Anonymous Authentication Algorithm for Remote Attestation on Trusted Platforms

An anonymous authentication and remote attestation technology, applied in the field of information security, can solve the problems of complex computing process, difficulty in meeting the anonymous authentication requirements of trusted platforms, and limited computing power.

Active Publication Date: 2011-12-21
HANGZHOU SUNYARD DIGITAL SCI
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology uses anonymity for secure communication with multiple parties without compromising their privacy or security concerns. It achieves this through exponentiation techniques involving many computations over time instead of just one computation per round-trip (Round Trip) process. Additionally, it allows for easy acceptance from different types of devices like smartphones while maintaining high levels of confidence about its own identities during transactions. Overall, these technical features improve the performance and reliability of reliable identification systems across various industries such as banking services, healthcare providers, government agencies etc..

Problems solved by technology

Technological Problem addressed in this patented technology relating to secure communication systems includes difficulty meeting these challenges because traditional methods require significant computational effort from both parties involved during their identification phases. Existing techniques such as digital certificatography have limitations in terms of scalability and efficiency, making them unsuitable at times.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous Authentication Algorithm for Remote Attestation on Trusted Platforms
  • Anonymous Authentication Algorithm for Remote Attestation on Trusted Platforms
  • Anonymous Authentication Algorithm for Remote Attestation on Trusted Platforms

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in further detail below in combination with specific embodiments.

[0036] The present invention provides an anonymous authentication algorithm for remote certification of a trusted platform. This algorithm is based on the theoretical assumption of the public key encryption system RSA Assumption. Since the theoretical assumption of the public key encryption system is a well-known technology in the field of information security, it will not be described in detail. The present invention includes The following steps:

[0037] (1) Parameter initialization: The trusted platform involved in the verification of both parties selects two different large prime numbers PR 1 、PR 2 , set parameter n A =PR 1 PR 2 , e A =(PR 1 -1)(PR 2 -1), set the public parameter g A , g A for not more than n A A positive integer of , at the same time through the key generator of the trusted platform and the parameter e A Generate a public-private k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anonymous authentication algorithm for remote authentication between credible platforms. By the anonymous authentication algorithm provided by the invention, good anonymity performance is obtained, the identity information of a transmitter is authenticated and the privacy information of the transmitter is protected, a power exponent calculation is utilized, the frequency of the calculation is a constant, so the frequency of encryption and decryption operation is reduced, the scheme efficiency cannot be influenced by the scale expansion of a signature ring, and the complexity of the algorithm can be relatively accepted by the credible platforms. Therefore, requirements on direct and anonymous authentication between credible platforms can be basically met.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner HANGZHOU SUNYARD DIGITAL SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products