Cross-certification method based on seed key management

A cross-certification, key management center technology, applied in the field of public key cryptography and authentication, can solve the problems of complex and complex social application requirements, difficult to support, etc., achieve a concise architecture, ensure authenticity and security, and trust relationship. clear effect

Active Publication Date: 2009-07-22
北京联合智华微电子科技有限公司
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Although the above trust model fully considers various situations in practical applications, it is very complicated to implement. In addition to the original problems of the PKI system itself, it is obviously difficult to support large-scale social application requirements with complex trust relationships.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-certification method based on seed key management
  • Cross-certification method based on seed key management
  • Cross-certification method based on seed key management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The cross-authentication method proposed by the present invention is formed by increasing the management of the seed public key on the basis of the CPK and TF-CPK systems. In view of the fact that the user's public key in the TF-CPK system is composed of two independent public keys—the identification public key and the random public key, the modification of the TF-CPK in the present invention is limited to the generation of the random public key and the two-factor composite public key part.

[0045] The following levels are set here:

[0046] 1) Certification management organization (cross-certification management department), which is equivalent to the root CA in the PKI hierarchical certification system;

[0047] 2) The trust domain management department (key management center) is specifically responsible for the management of the trust domain, and can also establish bilateral and multilateral cross-certification relationships with other key management centers by its...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a cipher system suitable for combined public key (CPK) and two factor-combined public key (TF-CPK), a method for implementing direct cross authentication based on seed cipher key management, wherein, a seed cipher keys in each trust domain comprises a seed secret key (seedSK) and a seed public key (seedPK), and is a combined public key (CPK) comprising a calculation base of identification cipher key generated by the TF-CPK cipher system. The different trust domain and management domain can be composed of different seed cipher keys. According to the public characteristic of the seed public key, the seed public keys of each part by cross authentication can be constructed into a seed public key set according to the specific standard format, the ciphering part or the verification part can be selected according to the identification, thereby implementing the direct cross authentications between users of the units with independent management domain and trust domain with each other, departments, areas and even countries.

Description

technical field [0001] The invention relates to the field of public key cryptography and authentication, in particular to a cross-authentication method based on seed key management. Background technique [0002] The authentication system is mainly used to provide authenticity proof and security guarantee, and is the technical basis for realizing information security (Information Security) and information assurance (Information Assurance). The core of the authentication system is public key cryptography. Around the construction of the authentication system, two technical systems have been formed: one is a certificate authentication system based on traditional public key cryptography represented by public key infrastructure (PKI), and the other is based on An identity-based authentication system represented by combined public key (CPK) and two-factor combined public key (TF-CPK). [0003] The core of the PKI certification system is the certification authority (CA) and public ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06
Inventor 赵建国赵捷
Owner 北京联合智华微电子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products