Private key safety management method based on identity public key cryptography system

A technology of identity public key and security management, applied in the direction of public key of secure communication, user identity/authority verification, etc., can solve the problem of low cost

Inactive Publication Date: 2012-10-17
BEIJING UNIV OF TECH
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Using this method not only solves the custody problem of the private key, but also facilitates the backup and recovery of the private key, and the private key is only blinded with a password du...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Private key safety management method based on identity public key cryptography system
  • Private key safety management method based on identity public key cryptography system
  • Private key safety management method based on identity public key cryptography system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] see figure 1 As shown, the system overall framework flow chart of the private key security management method based on the identity public key cryptosystem.

[0083] The entire framework flow chart includes trusted center, client, signer and verifier. The signer first enters the password through the client; the client generates part of the private key, and then blinds it with the password, and sends the blinded part of the private key to the trusted center to apply for a private key; the trusted center generates part of the private key and backs it up Two parts of private key information, the private key application is successfully returned to the client; the signer saves part of the private key generated by the client through the client. If the signer's private key is lost, it is necessary to apply to the trusted center for private key recovery, that is, enter the password through the client; the trusted center returns the client's blinded partial private key; the clie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a private key safety management method based on an identity public key cryptography system. The private key safety management method comprises the steps of: system parameter establishment; private key generation algorithm; private key recovery algorithm; signature algorithm; and authentication algorithm. Through the combination of password blinding and private key slicing, in the process of distribution, storage, backup and recovery, the private key is sliced, and part of the private key is subjected to password blinding in the backup process, even in the use process, the authentic private key of a user is not needed to be calculated, and the private key is used in a slicing manner, so that the safety of the private key is ensured. Compared with the prior art, the private key is subjected to password blinding only in the backup process, the safety of the private key can be ensured without any safety measure in the distribution, storage and use processes, on one hand, the escrow problem of the private key is solved, on the other hand, the backup and the recovery of the private key can be realized easily, and for users, the private key safety management method is convenient in use and low in cost.

Description

technical field [0001] The invention relates to a security management method of a user's private key, in particular to a private key security management method based on an identity public key cryptosystem. The present invention can provide a reliable and practical private key security management method for security services such as entity authentication and non-repudiation (anti-repudiation) in application environments such as e-commerce, the Internet of Things, and cloud computing. Background technique [0002] In order to solve the security problems in the information and network environment, countries around the world have initially formed a complete set of solutions after years of research, that is, Public Key Infrastructure (PKI). PKI is a security system based on public key theory and technology, and a universal security infrastructure for providing information security services. The system provides network applications with security services such as entity authentica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 侍伟敏王赛陆梦赵一恒王威
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products