Cryptographic key generation method and system based on identity

A key generation and key generator technology, applied in the direction of user identity/authority verification, etc., can solve the problems of key escrow, loss of identity authentication, etc., to prevent impersonation attacks, remove dependencies, and protect privacy.

Inactive Publication Date: 2009-09-16
SHANGHAI JIAO TONG UNIV +1
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This creates two corresponding problems: one is the key escrow problem
Since PKG has the user's private key, PKG can not only decrypt any user's file, but also impersonate any user to sign, so that the identity authentication in this system is not guaranteed.
Second, the issue of secure channels
So the key escrow problem remains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic key generation method and system based on identity
  • Cryptographic key generation method and system based on identity
  • Cryptographic key generation method and system based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The present invention will be further described below with reference to the accompanying drawings and examples, but it is not intended to limit the present invention.

[0044] The present invention combines three technologies: blinding technology, multi-party authorization mechanism and password-based authentication mechanism, wherein the function of blinding is to remove the dependence on the secure channel, and the function of multi-party authorization mechanism is to overcome the impact of a separate key generator on the user. The role of private key escrow based on password authentication mechanism is to prevent attackers from impersonating users or a certain key generator.

[0045] The scheme of the present invention is specifically as follows:

[0046] see figure 1, the present invention provides a method for generating an identity-based key, the method steps are as follows:

[0047] Step A: Set system parameters; the specific implementation steps are as follows...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity-based key generation method and system. It involves computer communication and e-commerce application fields. In order to solve the problems of key escrow and unreliable security channels in the prior art, the present invention provides an identity-based key generation method, which includes setting system parameters, generating user information, and generating initial keys , steps to verify initial key, generate hardened key, and generate user key. The present invention also provides an identity-based key generation system, which includes a module for setting system parameters, a module for generating user information, a module for generating an initial key, a module for verifying an initial key, a module for generating a strengthened key, and a module for generating user information. key module. The technical scheme of the invention solves the problem of dependence on the safe channel and key trusteeship, and effectively prevents various impersonation attacks.

Description

technical field [0001] The invention relates to the application fields of computer communication and e-commerce, in particular to an identity-based key generation method and system. Background technique [0002] In 1984, Shamir proposed an identity-based cryptosystem. Theoretically, identity-based cryptosystems and digital signature systems do not require an authentication center, and any character string can be used as the user's public key. Mailboxes, applications of various smart cards), as well as the troublesome problems of time limit, authority limitation, and authority recovery in ordinary password systems can be easily solved. [0003] Although Shamir gave an identity-based signature scheme in 1984, the first practical identity-based encryption system was not given until 2001 by Boneh and Franklin, and their scheme is referred to as IBE (Identity-based encryption, identity-based encryption system). The IBE scheme is implemented based on bilinear pairings built on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 曹珍富董晓蕾王励成郑志彬位继伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products