Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification

A technology of user identification and public-private key pairs, applied in the field of communication network cryptography, can solve problems affecting public-private key pairs, collisions, etc.

Active Publication Date: 2009-06-03
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF0 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the identity mapping algorithm, the public-private key matrix should not be changed arbitrarily, because its

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification
  • Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification
  • Collision-resistance method for mapping public-private key pairs by utilizing uniform user identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] refer to Figure 1 to Figure 3 . figure 1 It is a principle working program diagram of an embodiment of IP address identification public-private key mapping in the present invention, figure 2 It is a principle working program diagram of an embodiment of MAC address identifier public-private key mapping in the present invention. In the present invention, the whole process of mapping from address to extended user ID, implementation of random factor mechanism, cyclic hash collision detection, public-private key mapping, identification public-private key collision detection, and final user public-private key pair generation is as follows: figure 1 , figure 2 shown. The present invention comprises steps:

[0022] ① Select the scale of the public-private key matrix according to the user scale, and the selection condition is that the matrix of m rows × h columns satisfies m h The public and private key generation requirements of each user; according to the scale of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a collision-resistance method for mapping public-private key pairs by utilizing a uniform user identification, relating to the technology of mapping public-private key pair through a user identification in a non-collision manner in the filed of communication network cryptology. The method uses an extensible uniform user identifier with the length of 56 bits to prevent collision of the user public-private key pairs with the assistance of a circle Hash collision algorithm and carries out identification mapping by row mapping and column permutation algorithm of Hash identification value so as to generate a great number of user public-private key pairs by a plurality of private key seeds. On the basis of not losing computational efficiency, the method improves the security and has the advantages of convenient usage and the like, and is particularly applied to public-private key pair mapping through identification by a large number of users in communication network as well as security certification and communication security by the public-private key pairs.

Description

technical field [0001] The invention relates to a collision-resistant unified user identification public-private key pair mapping method in the field of communication network cryptography, and is especially suitable for large-scale users in a communication network to map public-private key pairs through identification and perform security authentication and communication through public-private key pairs Confidential application. Background technique [0002] The previous public-private key identification mapping algorithm can only map a fixed public-private key pair to a given identification. Because both the hash function and the public-private key mapping algorithm used in it have a certain collision, the public-private key identification mapping algorithm also has a certain probability of collision probability. In the event of a public-private key pair collision, the collision must be eliminated by modifying the public-private key matrix. [0003] In the identity mappin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08H04L9/30H04L9/32
Inventor 吴巍郝卓妥艳君王浩张林杰王俊芳卢华斌窦军于红增赵海强罗春雷李大艳何晨泽王彦敏
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products