopt a formula according to the semaphore v B Obtain a session key K;
  • the vector acquisition module in the device includes:
  • a vector obtaining unit configured to use, according to the long-term private key s B corresponding to the session key negotiation device, the d and e, and the long-term public key P A and the temporary private key x A corresponding to the second user equipment,
  • the formula ⁇ B g ⁇ (x A + d ⁇ P A ) ⁇ (r B + e ⁇ s B ) ⁇ R q , obtain ⁇ B ;
  • r B ⁇ ;f B ⁇ ;g is a system parameter, and g ⁇ R;R is a circular algebraic integer ring, and The remaining ring R q is on; m is a positive integer.
  • the device further includes:
  • the transceiver module is further configured to send the long-term public key P B , the temporary private key y B, and the semaphore v B of the session key agreement device to the second user.
  • a device wherein the second user equipment is within a preset error range, according to the long-term public key P B , the temporary private key y B and the semaphore v B , and the long-term private key corresponding to the second user equipment A and the temporary private key x A , obtaining the session key K;
  • a fourth aspect of the present invention provides a session key agreement apparatus, where the apparatus includes:
  • a transceiver module configured to receive a long-term public key P B , a semaphore v B and a temporary private key y B of the first user equipment sent by the first user equipment negotiated with the session key negotiation device session;
  • a vector obtaining module configured to acquire a vector ⁇ A according to the long-term public key P B and the temporary private key y B , and the long-term private key s A and the temporary private key x A corresponding to the session key negotiation device;
  • the preset error range is q is an even number and is not equal to 2.
  • the vector acquisition module in the device includes:
  • a calculating unit configured to: according to the long-term public key P B and the temporary private key x A corresponding to the first user equipment, the temporary private key y B , the identity information B corresponding to the first user equipment, and the session
  • a vector obtaining unit configured to use, according to the long-term private key s A corresponding to the session key negotiation device, the d and e, and the long-term public key P B and the temporary private key y B corresponding to the first user equipment,
  • the formula ⁇ A g ⁇ (y B + d ⁇ P B ) ⁇ (r B + e ⁇ s A ) ⁇ R q , obtain the vector ⁇ A ;
  • r A ⁇ ;f A ⁇ ;g is a system parameter, and g ⁇ R;R is a circular algebraic integer ring, and The remaining ring R q is on; m is a positive integer.
  • the device further includes:
  • a fifth aspect of the present invention provides a session key agreement system, where the system includes:
  • the first user equipment is the session key negotiation device according to the third aspect
  • the second user equipment is the session key negotiation device according to the fourth aspect.
  • the first user equipment and the second user equipment in the system are all in a distributed network environment.
  • the first user equipment passes the long-term private key s B and the temporary private key y B corresponding to the first user equipment, and the received negotiation with the first user equipment session
  • the long-term public key P A and the temporary public key x A corresponding to the two user equipments obtain the vector ⁇ B ; and according to the vector ⁇ B , the random function and the interleaved rounding function are used to obtain the semaphore v B ; and then according to the semaphore v B ,
  • the modulo 2 rounding function the calculation obtains the session key K; Is random and uniform, then the modulo 2 rounding function [x] 2 is The uniform distribution on the top, thus effectively ensuring the security of the session key.
  • q is an even mode, the problem that the communication amount and the calculation cost become large in the prior art are also effectively solved.
  • FIG. 1 is a schematic diagram of a network architecture on which a session key negotiation method according to the present invention is based;
  • FIG. 2 is a schematic diagram of a protocol running process of session key negotiation according to the present invention.
  • Embodiment 3 is a flowchart of Embodiment 1 of a session key negotiation method according to the present invention.
  • Embodiment 4 is a flowchart of Embodiment 2 of a session key negotiation method according to the present invention.
  • FIG. 5 is a flowchart of Embodiment 3 of a session key negotiation method according to the present invention.
  • FIG. 6 is a flowchart of Embodiment 4 of a session key negotiation method according to the present invention.
  • FIG. 7 is a flowchart of Embodiment 5 of a session key negotiation method according to the present invention.
  • FIG. 8 is a flowchart of Embodiment 6 of a session key negotiation method according to the present invention.
  • FIG. 9 is a schematic structural diagram of Embodiment 1 of a session key negotiation apparatus according to the present invention.
  • Embodiment 2 of a session key negotiation apparatus according to the present invention
  • FIG. 11 is a schematic structural diagram of Embodiment 3 of a session key negotiation apparatus according to the present invention.
  • Embodiment 4 of a session key negotiation apparatus according to the present invention.
  • Embodiment 13 is a schematic structural diagram of Embodiment 5 of a session key agreement apparatus according to the present invention.
  • FIG. 14 is a schematic structural diagram of Embodiment 6 of a session key agreement apparatus according to the present invention.
  • FIG. 15 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
  • FIG. 1 is a schematic diagram of a network architecture on which a session key negotiation method according to the present invention is based.
  • the network architecture mainly includes: a first user equipment 11 and a second user equipment 12.
  • the session key negotiation of the first user equipment 11 and the second user equipment 12 is performed in a distributed network environment, that is, the session key established by the two is enabled by the first user equipment 11 and the second user equipment. 12 masters, no other third party knows.
  • the network architecture may further include: the authentication center 13, that is, the first user equipment 11 and the second user equipment 12 need to perform authentication before performing session key negotiation, that is, the first user equipment 11 can determine and It It is indeed the second user device 12 that performs key agreement, not other devices.
  • the second user equipment 12 can also confirm this.
  • the protocol is constructed in a circular algebraic integer ring On the remaining ring R q , the specific system parameters are described as follows:
  • n a positive integer: it describes the m-order circular algebraic integer ring Regulation, where the number of ⁇ m (x) is
  • the first user equipment 11 and the second user equipment 12 each have a pair of long-term public and private keys for identification.
  • the manner of generation is briefly described as follows.
  • FIG. 2 is a schematic diagram of a protocol running process of the session key negotiation according to the present invention, that is, the specific protocol process is as shown in FIG. 2 . .
  • FIG. 3 is a flowchart of Embodiment 1 of a session key negotiation method according to the present invention. As shown in FIG. 3, the method in this embodiment may include:
  • Step 101 The first user equipment receives the long-term public key P A and the temporary public key x A corresponding to the second user equipment negotiated with the first user equipment session.
  • Step 102 The first user equipment acquires a vector ⁇ B according to the long-term private key s B and the temporary private key y B corresponding to the first user equipment, and the long-term public key P A and the temporary public key x A .
  • the session key negotiation of the first user equipment and the second user equipment is performed in a distributed network environment.
  • Step 103 The first user equipment adopts formula (1) according to the vector ⁇ B :
  • dbl represents a randomized function
  • Step 104 The first user equipment is according to the Use formula (2):
  • v B is a staggered rounding function
  • the cross-rounding function ⁇ > 2 defined as Combine the following definitions of the modulo 2 rounding function and the interleaved rounding function, The relationship between the interval and ⁇ x> 2 is as follows:
  • Step 105 The first user equipment adopts formula (3) according to the semaphore v B :
  • modulo 2 rounding function [] 2 defined as when Absolute minimum complete residual system And q ⁇ 2 is an even number:
  • the first user equipment passes the long-term private key s B and the temporary private key y B corresponding to the first user equipment, and the received long-term public key corresponding to the second user equipment negotiated with the first user equipment session.
  • P A and the temporary public key x A obtain the vector ⁇ B ; and according to the vector ⁇ B , the random function and the interleaved rounding function are used to obtain the semaphore v B ; and according to the semaphore v B , the modulo 2 rounding function is used to obtain Session key K; Is random and uniform, then the modulo 2 rounding function [x] 2 is The uniform distribution on the top, thus effectively ensuring the security of the session key.
  • q is an even mode, the problem that the communication amount and the calculation cost become large in the prior art are also effectively solved.
  • FIG. 4 is a flowchart of Embodiment 2 of the method for negotiating a session key according to the present invention.
  • a specific implementation manner of the foregoing step 102 is as follows:
  • Step 201 According to the system parameters a and f B , formula (4) is adopted:
  • Step 202 According to the temporary public key x A corresponding to the second user equipment, the temporary private key y B corresponding to the first user equipment, the identity information B corresponding to the first user equipment, and the second user
  • the identity information A corresponding to the device is based on equations (5) and (6):
  • the identity information A and B can both represent an ID card number, fingerprint information, and the like, and the bit string encoded by the authentication center is 0 and 1.
  • Step 203 According to the long-term private key s B corresponding to the first user equipment, the d and e, and the long-term public key P A and the temporary private key x A corresponding to the second user equipment, using formula (7) :
  • ⁇ B g ⁇ (x A +d ⁇ P A ) ⁇ (r B +e ⁇ s B ) ⁇ R q
  • r B ⁇ ;f B ⁇ ;g is a system parameter, and g ⁇ R;R is a circular algebraic integer ring, and The remaining ring R q is on.
  • the decoding base (the conjugate of the dual of the tensor power base) is used to represent the elements on the ring R, and the calculation is performed, and the element representation and calculation of the smaller size can be obtained. cost.
  • FIG. 5 is a flowchart of a third embodiment of the session key negotiation method of the present invention.
  • the method may further include:
  • Step 301 The first user equipment adopts formula (8) according to s 1 and e 1 :
  • Step 302 The first user equipment sends a registration request that carries the long-term public key P B to the authentication center, so that the authentication center, according to the registration request, verifies the long-term public key P B ⁇ 0 according to the s, e, and e', using equations (9) and (10):
  • Step 303 The first user equipment adopts formulas (11) and (12) according to the received b c and ⁇ v> 2 :
  • the security of the key negotiation can be ensured by ensuring that the second user equipment can determine the long-term public key of the user equipment that is negotiated by the two parties.
  • the method may further include:
  • Step 304 The first user equipment sends the long-term public key P B , the temporary private key y B and the semaphore v B of the first user equipment to the second user equipment, so that the second user equipment is within the preset error range, according to The long-term public key P B , the temporary private key y B and the semaphore v B , and the long-term private key s A and the temporary private key x A corresponding to the second user equipment acquire the session key K.
  • the preset error range is
  • FIG. 6 is a flowchart of Embodiment 4 of a session key negotiation method according to the present invention. As shown in FIG. 6, the method includes:
  • Step 401 The second user equipment receives the long-term public key P B , the semaphore v B and the temporary private key y B of the first user equipment sent by the first user equipment negotiated with the second user equipment session.
  • the session key negotiation of the first user equipment and the second user equipment is performed in a distributed network environment.
  • the first user equipment can perform the technical solutions shown in any of the methods in FIG. 1 to FIG. 3, and the implementation principles are similar, and details are not described herein again.
  • Step 402 The second user equipment acquires the vector ⁇ A according to the long-term public key P B and the temporary private key y B , and the long-term private key s A and the temporary private key x A corresponding to the second user equipment.
  • Step 403 The second user equipment uses formula (13) according to the vector ⁇ A and the semaphore v B within the preset error range:
  • the preset error range is q is an even number and is not equal to 2.
  • the first user equipment participating in the key agreement transmits the long-term public key P B , the semaphore v B and the temporary private key y B through public transmission
  • the second user equipment participating in the key negotiation receives the long-term public
  • the session key K corresponding to the second user equipment, so that the two parties to the key agreement obtain the key K uniformly distributed on ⁇ 0, 1 ⁇ in the sense of information theory, thereby ensuring the security of the session key.
  • q is an even mode, the problem that the communication amount and the calculation cost become large in the prior art are also effectively solved.
  • FIG. 7 is a flowchart of Embodiment 5 of the session key negotiation method of the present invention.
  • a specific implementation manner of the foregoing step 402 is as follows:
  • Step 501 The second user equipment adopts formula (14) according to system parameters a and f A :
  • Step 502 The second user equipment is configured according to the temporary private key x A corresponding to the first user equipment, the temporary private key y B , the identity information B corresponding to the first user equipment, and the second user equipment.
  • Identity information A using equations (15) and (16):
  • Step 503 The second user equipment uses, according to the long-term private key s A corresponding to the second user equipment, the d and e, and the long-term public key P B and the temporary private key y B corresponding to the first user equipment.
  • ⁇ A g ⁇ (y B +d ⁇ P B ) ⁇ (r A +e ⁇ s A ) ⁇ R q
  • r A ⁇ ;f A ⁇ ;g is a system parameter, and g ⁇ R;R is a circular algebraic integer ring, and The remaining ring R q is on; m is a positive integer.
  • the decoding base (the conjugate of the dual of the tensor power base) is used to represent the elements on the ring R, and the calculation is performed, and the element representation and calculation of the smaller size can be obtained. cost.
  • FIG. 8 is a flowchart of Embodiment 6 of the session key negotiation method of the present invention.
  • the method may further include:
  • Step 601 The second user equipment adopts formula (18) according to s 1 and e 1 :
  • Step 602 The second user equipment sends a registration request that carries the long-term public key P A to the authentication center, so that the authentication center, according to the registration request, verifies the P A ⁇ 0 according to s, e And e', using equations (19) and (20):
  • Step 603 The second user equipment adopts formulas (21) and (22) according to the received b c and ⁇ v> 2 :
  • the long-term public key of the user equipment negotiated by the two parties can be authenticated, it is ensured that the first user equipment determines that the key user negotiates with the second user equipment, thereby ensuring the security of the key agreement. Sex.
  • FIG. 9 is a schematic structural diagram of Embodiment 1 of a session key negotiation apparatus according to the present invention.
  • the apparatus in this embodiment may include: a transceiver module 21, a vector acquisition module 22, a first calculation module 23, and a semaphore acquisition module.
  • a session key obtaining module 25 wherein the transceiver module 21 is configured to receive the long-term public key P A and the temporary public key x A corresponding to the second user equipment negotiated with the session key negotiation device session; the vector obtaining module 22 is configured to: Obtaining a vector ⁇ B according to the long-term private key s B and the temporary private key y B corresponding to the session key negotiation device, and according to the long-term public key P A and the temporary public key x A ; the first calculating module 23 is configured to According to the vector ⁇ B , a formula is adopted Obtain The semaphore acquisition module 24 is configured to Adopt formula Obtaining a semaphore v B ; the session key obtaining module 25 is configured to adopt a formula according to the semaphore v B Obtain a session key K; where q is an even number and is not equal to 2.
  • the device of this embodiment may be a first user equipment, and is used to implement the technical solution of the method embodiment shown in FIG. 1 , and the implementation principle and technical effects thereof are similar, and details are not described herein again.
  • FIG. 10 is a schematic structural diagram of Embodiment 2 of a session key negotiation apparatus according to the present invention.
  • the apparatus in this embodiment is based on the apparatus structure shown in FIG. 9.
  • r B ⁇ ;f B ⁇ ;g is a system parameter, and g ⁇ R;R is a circular algebraic integer ring, and The remaining ring R q is on; m is a positive integer.
  • the device in this embodiment may be used to implement the technical solution of the method embodiment shown in FIG. 2, and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 11 is a schematic structural diagram of Embodiment 3 of a session key negotiation apparatus according to the present invention.
  • the session key negotiation means to send the first certificate Cert B, to prove that the session key negotiation means has a long-term public key P B; where, s 1, e 1 ⁇ ⁇ ; s, e, e ' ⁇ Hey.
  • the transceiver module 21 is further configured to send the long-term public key P B , the temporary private key y B, and the semaphore v B of the session key negotiation device to the second user equipment, where The second user equipment is within a preset error range, according to the long-term public key P B , the temporary private key y B and the semaphore v B , and the long-term private key s A and the temporary private key x A corresponding to the second user equipment.
  • the device in this embodiment may be used to implement the technical solution of the method embodiment shown in FIG. 3, and the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 12 is a schematic structural diagram of Embodiment 4 of a session key negotiation apparatus according to the present invention. As shown in FIG. 12, the apparatus includes: a transceiver module 41, a vector obtaining module 42, and a session key obtaining module 43.
  • the vector obtaining module 42 is configured to use the The long-term public key P B and the temporary private key y B , and the long-term private key s A and the temporary private key x A corresponding to the session key negotiation device, calculate the acquisition vector ⁇ A ;
  • the preset error range is q is an even number and is not equal to 2.
  • the device in this embodiment may be a second user equipment, and is used to perform the technical solution of the method embodiment shown in FIG. 6.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 13 is a schematic structural diagram of Embodiment 5 of the session key negotiation apparatus according to the present invention.
  • the calculation unit 422 is configured to: according to the temporary private key x A corresponding to the first user equipment, the temporary private key y B , the identity information B corresponding to the first user equipment, and the session key negotiation device
  • the vector obtaining unit 423 is configured to negotiate the long-term corresponding to the device according to the session key
  • the device in this embodiment may be used to implement the technical solution of the method embodiment shown in FIG. 7.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • FIG. 14 is a schematic structural diagram of Embodiment 6 of the session key negotiation apparatus according to the present invention. As shown in FIG. 14, on the basis of the foregoing embodiment shown in FIG. 13, the apparatus may further include: a long-term public key obtaining module 51.
  • the device in this embodiment may be used to implement the technical solution of the method embodiment shown in FIG. 8.
  • the implementation principle and technical effects are similar, and details are not described herein again.
  • the present invention also provides a session key agreement system, the system comprising a first user equipment and a second user equipment negotiated with the first user equipment; wherein the first user equipment is configured to perform any of FIG. 1 to FIG.
  • the technical solution of the method embodiment shown in the figure, the second user equipment is used to perform the technical solution of the method embodiment shown in any one of FIG. 6 to FIG. 8 , and the implementation principle and the technical effect are similar, and details are not described herein again.
  • the present invention also provides a session key negotiating apparatus, the apparatus comprising a processor, a memory, and a communication interface, the memory for storing executable program code, wherein the processor reads the memory by reading Executable program code to execute a program corresponding to the executable program code;
  • the communication interface receives a long-term public key P A and a temporary public key x A corresponding to the second user equipment negotiated with the session key negotiation device session;
  • the processor y B, and the long-term public key P A x A according to the temporary public key and the corresponding session key negotiation means long-term temporary private key and a private key s B, obtaining the vector ⁇ B; vector according to the ⁇ B , using the formula Obtain According to the Adopt formula Obtaining a semaphore v B ; according to the semaphore v B , using a formula Obtain a session key K; where q is an even number and is not equal to 2.
  • the session key agreement device is a first user equipment, and is used to perform the technical solution of the method embodiment shown in any one of FIG. 1 to FIG. 3, and the implementation principle and the technical effect are similar. Narration.
  • the present invention also provides a session key negotiating apparatus, the apparatus comprising a processor, a memory, and a communication interface, the memory for storing executable program code, wherein the processor reads the Executing program code stored in the storage to execute a program corresponding to the executable program code;
  • the communication interface receives the long-term public key P B , the semaphore v B and the temporary private key y B of the first user equipment sent by the first user equipment negotiated with the session key negotiation device session;
  • the session key agreement device is a second user equipment, and is used to perform the technical solution of the method embodiment shown in any one of FIG. 6 to FIG. 8 , and the implementation principle and the technical effect are similar. Narration.
  • FIG. 15 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
  • the user equipment provided by the embodiment of the present invention may be used to implement the foregoing implementation manners of the embodiments of the present invention shown in FIG. 3-8, for convenience of description. Only parts related to the embodiments of the present invention are shown, and the specific technical details are not disclosed. Please refer to the embodiments of the present invention shown in FIGS.
  • the user equipment may be a terminal device such as a mobile phone, a tablet computer, a notebook computer, a UMPC (Ultra-mobile Personal Computer), a netbook, a PDA (Personal Digital Assistant), and the like.
  • the mobile phone is taken as an example for explanation.
  • FIG. 15 is a block diagram showing a part of the structure of the mobile phone 1500 related to each embodiment of the present invention.
  • the mobile phone 1500 includes components such as an RF (radio frequency) circuit 1520, a memory 1530, an input unit 1540, a display unit 1550, a gravity sensor 1560, an audio circuit 1570, a processor 1580, and a power source 1590.
  • RF radio frequency
  • the components of the mobile phone 1500 will be specifically described below with reference to FIG. 15:
  • the RF circuit 1520 can be used for receiving and transmitting signals during and after receiving or transmitting information, in particular, after receiving the downlink information of the base station, and processing it to the processor 1580; in addition, transmitting the uplink data to the base station.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, an LNA (low noise amplifier), a duplexer, and the like.
  • RF circuitry 1520 can also communicate with the network and other devices via wireless communication.
  • the wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile Communication (GSM), General Packet Radio Service (GPRS), and code division. Multiple Access (Code Division Multiple Access; CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Message Service (Short) Messaging Service; referred to as: SMS).
  • GSM Global System of Mobile Communication
  • GPRS General Packet Radio Service
  • CDMA Code Division
  • the memory 1530 can be used to store software programs and modules, and the processor 1580 executes various functional applications and data processing of the mobile phone 1500 by running software programs and modules stored in the memory 1530.
  • the memory 1530 can mainly include a storage program area and a storage data area, wherein the storage program area can store an operating system, At least one function required application (such as a sound playing function, an image playing function, etc.); the storage data area can store data (such as audio data, image data, phone book, etc.) created according to the use of the mobile phone 1500.
  • memory 1530 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1540 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset 1500.
  • the input unit 1540 can include a touch screen 1541 and other input devices 1542.
  • the touch screen 1541 also referred to as a touch panel, can collect touch operations on or near the user (such as the operation of the user using a finger, a stylus, or the like on the touch screen 1541 or near the touch screen 1541), and The corresponding connecting device is driven according to a preset program.
  • the touch screen 1541 can include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1580 is provided and can receive commands from the processor 380 and execute them.
  • the touch screen 1541 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1540 can also include other input devices 1542.
  • other input devices 1542 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, power switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1550 can be used to display information input by the user or information provided to the user and various menus of the mobile phone 1500.
  • the display unit 1550 may include a display panel 351.
  • the display panel 1541 may be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch screen 1541 may cover the display panel 1551.
  • the touch screen 1541 detects a touch operation thereon or nearby, the touch screen 1541 transmits to the processor 1580 to determine the type of the touch event, and then the processor 1580 displays the panel according to the type of the touch event.
  • a corresponding visual output is provided on the 1551.
  • the touch screen 1541 and the display panel 1551 function as two separate components to implement the input and input functions of the mobile phone 1500, in some embodiments, the touch screen 1541 can be integrated with the display panel 1551 to implement the mobile phone 1500. Input and output functions.
  • Gravity sensor 1560 can detect the acceleration of the mobile phone in all directions (usually three axes). When it is still, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping).
  • the handset 1500 can also include other sensors, such as light sensors.
  • the light sensor can include an ambient light sensor and a proximity light sensor.
  • the ambient light sensor can adjust the brightness of the display panel 1541 according to the brightness of the ambient light; the proximity light sensor can detect whether an object approaches or contacts the mobile phone, and can close the display panel 1541 and/or the backlight when the mobile phone 1500 moves to the ear.
  • the mobile phone 1500 can also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, and the like, and will not be described herein.
  • An audio circuit 1570, a speaker 1571, and a microphone 1572 can provide an audio interface between the user and the handset 1500.
  • the audio circuit 1570 can transmit the converted electrical data of the received audio data to the speaker 1571, and convert it into a sound signal output by the speaker 1571.
  • the microphone 1572 converts the collected sound signal into an electrical signal, which is used by the audio circuit 1570. Converted to audio data after reception, and then output audio data to the RF circuit 1520 is sent to, for example, another handset, or audio data is output to memory 1530 for further processing.
  • the processor 1580 is a control center for the handset 1500 that connects various portions of the entire handset using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 1530, and recalling data stored in the memory 1530,
  • the mobile phone 1500 performs various functions and processing data to perform overall monitoring of the mobile phone.
  • the processor 1580 may include one or more processing units; preferably, the processor 1580 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 380.
  • the handset 1500 also includes a power source 1590 (such as a battery) that powers the various components.
  • a power source 1590 such as a battery
  • the power source can be logically coupled to the processor 1580 via a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone 1500 may further include a wireless fidelity (WiFi) module, a Bluetooth module, and the like, and details are not described herein.
  • WiFi wireless fidelity
  • Bluetooth Bluetooth
  • the memory 1530 is further configured to store executable program code.
  • the input unit 1540 is further configured to receive a long-term public key P A and a temporary public key x A corresponding to the second user equipment negotiated with the session key negotiation device session;
  • the processor 1580 is further configured to use the session key negotiation device according to the session key Corresponding long-term private key s B and temporary private key y B , and the long-term public key P A and temporary public key x A , obtain a vector ⁇ B ; according to the vector ⁇ B , adopt a formula Obtain According to the Adopt formula Obtaining a semaphore v B ; according to the semaphore v B , using a formula Obtain a session key K; where q is an even number and is not equal to 2.
  • the memory 1530 is further configured to store executable program code.
  • the aforementioned program can be stored in a computer readable storage medium.
  • the program when executed, performs the steps including the foregoing method embodiments; and the foregoing storage medium includes various media that can store program codes, such as a ROM, a RAM, a magnetic disk, or an optical disk.

Abstract

本发明实施例提供一种会话密钥协商的方法、装置和系统。本发明会话密钥协商方法包括:第一用户设备根据第一用户设备对应的长期私钥sB和临时私钥yB,以及接收到的与第一用户设备会话协商的第二用户设备对应的长期公钥PA和临时公钥xA,获取向量σB;根据向量σB,采用公式 B =dbl(σ B ),计获取 B ;根据 B ,采用公式v̄B=<v̄B>2,获取信号量vB;根据vB,采用公式(K)计算获取会话密钥K;其中,q为偶数,且不等于2。

Description

会话密钥协商的方法、装置和系统 技术领域
本发明涉及信息安全与通信技术,尤其涉及一种会话密钥协商的方法、装置和系统。
背景技术
现有技术中的密钥交换协议可以保证两个或多个用户在公开网络环境中通过交互信息建立一个共享的会话密钥,参与通信的用户通过共享的会话密钥来加密通信数据从而保证网络通信的安全。其中,认证密钥交换协议是一种带有认证功能的密钥协商,它能够对参与密钥协商双方的身份进行认证,从而能有效地抵抗第三方攻击。
目前,认证密钥交换协议的工作原理主要为:对于随机选择的a∈Rq,要进行认证密钥协商的双方A,B分别按照R-DLWEq,x:(1)各自秘密选择(sA,eA)←χ,(sB,eB)←χ;(2)各自计算bA=a·sA+eA,bB=a·sB+eB,其中,bA和bB是公开的;(3)双方A,B利用各自掌握的秘密sA和sB,可以分别计算出sA·bB和sB·bA。由于sA·bB=sAasB+sAeB≈sAasB≈sBasA+sBeA=sB·bA,因此,sA·bB-sB·bA=sAeB-sBeA,若双方误差尺寸||sAeB-sBeA||在一定范围内,则双方可以消去误差,从而计算出共同秘密sAasB;由于sAasB仅涉及双方各自掌握的秘密sA和sB,因此只有双方A,B才知道sAasB
另外,对于如何消除误差||sAeB-sBeA||,使得双方能正确恢复出sAasB,目前主要依赖特征函数Cha(v)和模函数Mod2(w,b),以实现双方恢复出共同信息sAasB。其中,特征函数Cha(v)定义如下:
Figure PCTCN2017070797-appb-000001
对于
Figure PCTCN2017070797-appb-000002
Figure PCTCN2017070797-appb-000003
模函数Mod2(w,b)定义如下:
对于
Figure PCTCN2017070797-appb-000005
Figure PCTCN2017070797-appb-000006
Figure PCTCN2017070797-appb-000007
具体的,就恢复出sAasB而言,通过模函数Mod2(w,b)逐个比特获得的,以1个比特为例:q为奇素数,给定
Figure PCTCN2017070797-appb-000008
对于w=v+2e,若错误量
Figure PCTCN2017070797-appb-000009
且|e|<q/2, 则Mod2(v,Cha(v))=Mod2(w,Cha(v))。换言之,当w,v之间的距离是一定范围内(w=v+2e),则用共同的特征函数Cha(v),各自分别基于w,v,通过模函数Mod2(w,b)可以计算出一个共同的秘密比特
Figure PCTCN2017070797-appb-000010
Figure PCTCN2017070797-appb-000011
其中,当q为奇素数,给定
Figure PCTCN2017070797-appb-000012
时:
1)若Cha(v)=0,则Mod2(w,Cha(v))输出0/1的偏差为1/2|E|;
2)若Cha(v)=1,则Mod2(w,Cha(v))输出0/1的偏差为1/(|E|-1)。
但是,由于通过模函数Mod2(w,Cha(v))计算出来的共同的秘密比特
Figure PCTCN2017070797-appb-000013
不是均匀分布的,为了防止第三方猜中密钥的一个比特,从而影响使用中的安全性,现有技术中的奇素数q必须取到亚指数大,因此,造成了通信量和计算代价变大的问题。同时,由于现有技术中还采用幂基来表示剩余环
Figure PCTCN2017070797-appb-000014
上的元素,其中n=2k;在剩余环Rq中、幂基的表示下,幂基本身尺寸大、剩余环Rq中的元素的尺寸也大,从而也导致了通信量和计算代价大的问题。
发明内容
本发明提供一种会话密钥协商方法、装置和系统,以克服现有技术中通信量和计算代价大的问题。
本发明第一方面提供一种会话密钥协商方法,包括:
第一用户设备接收与所述第一用户设备会话协商的第二用户设备对应的长期公钥PA和临时公钥xA
所述第一用户设备根据所述第一用户设备对应的长期私钥sB和临时私钥yB,以及所述长期公钥PA和临时公钥xA,获取向量σB
所述第一用户设备根据所述向量σB,采用公式
Figure PCTCN2017070797-appb-000015
获取
Figure PCTCN2017070797-appb-000016
所述第一用户设备根据所述
Figure PCTCN2017070797-appb-000017
采用公式
Figure PCTCN2017070797-appb-000018
获取信号量vB
所述第一用户设备根据所述信号量vB,采用公式
Figure PCTCN2017070797-appb-000019
获取会话密钥K;
其中,q为偶数,且不等于2。
结合第一方面,可以理解是的,所述获取向量σB方式可以具体为:
所述第一用户设备根据系统参数a以及fB,采用公式yB=a·rB+fB∈Rq,获取临时私钥yB
所述第一用户设备根据所述第二用户设备对应的临时公钥xA,所述第一用户设备对应的临时私钥yB,所述第一用户设备对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
所述第一用户设备根据所述第一用户设备对应的长期私钥sB,所述d和e,以及所述第二用户设备对应的长期公钥PA和临时私钥xA,采用公式σB=g·(xA+d·PA)·(rB+e·sB)∈Rq,获取σB
其中,
Figure PCTCN2017070797-appb-000020
rB←χ;fB←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000021
的剩余环Rq上;m为正整数。
结合第一方面,可选地,所述身份信息A和B为表示身份证号码或者指纹信息的比特串。
结合第一方面,需要指出的是,所述方法还包括:
所述第一用户设备根据s1和e1,采用公式PB=a·s1+e1∈Rq,获取所述第一用户设备对应的长期公钥PB
所述第一用户设备向认证中心发送携带有所述长期公钥PB的注册请求,以供所述认证中心根据所述注册请求,在验证所述长期公钥PB≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述第一用户设备;
所述第一用户设备根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w,并将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述第一用户设备发送第一证书CertB,以证明第一用户设备拥有所述长期公钥PB
其中,s1,e1←χ;s,e,e'←χ。
结合第一方面,可选地,所述方法还包括:
所述第一用户设备将所述第一用户设备的长期公钥PB,临时私钥yB和所述信号量vB发送给所述第二用户设备,以供所述第二用户设备在预设误差范围内,根据长期公钥PB,临时私钥yB和所述信号量vB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,获取所述会话密钥K;
其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000022
本发明第二方面提供一种会话密钥协商方法,所述方法包括:
第二用户设备接收与所述第二用户设备会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB
所述第二用户设备根据所述长期公钥PB和临时私钥yB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,获取向量σA
所述第二用户设备在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式K=rec(σA,vB),获取所述第二用户设备对应的会话密钥K;
其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000023
q为偶数,且不等于2。
结合第二方面,需要指出的是,所述方法还包括:
所述第二用户设备根据所述长期公钥PB和临时私钥yB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,计算获取向量σA,包括:
所述第二用户设备根据系统参数a以及fA,采用公式xA=a·rA+fA∈Rq,获取所述临时私钥xA
所述第二用户设备根据所述第一用户设备对应的临时私钥xA,所述临时私钥yB,所述第一用户设备对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
所述第二用户设备根据所述第二用户设备对应的长期私钥sA,所述d和e,以及所述第一用户设备对应的长期公钥PB和临时私钥yB,采用公式σA=g·(yB+d·PB)·(rA+e·sA)∈Rq,获取向量σA
其中,
Figure PCTCN2017070797-appb-000024
rA←χ;fA←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000025
的剩余环Rq上;m为正整数。
结合第二方面,可选地,所述身份信息A和B为表示身份证号码或者指纹信息的比特串。
结合第二方面,可以理解地,所述方法还包括:
所述第二用户设备根据s1和e1,采用公式PA=a·s1+e1∈Rq,获取所述第一用户设备对应的长期公钥PA
所述第二用户设备向认证中心发送携带有所述长期公钥PA的注册请求,以供所述认证中心根据所述注册请求,在验证所述PA≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述第二用户设备;
所述第二用户设备根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w,并将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述第二用户设备发送第二证书CertA,以证明第二用户设备拥 有所述长期公钥PA
其中,s1,e1←χ;s,e,e'←χ。
本发明第三方面提供一种会话密钥协商装置,所述装置包括:
收发模块,用于接收与会话密钥协商装置会话协商的第二用户设备对应的长期公钥PA和临时公钥xA
向量获取模块,用于根据所述会话密钥协商装置对应的长期私钥sB和临时私钥yB,以及根据所述长期公钥PA和临时公钥xA,获取向量σB
第一计算模块,用于根据所述向量σB,采用公式
Figure PCTCN2017070797-appb-000026
获取
Figure PCTCN2017070797-appb-000027
信号量获取模块,用于根据所述
Figure PCTCN2017070797-appb-000028
采用公式
Figure PCTCN2017070797-appb-000029
获取信号量vB
会话密钥获取模块,用于根据所述信号量vB,采用公式
Figure PCTCN2017070797-appb-000030
获取会话密钥K;
其中,q为偶数,且不等于2。
结合第三方面,可以理解的是,所述装置中的向量获取模块包括:
临时私钥获取单元,用于根据系统参数a以及fB,采用公式yB=a·rB+fB∈Rq,获取临时私钥yB
计算单元,用于根据所述第二用户设备对应的临时公钥xA,所述第一用户设备对应的临时私钥yB,所述会话密钥协商装置对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
向量获取单元,用于根据所述会话密钥协商装置对应的长期私钥sB,所述d和e,以及所述第二用户设备对应的长期公钥PA和临时私钥xA,采用公式σB=g·(xA+d·PA)·(rB+e·sB)∈Rq,获取σB
其中,
Figure PCTCN2017070797-appb-000031
rB←χ;fB←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000032
的剩余环Rq上;m为正整数。
结合第三方面,可以指出的是,所述装置还包括:
长期公钥获取模块,用于根据s1和e1,采用公式PB=a·s1+e1∈Rq,获取所述会话密钥协商装置对应的长期公钥PB
所述收发模块还用于向认证中心发送携带有所述长期公钥PB的注册请求,以供 所述认证中心根据所述注册请求,在验证所述长期公钥PB≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述会话密钥协商装置;
第二计算模块,用于根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w;
所述收发模块还用于将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述会话密钥协商装置发送第一证书CertB,以证明会话密钥协商装置拥有所述长期公钥PB
其中,s1,e1←χ;s,e,e'←χ。
结合第三方面,可选地,所述收发模块还用于将所述会话密钥协商装置的长期公钥PB,临时私钥yB和所述信号量vB发送给所述第二用户设备,以供所述第二用户设备在预设误差范围内,根据长期公钥PB,临时私钥yB和所述信号量vB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,获取所述会话密钥K;
其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000033
本发明第四方面提供一种会话密钥协商装置,所述装置包括:
收发模块,用于接收与所述会话密钥协商装置会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB
向量获取模块,用于根据所述长期公钥PB和临时私钥yB,以及所述会话密钥协商装置对应的长期私钥sA和临时私钥xA,获取向量σA
会话密钥获取模块,用于在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式K=rec(σA,vB),获取所述会话密钥协商装置对应的会话密钥K;
其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000034
q为偶数,且不等于2。
结合第四方面,可以指出的是,所述装置中的向量获取模块包括:
临时私钥获取单元,用于根据系统参数a以及fA,采用公式xA=a·rA+fA∈Rq,获取所述临时私钥xA
计算单元,用于根据所述第一用户设备对应的长期公钥PB和临时私钥xA,所述临时私钥yB,所述第一用户设备对应的身份信息B,以及所述会话密钥协商装置对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
向量获取单元,用于根据所述会话密钥协商装置对应的长期私钥sA,所述d和e,以及所述第一用户设备对应的长期公钥PB和临时私钥yB,采用公式σA=g·(yB+d·PB)·(rB+e·sA)∈Rq,获取向量σA
其中,
Figure PCTCN2017070797-appb-000035
rA←χ;fA←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000036
的剩余环Rq上;m为正整数。
结合第四方面,可选地,所述装置还包括:
长期公钥获取模块,用于根据s1和e1,采用公式PA=a·s1+e1∈Rq,获取所述第一用户设备对应的长期公钥PA
所述收发模块还用于向认证中心发送携带有所述长期公钥PA的注册请求,以供所述认证中心根据所述注册请求,在验证所述PA≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述会话密钥协商装置;
计算模块,用于根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w;
所述收发模块还用于将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述会话密钥协商装置发送第二证书CertA,以证明会话密钥协商装置拥有所述长期公钥PA
其中,s1,e1←χ;s,e,e'←χ。
本发明第五方面提供一种会话密钥协商系统,所述系统包括:
第一用户设备以及与所述第一用户设备会话协商的第二用户设备;
其中,所述第一用户设备为如上述第三方面所述的会话密钥协商装置;所述第二用户设备为上述第四方面所述的会话密钥协商装置。
结合第五方面,可以理解地,所述系统中的第一用户设备和第二用户设备均处于分布式网络环境中。
本发明实施例会话密钥协商方法、装置和系统,第一用户设备通过第一用户设备对应的长期私钥sB和临时私钥yB,以及接收到的与第一用户设备会话协商的第二用户设备对应的长期公钥PA和临时公钥xA,获取向量σB;并根据向量σB,采用随机函数和交错凑整函数,获取信号量vB;再根据信号量vB,采用模2凑整函数,计算 获取会话密钥K;由于若
Figure PCTCN2017070797-appb-000037
是随机均匀的,则模2凑整函数[x]2
Figure PCTCN2017070797-appb-000038
上的均匀分布,因此有效地保证了会话密钥的安全性。另外,由于q为偶数模,因此,还有效地解决了现有技术中通信量和计算代价变大的问题。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明的会话密钥协商方法所基于的网络架构示意图;
图2为本发明会话密钥协商的协议运行过程图;
图3为本发明会话密钥协商方法实施例一的流程图;
图4为本发明会话密钥协商方法实施例二的流程图;
图5为本发明会话密钥协商方法实施例三的流程图;
图6为本发明会话密钥协商方法实施例四的流程图;
图7为本发明会话密钥协商方法实施例五的流程图;
图8为本发明会话密钥协商方法实施例六的流程图;
图9为本发明会话密钥协商装置实施例一的结构示意图;
图10为本发明会话密钥协商装置实施例二的结构示意图;
图11为本发明会话密钥协商装置实施例三的结构示意图;
图12为本发明会话密钥协商装置实施例四的结构示意图;
图13为本发明会话密钥协商装置实施例五的结构示意图;
图14为本发明会话密钥协商装置实施例六的结构示意图;
图15为本发明实施例提供的一种用户设备的结构示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
图1为本发明的会话密钥协商方法所基于的网络架构示意图,如图1所示,该网络架构主要包括:第一用户设备11和第二用户设备12。其中,该第一用户设备11和第二用户设备12的会话密钥协商是在分布式网络环境下进行的,即两者建立的会话密钥使能被第一用户设备11和第二用户设备12所掌握,任何其他第三方均不知道。另外,可选地,该网络架构还可以包括:认证中心13,即第一用户设备11和第二用户设备12在进行会话密钥协商之前,需要进行认证,即第一用户设备11能确定和它 进行密钥协商的确实是第二用户设备12,而不是其他设备。同理,第二用户设备12也能确认这一点。
在本发明中,本协议构造在分圆代数整数环
Figure PCTCN2017070797-appb-000039
的剩余环Rq上,具体的系统参数描述如下:
m为正整数:它描述了m阶分圆代数整数环
Figure PCTCN2017070797-appb-000040
的规制,其中Φm(x)的次数是
Figure PCTCN2017070797-appb-000041
q奇素数模:gcd(q,m)=1;
g=Πp(1-ζp),其中p跑遍整除m的所有奇素数;
代数数域K上的离散高斯分布[ψ],其中
Figure PCTCN2017070797-appb-000042
H(·):{0,1}*→R:将任意字符串映射为符合离散高斯分布χ=[ψ]的、位于
Figure PCTCN2017070797-appb-000043
上的元素;
Figure PCTCN2017070797-appb-000044
全局公开参数。
另外,第一用户设备11和第二用户设备12各自有一对长期的公私钥来标识,其产生方式简要说明如下,以第二用户设备12为例:第二用户设备12抽样sA←χ、eA←χ,其中,eA为噪声向量;并将sA∈Rq作为自己的长期私钥,计算PA=a·sA+eA∈Rq并将其作为自己的长期公钥。设第一用户设备11和第二用户设备12要协商的会话密钥K可以为K=SKAB,图2为本发明会话密钥协商的协议运行过程图,即具体协议过程如图2所示。
图3为本发明会话密钥协商方法实施例一的流程图,如图3所示,本实施例的方法可以包括:
步骤101、第一用户设备接收与第一用户设备会话协商的第二用户设备对应的长期公钥PA和临时公钥xA
步骤102、第一用户设备根据第一用户设备对应的长期私钥sB和临时私钥yB,以及长期公钥PA和临时公钥xA,获取向量σB
在本实施例中,第一用户设备和第二用户设备的会话密钥协商是在分布式网络环境下进行。
步骤103、第一用户设备根据所述向量σB,采用公式(1):
Figure PCTCN2017070797-appb-000045
Figure PCTCN2017070797-appb-000046
获取
Figure PCTCN2017070797-appb-000047
在本实施例中,dbl表示随机化函数(randomized function)。
步骤104、第一用户设备根据所述
Figure PCTCN2017070797-appb-000048
采用公式(2):
Figure PCTCN2017070797-appb-000049
获取信号量vB
在本实施例中,vB是交错凑整函数作用在
Figure PCTCN2017070797-appb-000050
身上得到的“信号量”。其中,交错凑整函数(cross-rounding function)<>2
Figure PCTCN2017070797-appb-000051
定义为
Figure PCTCN2017070797-appb-000052
结合如下的模2凑整函数和交错凑整函数的定义,
Figure PCTCN2017070797-appb-000053
的所在区间和<x>2的取值关系如下:
Figure PCTCN2017070797-appb-000054
并且,对于偶数模q,若
Figure PCTCN2017070797-appb-000055
是随机均匀的,且给定<x>2,[x]2的分布是
Figure PCTCN2017070797-appb-000056
上均匀分布。也就是说,对于均匀分布的
Figure PCTCN2017070797-appb-000057
给定<x>2=b,[x]2=b和[x]2=1-b的概率各占1/2,即给定<x>2=b,不泄露
Figure PCTCN2017070797-appb-000058
[x]2是信息论意义上安全的。
步骤105、第一用户设备根据信号量vB,采用公式(3):
Figure PCTCN2017070797-appb-000059
获取会话密钥K。
其中,q为偶数,且不等于2。
在本实施例中,模2凑整函数[]2
Figure PCTCN2017070797-appb-000060
定义为
Figure PCTCN2017070797-appb-000061
Figure PCTCN2017070797-appb-000062
的绝对最小完全剩余系
Figure PCTCN2017070797-appb-000063
且q≠2为偶数:
(1)、I0={0,1,2,…,[q/4]-1},I1={-[q/4],…,-1}modq,I0∪I1使得[x]2=0;
(2)、
Figure PCTCN2017070797-appb-000064
包含所有使得[x]2=1的元素。
在本实施例中,第一用户设备通过第一用户设备对应的长期私钥sB和临时私钥yB,以及接收到的与第一用户设备会话协商的第二用户设备对应的长期公钥PA和临时公钥xA,获取向量σB;并根据向量σB,采用随机函数和交错凑整函数,获取信号量vB;再根据信号量vB,采用模2凑整函数,获取会话密钥K;由于若
Figure PCTCN2017070797-appb-000065
是随机均匀的,则模2凑整函数[x]2
Figure PCTCN2017070797-appb-000066
上的均匀分布,因此有效地保证了会话密钥的安全性。另外,由于q为偶数模,因此,还有效地解决了现有技术中通信量和计算代价变大的问题。
下面采用几个具体的实施例,对图1所示方法实施例的技术方案进行详细说明。
图4为本发明会话密钥协商方法实施例二的流程图,在上述图3所示实施例的基础上,如图4所示,上述步骤102的一种具体实现方式为:
步骤201、根据系统参数a以及fB,采用公式(4):
yB=a·rB+fB∈Rq
(4)
获取临时私钥yB
步骤202、根据所述第二用户设备对应的临时公钥xA,所述第一用户设备对应的临时私钥yB,所述第一用户设备对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式(5)和(6):
d=H(xA,B)
(5)
e=H(yB,A)
(6)
分别获取d和e。
在本实施例中,身份信息A和B均可以表示身份证号码、指纹信息等被认证中心编码为0和1的比特串。
步骤203、根据所述第一用户设备对应的长期私钥sB,所述d和e,以及所述第二用户设备对应的长期公钥PA和临时私钥xA,采用公式(7):
σB=g·(xA+d·PA)·(rB+e·sB)∈Rq
(7)
获取σB
其中,
Figure PCTCN2017070797-appb-000067
rB←χ;fB←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000068
的剩余环Rq上。另外,m为正整数,且描述 了m阶分圆代数整数环
Figure PCTCN2017070797-appb-000069
的规制,其中,Φm(x)的次数是
Figure PCTCN2017070797-appb-000070
gcd(q,m)=1。g=Πp(1-ζp),其中,p为跑遍整数除m的所有奇素数。代数数域K上的离散高斯分布[ψ],其中,
Figure PCTCN2017070797-appb-000071
H(·):{0,1}*→R表示任意字符串映射为符合离散高斯分布的χ=[ψ],位于
Figure PCTCN2017070797-appb-000072
上的元素;
Figure PCTCN2017070797-appb-000073
表示全局公开参数。
在本实施例中,在一般分圆多项式环下,采用解码基(张量幂基的对偶的共轭)表示环R上的元素,以及进行计算,可以获地较小尺寸的元素表示和计算代价。
图5为本发明会话密钥协商方法实施例三的流程图,在上述图4所示实施例的基础上,如图5所示,在步骤101之前,该方法还可以进一步包括:
步骤301、第一用户设备根据s1和e1,采用公式(8):
PB=a·s1+e1∈Rq
(8)
获取所述第一用户设备对应的长期公钥PB
步骤302、第一用户设备向认证中心发送携带有所述长期公钥PB的注册请求,以供所述认证中心根据所述注册请求,在验证所述长期公钥PB≠0时,根据s、e和e',采用公式(9)和(10):
bc=a·s+e
(9)
v=g·b·s+e'
(10)
获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述第一用户设备。
步骤303、第一用户设备根据接收到的所述bc和<v>2,采用公式(11)和(12):
u=g·bc·s1
(11)
w=rec(u,<v>2)
(12)
获取w,并将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述第一用户设备发送第一证书CertB,以证明第一用户设备拥有所述长期公钥PB
其中,s1,e1←χ;s,e,e'←χ。
由于可以对两方协商的用户设备的长期公钥进行认证,从而保证第二用户设备确定和它进行密钥协商的确实是第一用户设备,进而保证密钥协商的安全性。
更进一步的,在步骤105之后,该方法还可以包括:
步骤304、第一用户设备将第一用户设备的长期公钥PB,临时私钥yB和信号量vB发送给第二用户设备,以供第二用户设备在预设误差范围内,根据长期公钥PB,临时私钥yB和信号量vB,以及第二用户设备对应的长期私钥sA和临时私钥xA,获取会话密钥K。
其中,预设误差范围为
Figure PCTCN2017070797-appb-000074
图6为本发明会话密钥协商方法实施例四的流程图,如图6所示,该方法包括:
步骤401、第二用户设备接收与所述第二用户设备会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB
在本实施例中,第一用户设备和第二用户设备的会话密钥协商是在分布式网络环境下进行。其中,第一用户设备可以执行如图1至图3任一方法所示的技术方案,其实现原理相类似,此处不再赘述。
步骤402、第二用户设备根据所述长期公钥PB和临时私钥yB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,获取向量σA
步骤403、第二用户设备在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式(13):
K=rec(σA,vB)
(13)
获取所述第二用户设备对应的会话密钥K。
其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000075
q为偶数,且不等于2。
在本实施例中,参与密钥协商的第一用户设备通过公开传输长期公钥PB,信号量vB和临时私钥yB,参与该密钥协商的第二用户设备通过接收该长期公钥PB,信号量vB和临时私钥yB,以及根据自身长期私钥sA和临时私钥xA计算获取的向量σA,采用公式K=rec(σA,vB),获取所述第二用户设备对应的会话密钥K,从而使得密钥协商两方获取信息论意义下均匀分布于{0,1}上的密钥K,从而保证会话密钥的安全性。另外,由于q为偶数模,因此,还有效地解决了现有技术中通信量和计算代价变大的问题。
图7为本发明会话密钥协商方法实施例五的流程图,在上述图6所示实施例的基础上,如图7所示,上述步骤402的一种具体实现方式为:
步骤501、第二用户设备根据系统参数a以及fA,采用公式(14):
xA=a·rA+fA∈Rq
(14)
获取所述临时私钥xA
步骤502、第二用户设备根据所述第一用户设备对应的临时私钥xA,所述临时私钥yB,所述第一用户设备对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式(15)和(16):
d=H(xA,B)
(15)
e=H(yB,A)
(16)
分别获取d和e。
步骤503、第二用户设备根据所述第二用户设备对应的长期私钥sA,所述d和e,以及所述第一用户设备对应的长期公钥PB和临时私钥yB,采用公式(17):
σA=g·(yB+d·PB)·(rA+e·sA)∈Rq
(17)
获取向量σA
其中,
Figure PCTCN2017070797-appb-000076
rA←χ;fA←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000077
的剩余环Rq上;m为正整数。
在本实施例中,在一般分圆多项式环下,采用解码基(张量幂基的对偶的共轭)表示环R上的元素,以及进行计算,可以获地较小尺寸的元素表示和计算代价。
图8为本发明会话密钥协商方法实施例六的流程图,在上述图7所示实施例的基础上,如图8所示,该方法还可以进一步包括:
步骤601、第二用户设备根据s1和e1,采用公式(18):
PA=a·s1+e1∈Rq
(18)
获取所述第一用户设备对应的长期公钥PA
步骤602、第二用户设备向认证中心发送携带有所述长期公钥PA的注册请求,以 供所述认证中心根据所述注册请求,在验证所述PA≠0时,根据s、e和e',采用公式(19)和(20):
bc=a·s+e
(19)
v=g·b·s+e'
(20)
获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述第二用户设备。
步骤603、第二用户设备根据接收到的所述bc和<v>2,采用公式(21)和(22):
u=g·bc·s1
(21)
w=rec(u,<v>2)
(22)
获取w,并将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述第二用户设备发送第二证书CertA,以证明第二用户设备拥有所述长期公钥PA
其中,s1,e1←χ;s,e,e'←χ。
在本实施例中,由于可以对两方协商的用户设备的长期公钥进行认证,从而保证第一用户设备确定和它进行密钥协商的确实是第二用户设备,进而保证密钥协商的安全性。
图9为本发明会话密钥协商装置实施例一的结构示意图,如图9所示,本实施例的装置可以包括:收发模块21、向量获取模块22、第一计算模块23、信号量获取模块24和会话密钥获取模块25,其中,收发模块21用于接收与会话密钥协商装置会话协商的第二用户设备对应的长期公钥PA和临时公钥xA;向量获取模块22用于根据所述会话密钥协商装置对应的长期私钥sB和临时私钥yB,以及根据所述长期公钥PA和临时公钥xA,获取向量σB;第一计算模块23用于根据所述向量σB,采用公式
Figure PCTCN2017070797-appb-000078
获取
Figure PCTCN2017070797-appb-000079
信号量获取模块24用于根据所述
Figure PCTCN2017070797-appb-000080
采用公式
Figure PCTCN2017070797-appb-000081
获取信号量vB;会话密钥获取模块25用于根据所述信号量vB,采用公式
Figure PCTCN2017070797-appb-000082
获取会话密钥K;其中,q为偶数,且不等于2。
本实施例的装置,可以第一用户设备,且用于执行图1所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
图10为本发明会话密钥协商装置实施例二的结构示意图,如图10所示,本实施例的装置在图9所示装置结构的基础上,进一步地,所述向量获取模块22具体包括:临时私钥获取单元221、计算单元222和向量获取单元223;其中,临时私钥获取单元221用于根据系统参数a以及fB,采用公式yB=a·rB+fB∈Rq,获取临时私钥yB;计算单元222用于根据所述第二用户设备对应的临时公钥xA,所述第一用户设备对应的临时私钥yB,所述会话密钥协商装置对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;向量获取单元223用于根据所述会话密钥协商装置对应的长期私钥sB,所述d和e,以及所述第二用户设备对应的长期公钥PA和临时私钥xA,采用公式σB=g·(xA+d·PA)·(rB+e·sB)∈Rq,获取σB
其中,
Figure PCTCN2017070797-appb-000083
rB←χ;fB←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000084
的剩余环Rq上;m为正整数。
本实施例的装置,可以用于执行图2所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
图11为本发明会话密钥协商装置实施例三的结构示意图,如图11所示,本实施例的装置在图10所示装置结构的基础上,进一步地,该装置还可以包括:长期公钥获取模块31和第二计算模块32;其中,长期公钥获取模块31用于根据s1和e1,采用公式PB=a·s1+e1∈Rq,获取所述会话密钥协商装置对应的长期公钥PB;所述收发模块21还用于向认证中心发送携带有所述长期公钥PB的注册请求,以供所述认证中心根据所述注册请求,在验证所述长期公钥PB时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述会话密钥协商装置;第二计算模块32用于根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w;所述收发模块21还用于将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述会话密钥协商装置发送第一证书CertB,以证明会话密钥协商装置拥有所述长期公钥PB;其中,s1,e1←χ;s,e,e'←χ。
进一步的,收发模块21还用于将所述会话密钥协商装置的长期公钥PB,临时私钥yB和所述信号量vB发送给所述第二用户设备,以供所述第二用户设备在预设误差范围内,根据长期公钥PB,临时私钥yB和所述信号量vB,以及所述第二用户设备对 应的长期私钥sA和临时私钥xA,获取所述会话密钥K;
其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000085
本实施例的装置,可以用于执行图3所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
图12为本发明会话密钥协商装置实施例四的结构示意图,如图12所示,该装置包括:收发模块41、向量获取模块42和会话密钥获取模块43;其中,收发模块41用于接收与所述会话密钥协商装置会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB;向量获取模块42用于根据所述长期公钥PB和临时私钥yB,以及所述会话密钥协商装置对应的长期私钥sA和临时私钥xA,计算获取向量σA;会话密钥获取模块43用于在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式K=rec(σA,vB),获取所述会话密钥协商装置对应的会话密钥K;
其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000086
q为偶数,且不等于2。
本实施例的装置,可以为第二用户设备,且用于执行图6所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
图13为本发明会话密钥协商装置实施例五的结构示意图,如图13所示,在上述图12所示实施例的基础上,该向量获取模块42包括:临时私钥获取单元421、计算单元422以及向量获取单元423;其中,临时私钥获取单元421用于根据系统参数a以及fA,采用公式xA=a·rA+fA∈Rq,获取所述临时私钥xA;计算单元422用于根据所述第一用户设备对应的临时私钥xA,所述临时私钥yB,所述第一用户设备对应的身份信息B,以及所述会话密钥协商装置对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;向量获取单元423用于根据所述会话密钥协商装置对应的长期私钥sA,所述d和e,以及所述第一用户设备对应的长期公钥PB和临时私钥yB,采用公式σA=g·(yB+d·PB)·(rA+e·sA)∈Rq,获取向量σA;其中,
Figure PCTCN2017070797-appb-000087
rA←χ;fA←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
Figure PCTCN2017070797-appb-000088
的剩余环Rq上;m为正整数。
本实施例的装置,可以用于执行图7所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
图14为本发明会话密钥协商装置实施例六的结构示意图,如图14所示,在上述图13所示实施例的基础上,进一步的,该装置还可以包括:长期公钥获取模块51和计算模块52;其中,长期公钥获取模块51用于根据s1和e1,采用公式PA=a·s1+e1∈Rq,获取所述第一用户设备对应的长期公钥PA;所述收发模块41还用于向认证中心发送携带有所述长期公钥PA的注册请求,以供所述认证中心根据所述注册请求,在验证所述PA≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述会话密钥协商装置;计算模块52用于根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w;所述收发模块41还用于将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述会话密钥协商装置发送第二证书CertA,以证明会话密钥协商装置拥有所述长期公钥PA;其中,s1,e1←χ;s,e,e'←χ。
本实施例的装置,可以用于执行图8所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明还提供了一种会话密钥协商系统,该系统包括第一用户设备以及与该第一用户设备会话协商的第二用户设备;其中,第一用户设备用于执行图1至图3任一所示方法实施例的技术方案,第二用户设备用于执行图6至图8任一所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明还提供了一种会话密钥协商装置,该装置包括处理器、存储器、以及通信接口,所述存储器用于存储可执行程序代码,其中,所述处理器通过读取所述存储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序;
所述通信接口接收与所述会话密钥协商装置会话协商的第二用户设备对应的长期公钥PA和临时公钥xA
所述处理器根据所述会话密钥协商装置对应的长期私钥sB和临时私钥yB,以及所述长期公钥PA和临时公钥xA,获取向量σB;根据所述向量σB,采用公式
Figure PCTCN2017070797-appb-000089
获取
Figure PCTCN2017070797-appb-000090
根据所述
Figure PCTCN2017070797-appb-000091
采用公式
Figure PCTCN2017070797-appb-000092
获取信号量vB;根据所述信号量vB,采用公式
Figure PCTCN2017070797-appb-000093
获取会话密钥K;其中,q为偶数,且不等于2。
在本实施例中,该会话密钥协商装置为第一用户设备,且用于执行图1至图3任一所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
本发明还提供了一种会话密钥协商装置,该装置包括处理器、存储器、以及通信接口,所述存储器用于存储可执行程序代码,其中,所述处理器通过读取所述存 储器中存储的可执行程序代码来运行与所述可执行程序代码对应的程序;
该通信接口接收与所述会话密钥协商装置会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB
该处理器根据所述长期公钥PB和临时私钥yB,以及所述会话密钥协商装置对应的长期私钥sA和临时私钥xA,获取向量σA;在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式K=rec(σA,vB),获取所述会话密钥协商装置对应的会话密钥K;其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000094
q为偶数,且不等于2。
在本实施例中,该会话密钥协商装置为第二用户设备,且用于执行图6至图8任一所示方法实施例的技术方案,其实现原理和技术效果类似,此处不再赘述。
图15为本发明实施例提供的一种用户设备的结构示意图,本发明实施例提供的用户设备可以用于实施上述图3-图8所示的本发明各实施例实现的方法,为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照图3-图8所示的本发明各实施例。
该用户设备可以为手机、平板电脑、笔记本电脑、UMPC(Ultra-mobile Personal Computer,超级移动个人计算机)、上网本、PDA(Personal Digital Assistant,个人数字助理)等终端设备,本发明实施例以用户设备为手机为例进行说明,图15示出的是与本发明各实施例相关的手机1500的部分结构的框图。
如图15所示,手机1500包括:RF(radio frequency,射频)电路1520、存储器1530、输入单元1540、显示单元1550、重力传感器1560、音频电路1570、处理器1580、以及电源1590等部件。本领域技术人员可以理解,图15中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
下面结合图15对手机1500的各个构成部件进行具体的介绍:
RF电路1520可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1580处理;另外,将上行的数据发送给基站。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、LNA(low noise amplifier,低噪声放大器)、双工器等。此外,RF电路1520还可以通过无线通信与网络和其他设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile Communication;简称:GSM)、通用分组无线服务(General Packet Radio Service;简称:GPRS)、码分多址(Code Division Multiple Access;简称:CDMA)、宽带码分多址(Wideband Code Division Multiple Access;简称:WCDMA)、长期演进(Long Term Evolution;简称:LTE)、电子邮件、短消息服务(Short Messaging Service;简称:SMS)等。
存储器1530可用于存储软件程序以及模块,处理器1580通过运行存储在存储器1530的软件程序以及模块,从而执行手机1500的各种功能应用以及数据处理。存储器1530可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、 至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机1500的使用所创建的数据(比如音频数据、图像数据、电话本等)等。此外,存储器1530可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元1540可用于接收输入的数字或字符信息,以及产生与手机1500的用户设置以及功能控制有关的键信号输入。具体地,输入单元1540可包括触摸屏1541以及其他输入设备1542。触摸屏1541,也称为触控面板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触摸屏1541上或在触摸屏1541附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触摸屏1541可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1580,并能接收处理器380发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触摸屏1541。除了触摸屏1541,输入单元1540还可以包括其他输入设备1542。具体地,其他输入设备1542可以包括但不限于物理键盘、功能键(比如音量控制按键、电源开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元1550可用于显示由用户输入的信息或提供给用户的信息以及手机1500的各种菜单。显示单元1550可包括显示面板351,可选的,可以采用液晶显示器(Liquid Crystal Display;简称:LCD)、有机发光二极管(Organic Light-Emitting Diode;简称:OLED)等形式来配置显示面板1541。进一步的,触摸屏1541可覆盖显示面板1551,当触摸屏1541检测到在其上或附近的触摸操作后,传送给处理器1580以确定触摸事件的类型,随后处理器1580根据触摸事件的类型在显示面板1551上提供相应的视觉输出。虽然在图15中,触摸屏1541与显示面板1551是作为两个独立的部件来实现手机1500的输入和输入功能,但是在某些实施例中,可以将触摸屏1541与显示面板1551集成而实现手机1500的输入和输出功能。
重力传感器(gravity sensor)1560,可以检测手机在各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等。
手机1500还可以包括其它传感器,比如光传感器。具体地,光传感器可包括环境光传感器及接近光传感器。其中,环境光传感器可根据环境光线的明暗来调节显示面板1541的亮度;接近光传感器可以检测是否有物体靠近或接触手机,可在手机1500移动到耳边时,关闭显示面板1541和/或背光。手机1500还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路1570、扬声器1571、麦克风1572可提供用户与手机1500之间的音频接口。音频电路1570可将接收到的音频数据转换后的电信号,传输到扬声器1571,由扬声器1571转换为声音信号输出;另一方面,麦克风1572将收集的声音信号转换为电信号,由音频电路1570接收后转换为音频数据,再将音频数据输出至RF电路 1520以发送给比如另一手机,或者将音频数据输出至存储器1530以便进一步处理。
处理器1580是手机1500的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1530内的软件程序和/或模块,以及调用存储在存储器1530内的数据,执行手机1500的各种功能和处理数据,从而对手机进行整体监控。可选的,处理器1580可包括一个或多个处理单元;优选的,处理器1580可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器380中。
手机1500还包括给各个部件供电的电源1590(比如电池),优选的,电源可以通过电源管理系统与处理器1580逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,手机1500还可以包括无线保真(wireless fidelity;简称:WiFi)模块、蓝牙模块等,在此不再赘述。
在本发明实施例中,存储器1530还用于存储用于存储可执行程序代码。输入单元1540还用于接收与所述会话密钥协商装置会话协商的第二用户设备对应的长期公钥PA和临时公钥xA;处理器1580还用于根据所述会话密钥协商装置对应的长期私钥sB和临时私钥yB,以及所述长期公钥PA和临时公钥xA,获取向量σB;根据所述向量σB,采用公式
Figure PCTCN2017070797-appb-000095
获取
Figure PCTCN2017070797-appb-000096
根据所述
Figure PCTCN2017070797-appb-000097
采用公式
Figure PCTCN2017070797-appb-000098
获取信号量vB;根据所述信号量vB,采用公式
Figure PCTCN2017070797-appb-000099
获取会话密钥K;其中,q为偶数,且不等于2。
或者,在本发明实施例中,存储器1530还用于存储用于存储可执行程序代码。输入单元1540还用于接收与所述会话密钥协商装置会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB;该处理器1580还用于根据所述长期公钥PB和临时私钥yB,以及所述会话密钥协商装置对应的长期私钥sA和临时私钥xA,获取向量σA;在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式K=rec(σA,vB),获取所述会话密钥协商装置对应的会话密钥K;其中,所述预设误差范围为
Figure PCTCN2017070797-appb-000100
q为偶数,且不等于2。
本领域普通技术人员可以理解:实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一计算机可读取存储介质中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储介质包括:ROM、RAM、磁碟或者光盘等各种可以存储程序代码的介质。
最后应说明的是:以上各实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述各实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的范围。

Claims (15)

  1. 一种会话密钥协商方法,其特征在于,包括:
    第一用户设备接收与所述第一用户设备会话协商的第二用户设备对应的长期公钥PA和临时公钥xA
    所述第一用户设备根据所述第一用户设备对应的长期私钥sB和临时私钥yB,以及所述长期公钥PA和临时公钥xA,获取向量σB
    所述第一用户设备根据所述向量σB,采用公式
    Figure PCTCN2017070797-appb-100001
    获取
    Figure PCTCN2017070797-appb-100002
    所述第一用户设备根据所述
    Figure PCTCN2017070797-appb-100003
    采用公式
    Figure PCTCN2017070797-appb-100004
    获取信号量vB
    所述第一用户设备根据所述信号量vB,采用公式
    Figure PCTCN2017070797-appb-100005
    获取会话密钥K;
    其中,q为偶数,且不等于2。
  2. 根据权利要求1所述的方法,其特征在于,所述第一用户设备根据所述第一用户设备对应的长期私钥sB和临时私钥yB,以及所述长期公钥PA和临时公钥xA,获取向量σB,包括:
    所述第一用户设备根据系统参数a以及fB,采用公式yB=a·rB+fB∈Rq,获取临时私钥yB
    所述第一用户设备根据所述第二用户设备对应的临时公钥xA,所述第一用户设备对应的临时私钥yB,所述第一用户设备对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
    所述第一用户设备根据所述第一用户设备对应的长期私钥sB,所述d和e,以及所述第二用户设备对应的长期公钥PA和临时私钥xA,采用公式σB=g·(xA+d·PA)·(rB+e·sB)∈Rq,获取σB
    其中,
    Figure PCTCN2017070797-appb-100006
    rB←χ;fB←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
    Figure PCTCN2017070797-appb-100007
    的剩余环Rq上;m为正整数。
  3. 根据权利要求1或2所述的方法,其特征在于,还包括:
    所述第一用户设备根据s1和e1,采用公式PB=a·s1+e1∈Rq,获取所述第一用户设备对应的长期公钥PB
    所述第一用户设备向认证中心发送携带有所述长期公钥PB的注册请求,以供所述认证中心根据所述注册请求,在验证所述长期公钥PB≠0时,根据s、e和e',采 用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述第一用户设备;
    所述第一用户设备根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w,并将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述第一用户设备发送第一证书CertB,以证明第一用户设备拥有所述长期公钥PB
    其中,s1,e1←χ;s,e,e'←χ。
  4. 根据权利要求1至3任一所述的方法,其特征在于,还包括:
    所述第一用户设备将所述第一用户设备的长期公钥PB,临时私钥yB和所述信号量vB发送给所述第二用户设备,以供所述第二用户设备在预设误差范围内,根据长期公钥PB,临时私钥yB和所述信号量vB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,获取所述会话密钥K;
    其中,所述预设误差范围为
    Figure PCTCN2017070797-appb-100008
  5. 一种会话密钥协商方法,其特征在于,包括:
    第二用户设备接收与所述第二用户设备会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB
    所述第二用户设备根据所述长期公钥PB和临时私钥yB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,获取向量σA
    所述第二用户设备在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式K=rec(σA,vB),获取所述第二用户设备对应的会话密钥K;
    其中,所述预设误差范围为
    Figure PCTCN2017070797-appb-100009
    q为偶数,且不等于2。
  6. 根据权利要求5所述的方法,其特征在于,所述第二用户设备根据所述长期公钥PB和临时私钥yB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,计算获取向量σA,包括:
    所述第二用户设备根据系统参数a以及fA,采用公式xA=a·rA+fA∈Rq,获取所述临时私钥xA
    所述第二用户设备根据所述第一用户设备对应的临时私钥xA,所述临时私钥yB,所述第一用户设备对应的身份信息B,以及所述第二用户设备对应的身份信息 A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
    所述第二用户设备根据所述第二用户设备对应的长期私钥sA,所述d和e,以及所述第一用户设备对应的长期公钥PB和临时私钥yB,采用公式σA=g·(yB+d·PB)·(rA+e·sA)∈Rq,获取向量σA
    其中,
    Figure PCTCN2017070797-appb-100010
    rA←χ;fA←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
    Figure PCTCN2017070797-appb-100011
    的剩余环Rq上;m为正整数。
  7. 根据权利要求5或6所述的方法,其特征在于,还包括:
    所述第二用户设备根据s1和e1,采用公式PA=a·s1+e1∈Rq,获取所述第一用户设备对应的长期公钥PA
    所述第二用户设备向认证中心发送携带有所述长期公钥PA的注册请求,以供所述认证中心根据所述注册请求,验证所述PA≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述第二用户设备;
    所述第二用户设备根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w,并将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述第二用户设备发送第二证书CertA,以证明第二用户设备拥有所述长期公钥PA
    其中,s1,e1←χ;s,e,e'←χ。
  8. 一种会话密钥协商装置,其特征在于,包括:
    收发模块,用于接收与会话密钥协商装置会话协商的第二用户设备对应的长期公钥PA和临时公钥xA
    向量获取模块,用于根据所述会话密钥协商装置对应的长期私钥sB和临时私钥yB,以及根据所述长期公钥PA和临时公钥xA,获取向量σB
    第一计算模块,用于根据所述向量σB,采用公式
    Figure PCTCN2017070797-appb-100012
    获取
    Figure PCTCN2017070797-appb-100013
    信号量获取模块,用于根据所述
    Figure PCTCN2017070797-appb-100014
    采用公式
    Figure PCTCN2017070797-appb-100015
    获取信号量vB
    会话密钥获取模块,用于根据所述信号量vB,采用公式
    Figure PCTCN2017070797-appb-100016
    获取会话密钥K;
    其中,q为偶数,且不等于2。
  9. 根据权利要求8所述的装置,其特征在于,所述向量获取模块具体包括:
    临时私钥获取单元,用于根据系统参数a以及fB,采用公式yB=a·rB+fB∈Rq,获取临时私钥yB
    计算单元,用于根据所述第二用户设备对应的临时公钥xA,所述第一用户设备对应的临时私钥yB,所述第一用户设备对应的身份信息B,以及所述第二用户设备对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
    向量获取单元,用于根据所述会话密钥协商装置对应的长期私钥sB,所述d和e,以及所述第二用户设备对应的长期公钥PA和临时私钥xA,采用公式σB=g·(xA+d·PA)·(rB+e·sB)∈Rq,获取σB
    其中,
    Figure PCTCN2017070797-appb-100017
    rB←χ;fB←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
    Figure PCTCN2017070797-appb-100018
    的剩余环Rq上;m为正整数。
  10. 根据权利要求8或9所述的装置,其特征在于,还包括:
    长期公钥获取模块,用于根据s1和e1,采用公式PB=a·s1+e1∈Rq,获取所述会话密钥协商装置对应的长期公钥PB
    所述收发模块还用于向认证中心发送携带有所述长期公钥PB的注册请求,以供所述认证中心根据所述注册请求,在验证所述长期公钥PB≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述会话密钥协商装置;
    第二计算模块,用于根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和w=rec(u,<v>2),获取w;
    所述收发模块还用于将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述会话密钥协商装置发送第一证书CertB,以证明会话密钥协商装置拥有所述长期公钥PB
    其中,s1,e1←χ;s,e,e'←χ。
  11. 根据权利要求8所述的装置,其特征在于,所述收发模块还用于将所述会话密钥协商装置的长期公钥PB,临时私钥yB和所述信号量vB发送给所述第二用户设备,以供所述第二用户设备在预设误差范围内,根据长期公钥PB,临时私钥yB和所述信号量vB,以及所述第二用户设备对应的长期私钥sA和临时私钥xA,获取所述会话密钥K;
    其中,所述预设误差范围为
    Figure PCTCN2017070797-appb-100019
  12. 一种会话密钥协商装置,其特征在于,包括:
    收发模块,用于接收与所述会话密钥协商装置会话协商的第一用户设备发送的所述第一用户设备的长期公钥PB,信号量vB和临时私钥yB
    向量获取模块,用于根据所述长期公钥PB和临时私钥yB,以及所述会话密钥协商装置对应的长期私钥sA和临时私钥xA,获取向量σA
    会话密钥获取模块,用于在所述预设误差范围内,根据所述向量σA和信号量vB,采用公式K=rec(σA,vB),获取所述会话密钥协商装置对应的会话密钥K;
    其中,所述预设误差范围为
    Figure PCTCN2017070797-appb-100020
    q为偶数,且不等于2。
  13. 根据权利要求12所述的装置,其特征在于,所述向量获取模块包括:
    临时私钥获取单元,用于根据系统参数a以及fA,采用公式xA=a·rA+fA∈Rq,获取所述临时私钥xA
    计算单元,用于根据所述第一用户设备对应的长期公钥PB和临时私钥xA,所述临时私钥yB,所述第一用户设备对应的身份信息B,以及所述会话密钥协商装置对应的身份信息A,采用公式d=H(xA,B)和e=H(yB,A),分别获取d和e;
    向量获取单元,用于根据所述会话密钥协商装置对应的长期私钥sA,所述d和e,以及所述第一用户设备对应的长期公钥PB和临时私钥yB,采用公式σA=g·(yB+d·PB)·(rA+e·sA)∈Rq,获取向量σA
    其中,
    Figure PCTCN2017070797-appb-100021
    rA←χ;fA←χ;g为系统参数,且g∈R;R为分圆代数整数环,且
    Figure PCTCN2017070797-appb-100022
    的剩余环Rq上;m为正整数。
  14. 根据权利要求12或13所述的装置,其特征在于,还包括:
    长期公钥获取模块,用于根据s1和e1,采用公式PA=a·s1+e1∈Rq,获取所述第一用户设备对应的长期公钥PA
    所述收发模块还用于向认证中心发送携带有所述长期公钥PA的注册请求,以供所述认证中心根据所述注册请求,在验证所述PA≠0时,根据s、e和e',采用公式bc=a·s+e以及v=g·b·s+e',获取bc、[v]2和<v>2,并将所述bc和<v>2返回给所述会话密钥协商装置;
    计算模块,用于根据接收到的所述bc和<v>2,采用公式u=g·bc·s1和 w=rec(u,<v>2),获取w;
    所述收发模块还用于将所述w发送给所述认证中心,以供所述认证中心在验证w=[v]2成立时,向所述会话密钥协商装置发送第二证书CertA,以证明会话密钥协商装置拥有所述长期公钥PA
    其中,s1,e1←χ;s,e,e'←χ。
  15. 一种会话密钥协商系统,其特征在于,包括:第一用户设备以及与所述第一用户设备会话协商的第二用户设备;
    其中,所述第一用户设备为如权利要求8至11任一所述的会话密钥协商装置;所述第二用户设备为如权利要求12至14任一所述的会话密钥协商装置。
PCT/CN2017/070797 2016-02-04 2017-01-10 会话密钥协商的方法、装置和系统 WO2017133411A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP17746731.3A EP3404868A4 (en) 2016-02-04 2017-01-10 METHOD, DEVICE AND SYSTEM FOR NEGOTIATING SESSION KEYS
US16/055,660 US20180351736A1 (en) 2016-02-04 2018-08-06 Session Key Negotiation Method, Apparatus, and System

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610079672.5 2016-02-04
CN201610079672.5A CN107040367B (zh) 2016-02-04 2016-02-04 会话密钥协商的方法、装置和系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/055,660 Continuation US20180351736A1 (en) 2016-02-04 2018-08-06 Session Key Negotiation Method, Apparatus, and System

Publications (1)

Publication Number Publication Date
WO2017133411A1 true WO2017133411A1 (zh) 2017-08-10

Family

ID=59499284

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/070797 WO2017133411A1 (zh) 2016-02-04 2017-01-10 会话密钥协商的方法、装置和系统

Country Status (4)

Country Link
US (1) US20180351736A1 (zh)
EP (1) EP3404868A4 (zh)
CN (1) CN107040367B (zh)
WO (1) WO2017133411A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896147A (zh) * 2017-12-07 2018-04-10 福建联迪商用设备有限公司 一种基于国密算法协商临时会话密钥的方法及其系统

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110191469B (zh) * 2019-06-19 2020-05-12 西南交通大学 一种基于证书的无线体域网群组认证与密钥协商方法
CN113852459B (zh) * 2021-08-13 2024-03-19 中央财经大学 密钥协商方法、设备及计算机可读存储介质

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889433A (zh) * 2006-07-20 2007-01-03 上海交通大学 基于隐式公钥证书的双方认证密钥协商方法及系统
CN101521881A (zh) * 2009-03-24 2009-09-02 刘建 一种无线局域网接入方法及系统
WO2009135444A1 (zh) * 2008-05-09 2009-11-12 西安西电捷通无线网络通信有限公司 一种密钥分配方法、终端设备及密钥分配中心
EP2120389A1 (en) * 2007-03-21 2009-11-18 Huawei Technologies Co., Ltd. A method, system and communication device for generating session cryptographic
CN101582906A (zh) * 2009-06-23 2009-11-18 中国人民解放军信息工程大学 密钥协商方法和装置
US20110103589A1 (en) * 2008-05-29 2011-05-05 China Iwncomm Co., Ltd. Key distributing method, public key of key distribution centre online updating method and device
EP2334008A1 (en) * 2009-12-10 2011-06-15 Tata Consultancy Services Limited A system and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN105119885A (zh) * 2015-07-10 2015-12-02 重庆理工大学 标准模型下安全的高效单轮三方密钥交换方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1175615C (zh) * 1996-06-05 2004-11-10 西门子公司 在第一计算机单元和第二计算机单元之间协定安全策略的方法
US20020041684A1 (en) * 1999-01-29 2002-04-11 Mototsugu Nishioka Public-key encryption and key-sharing methods
US20010031050A1 (en) * 2000-02-14 2001-10-18 Lateca Computer Inc. N.V. Key generator
US7181015B2 (en) * 2001-07-31 2007-02-20 Mcafee, Inc. Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique
US7317799B2 (en) * 2002-07-19 2008-01-08 Vadium Technology, Inc. Cryptographic key distribution using key folding
US20040111601A1 (en) * 2002-12-06 2004-06-10 Nokia Corporation System and method for the exchange of cryptographic keys
US20060218636A1 (en) * 2005-03-24 2006-09-28 David Chaum Distributed communication security systems
WO2014059136A2 (en) * 2012-10-12 2014-04-17 Safelylocked, Llc. Techniqued for secure data exchange

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1889433A (zh) * 2006-07-20 2007-01-03 上海交通大学 基于隐式公钥证书的双方认证密钥协商方法及系统
EP2120389A1 (en) * 2007-03-21 2009-11-18 Huawei Technologies Co., Ltd. A method, system and communication device for generating session cryptographic
WO2009135444A1 (zh) * 2008-05-09 2009-11-12 西安西电捷通无线网络通信有限公司 一种密钥分配方法、终端设备及密钥分配中心
US20110103589A1 (en) * 2008-05-29 2011-05-05 China Iwncomm Co., Ltd. Key distributing method, public key of key distribution centre online updating method and device
CN101521881A (zh) * 2009-03-24 2009-09-02 刘建 一种无线局域网接入方法及系统
CN101582906A (zh) * 2009-06-23 2009-11-18 中国人民解放军信息工程大学 密钥协商方法和装置
EP2334008A1 (en) * 2009-12-10 2011-06-15 Tata Consultancy Services Limited A system and method for designing secure client-server communication protocols based on certificateless public key infrastructure
CN105119885A (zh) * 2015-07-10 2015-12-02 重庆理工大学 标准模型下安全的高效单轮三方密钥交换方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3404868A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107896147A (zh) * 2017-12-07 2018-04-10 福建联迪商用设备有限公司 一种基于国密算法协商临时会话密钥的方法及其系统
CN107896147B (zh) * 2017-12-07 2020-07-28 福建联迪商用设备有限公司 一种基于国密算法协商临时会话密钥的方法及其系统

Also Published As

Publication number Publication date
US20180351736A1 (en) 2018-12-06
EP3404868A4 (en) 2019-01-16
CN107040367B (zh) 2020-11-20
EP3404868A1 (en) 2018-11-21
CN107040367A (zh) 2017-08-11

Similar Documents

Publication Publication Date Title
EP3605989A1 (en) Information sending method, information receiving method, apparatus, and system
US20200329375A1 (en) System and methods for uicc?based secure communication
WO2017118412A1 (zh) 一种更新密钥的方法、装置和系统
KR102024331B1 (ko) 메시지 보호 방법, 관련 장치 및 시스템
WO2017185711A1 (zh) 控制智能设备的方法、装置、系统和存储介质
KR101693130B1 (ko) 정보 인터랙션 방법 및 디바이스
US10733284B2 (en) Trusted execution environment secure element communication
WO2017041599A1 (zh) 业务处理方法及电子设备
CN110611905A (zh) 信息共享方法、终端设备、存储介质及计算机程序产品
KR20180041532A (ko) 전자 장치들 간 연결 방법 및 장치
WO2015027712A1 (zh) 移动终端连接网络的方法、移动终端与终端设备
CN107483213B (zh) 一种安全认证的方法、相关装置及系统
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
WO2016078504A1 (zh) 身份鉴权方法和装置
WO2016192511A1 (zh) 远程删除信息的方法和装置
WO2017133411A1 (zh) 会话密钥协商的方法、装置和系统
JP2015194947A (ja) 情報処理装置及びコンピュータプログラム
CN110572268B (zh) 一种匿名认证方法和装置
WO2016106774A1 (zh) 一种图案锁的解锁方法及终端
US9949122B2 (en) Challenge-response-test image to phone for secure pairing
CN113852459B (zh) 密钥协商方法、设备及计算机可读存储介质
TWI633800B (zh) 手持通訊裝置之裝置配對與資料傳輸之方法
CN108880787A (zh) 一种信息密钥的处理方法及相关设备
WO2015041139A1 (ja) 情報処理装置、情報処理方法及びコンピュータプログラム
CN106603596B (zh) 一种数值转移的方法、装置及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17746731

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2017746731

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2017746731

Country of ref document: EP

Effective date: 20180814