Anonymous authentication method and system

An anonymous authentication and authentication information technology, applied in the field of information security, can solve the problems of not meeting the need to protect the authenticator's private information, user privacy leakage, etc.

Inactive Publication Date: 2010-10-20
BEIJING JIAOTONG UNIV
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, traditional authentication techniques cannot meet the need to protect the authenticator's private information
For example, when a user performs security authentication, the verifier often obtains the user's identity information; the verifier has the ability to pass the user's authentication information to a third party, resulting in leakage of user privacy; the user's authentication information is recorded and tracked, etc.
If only from the perspective of privacy protection, allowing users to access completely anonymously will lead to many illegal problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous authentication method and system
  • Anonymous authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

specific example

[0126] Taking the electronic ticket reservation system as an example to illustrate the specific implementation of the present invention, the various entities involved in the electronic ticket reservation system: users (equivalent to clients), ticketing institutions (equivalent to service providing devices), banks (equivalent to certification body);

[0127] 1) The user sends the booking information to the ticketing agency;

[0128] 2) The ticketing agency verifies the integrity of the booking information, signs the booking information, and sends the random value generated in the signature to the user;

[0129] 3) The user uses the chameleon hash function in the aforementioned method to generate a message digest of the user's bank account information, user public key and random number, and sends the message digest to the ticketing agency;

[0130] For example, set user bank account information m 2 , the user randomly selects calculate r U = r M g t , let m=m 2 ||r U , ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous authentication method and an anonymous authentication system. The method comprises the following steps that: a client generates blind identity information according to the identity information of the client per se and sends the blind identity information to a service provider; the client receives first authentication information generated after the service provider signs the blind identity information; the client generates blind service request information according to the service request information of the client to the service provider and sends the blind service request information to an authentication institution; the client receives second authentication information generated after the authentication institution signs the blind service request; and the client sends the service request information and the second authentication information to the service provider, and receives service content information provided according to the service request information after the service provider authenticates and passes the second authentication information. The scheme can realize authentication with a privacy protection function and anonymous authentication is controllable.

Description

technical field [0001] The present invention relates to the field of information security, in particular to an anonymous authentication method and system. Background technique [0002] In the real world and in cyberspace, everyone needs and owns a large amount of accounts and data, which may contain sensitive personal data, such as patient health data, employee data, credit card data, and information generated by users using the Internet, such as in newsgroups Posts in the website, e-mails sent, web pages visited, account information of online payments, etc. These sensitive data will play an increasingly important role in future network services and public security. However, such important information may be monitored, recorded or stolen by unauthorized third parties. For example, phishing attacks appearing on the Internet, that is, using fake financial websites or spyware to trick users into providing personal information such as personal accounts and passwords, credit ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 李勇刘云
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products