Method for carrying out wireless network general authentication on drift user
A general authentication, wireless network technology, applied in the field of drift authentication process, can solve the problem of leaking the user's identity and geography, and achieve the effect of ensuring anonymity and ensuring untraceability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] The relevant technical terms are as follows:
[0019] H – Home server
[0020] V – Foreign Server
[0021] Ui – user whose home server is H
[0022] ECDSA - Elliptic Curve Scalar Multiplication (Elliptic Curve Scalar Multiplication)
[0023] VLR-GS-BU - Verifier-Local Revocation Group Signature with Backward Unlinkability
[0024] mpk – the master public key contained in the digital certificate (Master Public Key)
[0025] usk[i] - user i's key (User Secret Key)
[0026] RL – Revocation List
[0027] p – a large prime number
[0028] G – cyclic group containing p elements
[0029] hj – an element of G
[0030] g – key generator (generator)
[0031] alias – the temporary identity used by the user for login requests
[0032] - Concatenation operation of two bit strings
[0033] - Encrypt content X with symmetric key K
[0034] - is marked as Information
[0035] – A set of numbers less than p (excluding 1 and common divisors of p)
[0036] - Ra...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 