Font Size: a A A

Research On Key Technologies Of Group Keyagreement

Posted on:2021-04-16Degree:MasterType:Thesis
Country:ChinaCandidate:B L WangFull Text:PDF
GTID:2428330626453881Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the rapid development of computer networks,the higher the degree of informatization,the more serious the challenges of information security issues.At the same time,the applicability of the protocol to different network environments is studied.This paper studies the needs and challenges faced by the group key negotiation mentioned above,and aims to solve the problems of secure information exchange and transmission between groups in different network environments.With the continuous prosperity of the Internet of Things economy,large-scale intelligent end users access the Internet of Things,people's information security is threatened to varying degrees.To ensure the security of information transmission and protect user privacy,in order to adapt to a large-scale network environment,more secure and efficient information transmission is required.The main work of this paper are as follows:(1)As there is no authentication center in the mobile ad hoc network,the computing power and communication distance of mobile terminals are restricted,and nodes frequently join and exit the network,a dynamic group key negotiation protocol based on blockchain is proposed,which combines Technical advantages of blockchain,such as decentralized authentication,distributed computing,traceability and accountability.The protocol implements anonymous identity authentication.The protocol uses a standard model combined with a random prediction model to analyze the correctness and security of the protocol to achieve better performance.(2)Aiming at the secure transmission of information between groups at different levels,a hierarchical group key agreement protocol based on identity authentication is proposed.This protocol is based on the realization of the lowest level asymmetric group key agreement,and carries out a higher level protocol.The protocol implements anonymous identity authentication;it is dynamic and can update the group key in real time to achieve the forward and backward security of the protocol.Under the assumption of bilinear computing Diffie-Hellman problem,the standard model is used to prove the security of the protocol,and an effective performance analysis is performed.(3)With the development of wireless mobile networks and the Internet of Things,an asymmetric group key agreement protocol based on attribute threshold is proposed for the security of users' secret information.The protocol aims to perform two-way authentication without exposing user privacy,while protecting the legitimacy of mobile terminal users participating in key negotiation,while protecting user privacy.The protocol design implements lightweight calculation and group key self-verification to ensure correctness.At the same time,under the assumption of bilinear calculation Diffie-Hellman problem,the standard model is used to prove the security of the protocol.Performance analysis further shows that the protocol has lower energy consumption in terms of communication and computing.
Keywords/Search Tags:Group key agreement, Identity authentication, Mutual authentication, Standard Model
PDF Full Text Request
Related items