Identity-based certificate authentication system cfl

A technology of identification authentication and certificate, applied in the field of information security, can solve the problem of private key without private right

Active Publication Date: 2016-02-17
青岛博文广成信息安全技术有限公司 +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the user does not have full privacy over the private key
In an open network, users have a strong demand for the private right of the private key, which is difficult to meet in the existing identification authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based certificate authentication system cfl
  • Identity-based certificate authentication system cfl
  • Identity-based certificate authentication system cfl

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] 1. CFL workflow based on exponential product public key cryptography algorithm

[0045] User's operation

[0046] 1) The user generates his own real identification ID

[0047] 2) The user generates a set of random public-private-key key pairs (RAPK, RASK) according to the self-selected working password algorithm

[0048] 3) The user submits the ID and RAPK to the key management center KMC

[0049] Operation of Key Management Center KMC

[0050] 4) KMC reviews the ID submitted by the user to ensure its authenticity and uniqueness

[0051] 5) Input the ID into H to obtain the control information h input by the multi-linear function

[0052] 6) According to h and the private key basis, the following multi-linear function is transformed:

[0053]

[0054] Generate the identity private key IDSK

[0055]7) Use the signature algorithm SIGN and IDSK as the key to sign the certificate with RAPK as the core content, and get: sign=SIGN IDSK (RAPK)

[0056] 8) Issue the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identifier-based certificate authentication system CFL, which belongs to the information security field and relates to the certificate authentication of secret keys. In the system, certificate authentication mechanism and identifier authentication mechanism are combined, a basic secret key pair of the system is composed of an identifier secret key pair and a random secret key pair, the identifier secret key pair of the user is used as a signing and checking secret key pair, the signing and the checking of the certificate are provided for a random secret key autonomously generated by the user, the system has a self-authentication function, and the whole checking process needs no intervention of a trusted third party. A secret key management center and the user can select same or different public key cryptography algorithms to be respectively used as corresponding basic cryptography algorithms of the identifier secret key pair and the random secret key pair. The invention also provides an index product type public key cryptography algorithm, so that the single index structure of a RSA secret key is broken, and the index type public key cryptography is converted into an identifier-based public key cryptography algorithm. The CFL authentication is fast and low in resource consumption, can satisfy the needs of large-scale network authentication, and can meet the user requirement of privacy protection.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to a key authentication system. Background technique [0002] In public key cryptography, a key issue is to solve the binding between the user and the public key. The so-called binding between the user and the public key is to prove that the user does have the private key corresponding to the public key. Since the birth of public key cryptography, in order to solve the problem of binding public keys and users, two basic authentication systems have been formed, namely certificate authentication and identification authentication. [0003] In certificate authentication, the relationship between the public key PK and the private key SK is PK=F(SK), where the public key PK has nothing to do with the user ID. To bind the user ID with the public key PK, it needs to be proved by a certificate signed by a trusted third party (such as the certification center CA). The application,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
CPCY02B20/00
Inventor 陈华平范修斌吕述望
Owner 青岛博文广成信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products