Unlock instant, AI-driven research and patent intelligence for your innovation.

Key Generation and Distribution Method Based on Composite Key System

A key generation and combination key technology, applied to key distribution, can solve the problem that the key authentication system cannot provide user private key protection, so as to prevent malicious counterfeiting of user private key for illegal operations, protect user privacy, and prevent Duplicated and Tampered Effects

Active Publication Date: 2016-07-27
广东南方信息安全产业基地有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to propose a key generation and issuance method based on a combined key system, which can solve the problem that the key authentication system cannot provide user private key protection in an insecure environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key Generation and Distribution Method Based on Composite Key System
  • Key Generation and Distribution Method Based on Composite Key System
  • Key Generation and Distribution Method Based on Composite Key System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In the following, the present invention will be further described in conjunction with the drawings and specific embodiments.

[0028] Such as figure 1 As shown, a key generation and distribution method based on the combined key system is applied in the key authentication system. The key authentication system includes a user terminal entity, a key management subsystem and a registration management subsystem.

[0029] This embodiment is constructed based on Elliptic Curve Cryptography (ECC). The elliptic curve discrete logarithm problem is the mathematical basis for the security of this method. The selected elliptic curve group and quintuple (a, b, G, n, p) are defined:

[0030] p: is a large prime number, and the elliptic curve is built on the finite field modulo p.

[0031] a, b: are non-negative integers less than p, set in the cubic equation y 3 =x 3 +ax+b(modp), all non-negative integer pairs (x, y) less than p that satisfy the equation plus an infinity point O...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A key generation and distribution method based on a combined key system, which includes: a user terminal entity generates a random number rkey id , calculate the public key rPK id ; The key management subsystem generates a random number rkey KMC , calculate the public key rPK KMC , and remember γ id =rPK id +rPK KMC ; Use the user ID UID to calculate the identity private key key id and identify the public key R i ;Use the identity private key key id right gamma id Get signed, and publish¶ id and public key matrix; calculate user private key generation factor s, use public key rPK id Encrypt the user private key generation factor s to obtain the ciphertext data, and send the ciphertext data to the user terminal entity; the user terminal entity uses the random number rkey id Decrypt the ciphertext data, get the user private key generation factor s, and calculate the user private key sk id . The invention can prevent the key management subsystem from maliciously counterfeiting the user's private key to perform illegal operations, prevent copying and tampering, resist collusion, and protect user privacy.

Description

technical field [0001] The invention relates to a key generation and distribution method. Background technique [0002] With the continuous development of network and informatization applications, security issues have become the focus of network and informatization work. Authentication technology to ensure transaction security is one of the main fields of information technology. The industry urgently needs to realize security authentication and establish a trusted network system so that Provide services such as authenticity certification, accountability certification, and digital signatures for online transactions. On the other hand, after years of development, a logo-based authentication system and a user identification certificate issuance method have been disclosed (patent number: ZL200710027076.3). The method provides an authentication system and a method for issuing user identification certificates, so that third-party authentication is not required, the cost is low, la...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 叶录高田文春
Owner 广东南方信息安全产业基地有限公司