Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Zero knowledge identity authentication method based on strong primes

An identity authentication and zero-knowledge technology, applied in the field of identity authentication and computer information security, can solve the problems of high number of interactions, high system performance requirements, and reduction, and achieve the effect of improving efficiency

Inactive Publication Date: 2011-11-02
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) BàA: Challenge
[0018] However, the Schnorr scheme also has certain shortcomings: on the one hand, there are many interactions in the entire authentication process; on the other hand, there are many modulo operations in the entire authentication scheme, which requires high performance of the entire system
However, there is a flaw in the S.C scheme: when the public key parameters are selected insecurely, it will greatly reduce the difficulty of solving the discrete logarithm when the attacker cracks the user A' private key

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] A zero-knowledge identity authentication method based on strong prime numbers, comprising the following steps:

[0044] In the first step, the trusted center generates strong prime numbers and selects strong prime numbers that meet the conditions:

[0045] The trusted center is similar to the certification authority (CA, certification authority) in public cryptography, but the trusted center has stronger functions and needs to generate strong prime numbers and select prime numbers for calculation. In public cryptography, a certificate authority certifies a public key belonging to a particular entity (either a person or a network entity). For a certified public key, if a person fully trusts the CA's certification of the public key, he can also determine the owner of the key. It can be seen that in the identity authentication system, the trusted center acts as a facilitator, assisting both parties who need authentication to complete the identity authentication work.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a zero knowledge identity authentication method based on strong primes. Aiming at the multiple interaction times of a Schnorr scheme and the defects in an S.C (Sultan Almuhammadi and Clifford Neuman) scheme, the invention provides the zero knowledge identity authentication method based on the strong primes. The zero knowledge identity authentication method disclosed by the invention can be used for solving the defects in the S.C scheme by utilizing the strong primes which are generated in a trusted center and has the advantages of safety and high efficiency of the Schnorr scheme and the S.C scheme; the authentication efficiency is enhanced by 1 / 3 compared with that of the Schnorr scheme; and the system overhead is lowered and the safety is simultaneously improved.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and specifically relates to a zero-knowledge identity authentication method based on strong prime numbers, which can be widely used in the field of identity authentication. Through a series of interactive processes, it can have higher security and more efficiency than existing solutions. Low performance overhead. Background technique [0002] With the development of Internet technology and the rise of e-government and e-commerce, how to conduct secure identity authentication has become a thorny issue. Traditional identity authentication requires the transmission of passwords or identity information. The identity authentication method of user name and password has long been considered as weak security. Many new identification schemes have been proposed, but the only feasible one is based on discrete logarithm. problematic authentication scheme. Therefore, "zero-knowledge pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 佘堃莫超
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products