Generation method of composite public key

A technology of compound public key and generation method, which is applied in the direction of public key of secure communication, user identity/authority verification, digital transmission system, etc. Problems such as digital signatures cannot be realized to achieve the effect of ensuring privacy and exclusivity

Inactive Publication Date: 2009-01-07
BEIJING E HENXEN AUTHENTICATION TECH
View PDF5 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0024] In 1984, Shamir proposed the IBC algorithm, which belongs to the single-factor mechanism defined centrally. Implement identity-based key exchange
[0025] In 1996, PKI appeared, which is a self-defined single-factor mechanism. The digital signature meets the self-defined requirements. Under the condition of third-party certification, it can be used for identification authentication, but its key exchange must rely on LDAP, which cannot be exchanged. directness
[0026] In 2001, Dan Boneh and Matthew Franklin of the United States used Weil's group pair theory to construct IBE encryption based on identity, but digital signatures cannot be realized.
[0032] 2) The private key of the entity is generated by the management center, and the entity has no complete exclusivity or privacy for the private key;
[0033] 3) It is difficult to scientifically estimate the collision probability after hash function operation and the collision probability of different seed key combinations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method of composite public key
  • Generation method of composite public key
  • Generation method of composite public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0460] Embodiment 1 Entity ID Authentication

[0461] In the transaction, the entity-to-entity business relationship first occurs, which involves the authentication of entity identification and data authentication. If the data contains seals, such as legal person seals, account seals, bank seals, financial special seals, etc., then seals are also involved Identity certification.

[0462] The initiator of the transaction is the attesting party, who must provide proof of entity identity authenticity and data authenticity. The proof of entity authenticity is the signature of the entity identity on the identity itself, the data authenticity proof is the signature of the entity identity on the data (entity level / user level), and the proof of the authenticity of the seal is the signature of the seal identity on the seal itself (identity level). The proof of the authenticity of the seal is the signature (identity level) of the seal identity on the seal itself. If privacy is required...

Embodiment 2

[0470] Embodiment 2 Electronic bill authentication

[0471] See the applicant's prior application 200610081134.6 "A CPK-Based Trusted Authentication System and Method for Electronic Bills", the full text of which is hereby incorporated by reference.

[0472] In electronic bills, the proof and verification relationship is as follows:

[0473] Account number, name, unit, etc., three signatures are required, such as:

[0474] sign1=SIG 账号 (mac);

[0475] sign2=SIG 姓名 (mac);

[0476] sign3=SIG 单位 (mac);

[0477] Make the bill file and the signature section into one file, such as Figure 5 The ticket file shown.

[0478] The electronic bill is transmitted, and the verification system in the bank server verifies each digital signature.

[0479] Together with the digital signature, electronic bills can be stored in the database in the form of electronic documents, or printed out and turned into paper-based bills, all of which have the same effect as real bills.

Embodiment 3

[0480] Embodiment 3 Software Label Authentication

[0481] See the applicant's prior application 200610081133.1 "A Trusted Authentication System Based on CPK", the full text of which is hereby incorporated by reference.

[0482] The user's transaction is processed by computer, so there is a need for trusted computing. Trusted computing needs to solve three problems: one is whether the program should be loaded, the other is whether the program is loaded correctly, and the third is whether the program runs as expected. As the first gate of trusted computing, it is very important to judge whether the program should be loaded or not. This depends on the identification technology of the process identification. If it is an illegal identification, it will refuse to load. In this way, malicious software such as viruses cannot function even if they invade. Software identification authentication needs to rely on code signing (code signing) technology to solve.

[0483] As far as a ba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention constructs a novel compound public key CPK system on the basis of simple marked keys in a combined public key CPK system; wherein, digital signature keys are compounded by marked keys and random keys; the random keys are compounded with update keys; the three types of keys are compounded into the digital signature keys; key exchange keys are compounded by the marked keys and system keys; the system keys is compounded with annual keys; the three types of keys are compounded into the key exchange keys. The random keys and the system keys enhance the security of the marked keys, and the update keys and the annual keys provide convenience for the key exchange; the advantages and characteristics of the combined keys are reserved in the compound keys; a combination matrix which is taken as a trust root provides evidences for the integration of marks and keys without the proof from a third party. The compound public key system greatly enhances the security degree and permits the definition of the signature keys in the name of individual so as to be widely applied to the fields of trusted connection, code authentication, electronic banks, trusted transaction, trusted logistics, etc.

Description

technical field [0001] The invention relates to the fields of authentication algorithms and identification authentication, and more specifically relates to a compound public key generation method based on a combined public key. Background technique [0002] Information security mainly involves authentication techniques and data confidentiality. Authentication technology mainly relies on authentication protocols and digital signature algorithms. Data confidentiality relies on key exchange protocols. [0003] There is a digital signature requirement that the signature key is defined by an individual to ensure the privacy and exclusiveness of the signature key, and no one else, including the key management center, should have the same signature key. The key exchange is required to be uniformly defined by the key management center, and the handshake-free key exchange should be realized as much as possible to adapt to the store-and-forward networked packet communication, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/3247H04L9/083H04L9/3073H04L2209/56
Inventor 南相浩陈华平
Owner BEIJING E HENXEN AUTHENTICATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products