Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for authenticating zero knowledge proof

An authentication method and identity authentication technology, applied in the field of authentication devices, can solve the problems of complex speed, unable to fully support the authentication system or encryption system, etc., and achieve the effect of satisfying application requirements, improving security, and increasing security.

Active Publication Date: 2011-03-30
深圳市前海多思科技发展有限公司
View PDF1 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The various public key systems currently used must further increase the key length, resulting in fuller speed, more complexity, and more overhead (required calculation, storage, bandwidth, software and hardware implementation scale, etc.) ) and latency (encryption and signature speed)
[0013]On the other hand, the above-mentioned various public key algorithms cannot fully support the authentication system or encryption system authorized by multiple parties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for authenticating zero knowledge proof
  • Method and device for authenticating zero knowledge proof
  • Method and device for authenticating zero knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0039]The first embodiment of the present invention describes an example where only one authority manages users.

[0040] The authorized authority adopts the national public key cryptosystem SM2 algorithm (compatible with the public key cryptosystem RSA algorithm).

[0041] The public key certificate of the authority is, for example:

[0042] C = (T, id, e, n, g, G)

[0043] The notes for each parameter of the certificate are:

[0044] T: time-varying parameters (registration time, valid time)

[0045] id: Authorization center authority parameters (URL, phone number, identity, authorization authority identification)

[0046] A: The authorized agency uses the encryption algorithm information of the symmetric cryptosystem

[0047] K: The authorized authority uses the encryption key of the symmetric cryptosystem

[0048] G: Authority to manage information

[0049] S: Authority private key

[0050] [e, n, g]: public key system key of the authority

[0051] [e, n, g, S]: Au...

no. 2 example

[0163] The second embodiment of the present invention also adopts figure 1 , figure 2 , Figure 6 The flowchart shown. The second embodiment differs from the first embodiment in that figure 2 step S205 and step S210.

[0164] In step S205, the security entropy information parameter CTi generated by user i includes not only random number Rsi, but also user security entropy CSTi and system security entropy CSKi. Specifically, CTi is given by the following expression:

[0165] CTi=CSTi, CSKi, Rsi Expression (10)

[0166] In step S210, the above-mentioned security entropy information parameter CTi is used to generate a security entropy mixing parameter STi.

[0167] Figure 7 The reconfigurable cryptographic logic circuit 700 used in the implementation process of step S210 according to the second embodiment of the present invention is shown.

[0168] The reconfigurable cryptographic logic circuit 700 includes a user reconfigurable logic circuit Sa and a system reconfigur...

no. 3 example

[0187] The first embodiment and the second embodiment discuss an example of an authority. The third embodiment of the present invention discusses three examples of authorities.

[0188] In the third embodiment, the joint management of three authorized agencies is supported. At this time, both users i and j need to obtain certificates from the three authorized agencies before they can communicate.

[0189] FIG. 9 shows a schematic diagram of three authorization agencies: the authorization center, the management center, and the network management center jointly managing users. The security of the three-certificate authorization system is guaranteed by the security management of the authorization certificates of the authorization center, management center and network management center. The three authorization agencies manage authorization information separately, and can authorize each other separately and independently. When updating the authorization, the authorization informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and device for authenticating zero knowledge proof. The method is based on a public key system, wherein a public key certificate GCi is allotted to a first user through a first authentication organism, and the public key certificate GCi at least comprises user parameters idi and is published. The method comprises the steps of: generating a first random number Ri and a safety entropy parameter CTi, on the basis of the safety entropy parameter CTi, generating a safety entropy mixing number STi by using a recombination cryptologic circuit; on the basis of the first random number Ri, the safety entropy parameter CTi and the safety entropy mixing number STi, generating a first identity authentication parameter of the first user; sending the first identity authentication parameter to a second user by the first user; and figuring out a public key certificate GCi' of the first user from the received first identity authentication parameter by the second user and comparing the figured-out public key GCi' and the published public key certificate GCi to authenticate the first user.

Description

technical field [0001] The invention relates to an authentication method and authentication device for zero-knowledge proof, in particular to an authentication method and authentication device for zero-knowledge proof realized by reconfigurable logic circuits. Background technique [0002] "Zero-knowledge proof"-zero-knowledge proof was proposed by Goldwasser et al. in the early 1980s. It refers to the ability of the prover to convince the verifier that a certain assertion is correct without providing any useful information to the verifier. A zero-knowledge proof is essentially an agreement involving two or more parties, that is, a series of steps that two or more parties need to take to complete a task. The prover proves to the verifier and makes him believe that he knows or has a certain message, but the proof process cannot leak any information about the proven message to the verifier. In the zero-knowledge proof proposed by Goldwasser et al., the prover and verifier mu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 刘大力曹春春
Owner 深圳市前海多思科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products