Multi-party secret handshaking method in short key environment

A secret handshake and key technology, applied in the field of information security cryptography, can solve the problems of ineffective protection of the privacy of participating users

Inactive Publication Date: 2010-12-08
BEIJING JIAOTONG UNIV
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method better overcomes the disadvantages that the existing multi-party SH relies on the public key infrastructure and the existing key exchange method based on short key authentication cannot effectively protect the privacy of participating users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party secret handshaking method in short key environment
  • Multi-party secret handshaking method in short key environment
  • Multi-party secret handshaking method in short key environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The multi-party secret handshake method under the short key environment provided by the present invention includes the following six stages: user anonymous authentication stage, key seed sending stage, server distribution stage, multi-party key exchange stage, session key generation stage, and multi-party interactive authentication stage . Such as figure 1 As shown, the specific steps are as follows:

[0019] 1. Start and initialize;

[0020] 2. The user authenticates anonymously and generates a server-oriented session key.

[0021] 3. The user sends the key seed with authentication to the server.

[0022] 4. The server sends the authenticated key seed to the user.

[0023] 5. The user broadcasts the newly calculated key seed on the channel.

[0024] 6. Each user generates a session key shared by multiple parties.

[0025] 7. The user uses the session key to complete interactive authentication.

[0026] In the method, when a user registers on the server, the serv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a multi-party secret handshaking method in short key environment, which belongs to the field of information security cryptology. The method comprises the following steps: (1) starting and initializing; (2) a user anonymously authenticates and generates a temporary conversation key shared with a server; (3) the user transmits a key seed with authentication to the server; (4) the server transmits a key seed with authentication to the user; (5) the user broadcasts a newly calculated key seed on the channel; (6) the users generate a multi-party shared conversation key; and (7) the users complete the interactive authentication by utilizing the conversation key. The method overcomes the defect that the prior multi-party secret handshaking method is dependent on the basic facilities of the public key, and the defect that the prior key exchanging method based on short key authentication can not effectively protect the privacy of the participating users. The invention realizes multi-party secret handshaking, effectively protects the privacy information, including identity and participation behavior of the participating users, and also realizes secure key exchange based on short key.

Description

technical field [0001] The invention belongs to the field of information security cryptography, relates to related technologies such as distributed systems, authentication services, and application systems such as system security, and specifically relates to a multi-party user authentication method based on a short key. Background technique [0002] Secret Handshakes ("SH" for short) are used to implement secret authentication between users. With the secret handshake method, one party's affiliation is only revealed to other parties who are affiliated with the same organization. Specifically, suppose that in a two-party situation, user A is a member of organization G1 and user B is a member of organization G2. They use the secret handshake method to ensure that: 1. Users A and B can mutually authenticate if and only if G1 =G2; 2. If G1≠G2, the information obtained by users A and B is only G1≠G2. At the same time, the secret handshake method can further guarantee the anonymi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 汪维家李勇刘云
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products