Identity-based key generation method and identity-based authentication method

A technology of key generation and authentication methods, which is applied in the field of communication and information security, can solve problems such as complex key management, and achieve the effect of simple key management, ensuring privacy and security

Inactive Publication Date: 2013-08-14
顾纯祥
View PDF4 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an identity-based key generation method and authentication method to solve the current problem of using public key cryptography technology that relies on PKI / CA (Public Key Infrastructure / Certificate Authority) public key infrastructure to achieve authentication. Key Management Complexity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based key generation method and identity-based authentication method
  • Identity-based key generation method and identity-based authentication method
  • Identity-based key generation method and identity-based authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings.

[0023] An embodiment of an identity-based key generation method of the present invention

[0024] Different from the traditional PKI / CA technical mechanism, in the identity-based cryptographic system, the user's public identity information (such as e-mail address, IP address, name, etc.) is used as the public key part of the user's public key / private key pair. Private keys are generated by a trusted third party called a Private Key Generator (PKG). An identity-based cryptosystem such as figure 1 as shown,

[0025] ①Users and application servers submit their identity information to the security center for registration;

[0026] ②The security center accepts the registration request and submits the identity information in the registration request to the key server;

[0027] ③The key server generates the identity private key according to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity-based key generation method and an identity-based authentication method, and belongs to the technical field of communication and information security. According to the invention, based on the identity cryptographic technique, authentication and authorization to a subjective identity are realized; privacy and security of a legitimate user are ensured; the management of a key is simple; a systematical key management center is only responsible for establishing and distributing a private key for each user, and well manages a main key of a security center and a group of communal parameter files; an identity is used as a mark for realizing authentication; secure authentication can be realized only needing knowing identity marks of others, without needing exchange of public key certificates, validity verification and other related processes; and the whole process is simple and quick.

Description

technical field [0001] The invention relates to an identity-based key generation method and an authentication method, belonging to the technical field of communication and information security. Background technique [0002] Today, with the rapid development of network technology, authentication and communication encryption are important means to achieve information security. Traditional security methods usually use public key cryptography to achieve authentication and secure channel establishment, but this type of system relies on PKI / CA (Public Key Infrastructure / Certificate Authority) public key infrastructure, which has the advantages of high security, but there are also key Management is complicated and so on. [0003] In order to simplify the key management problem of the traditional public key system, Shamir proposed the idea of ​​IBC (Identity Based Cryptography) based on identity cipher in 1984: public user identity information (such as e-mail address, IP address, n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 顾纯祥郑永辉刘楠祝跃飞
Owner 顾纯祥
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products