Method for authentication for resisting secrete data disclosure and key exchange based on passwords

A secret data and key exchange technology, applied in the field of cryptographic protocols, can solve the problems of endangering the security of the protocol, leaking, combining, etc., and achieve the effect of improving online computing efficiency, protecting privacy, and ensuring high efficiency

Inactive Publication Date: 2010-01-13
赵运磊 +3
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] (1). Digital signatures are used for identity authentication, so the privacy of users cannot be well protected;
[0017] (2). Moreover, because the verification and generation of digital signatures cannot be fully performed offline calculations in advance, the efficiency of online calculations is not good enough;
[0018] (3). Not compatible with key exchange protocols that do not use signatures
That is: the leakage of stored temporary secret data will jeopardize the security of other

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for authentication for resisting secrete data disclosure and key exchange based on passwords
  • Method for authentication for resisting secrete data disclosure and key exchange based on passwords
  • Method for authentication for resisting secrete data disclosure and key exchange based on passwords

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach

[0109] Password registration: user "B" can calculate and store B in advance -1 . When user "A" registers password w with user "B", user "B" calculates H(w, I A , I B ) and let β be H(w, I A , I B ) is a 32-bit prefix. User "B" calculates B -tbβ ∈ G′ and B tbβ ∈G′, delete β and make B -tbβ and / or B tbβ Stored in the entry for user "A" in the database.

[0110] Role marking: Suppose users "A" and "B" have exchanged two random numbers R during the parameter negotiation phase A and R B (and user "B"'s public key certificate), ie: user "A" sends R A , user "B" sends R B . Let the role of user "A" be denoted as: r A =R A ‖R B ; The role of user "B" is denoted as r B =R B ‖R A ; where "‖" is the string concatenation operator. R A The transmission of can be included in the following message sent by user "A" in ciphertext.

[0111] We give a specific implementation of the ECIES public key encryption algorithm based on standardization documents such as ANSI X9.63, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to a cryptographic protocol, and in particular relates to a method for authentication for resisting secrete data disclosure and key exchange based on passwords. The method is superior to correlative American or international current standard in the aspects of user password protection, secrete data disclosure resistance, better user privacy protection, better online efficiency calculation, less communication bandwidth and higher security. The method for the authentication and the key exchange comprises sub-methods of an innovative method for public key encryption and signcryption based on passwords, a method for knowledge binding certification, a method for resisting temporary secrete data disclosure, a method for awarding a public key certificate. The method has the advantages of good systematicness, adaptability and compatibility.

Description

technical field [0001] The invention belongs to a cryptographic protocol, and specifically relates to a password-based authentication and key exchange method against secret data leakage, a password-based public key encryption and secret signature method, knowledge binding proof and a method against temporary secret data leakage. Background technique [0002] System parameters: (G′, G, g, q), where G′ is a finite group of order N, G is a subgroup of order q in G′, and g is a generator of G, so that the definition on G The discrete logarithm problem is hard. Commonly used G′, the setting of G is as follows: G′ is Z p * = { 1,2 , · · · p - 1 } , p is a prime number, and q is divisible by (p-1), at this moment, the order of G' is N=p-1; or, G' is an elliptic curve defin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30
Inventor 赵运磊姚期智储枫丁素芬
Owner 赵运磊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products