Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for certificateless cross-domain authentication in credible could computing environment

A cloud computing environment and authentication method technology, applied in the field of certificateless cross-domain authentication, to achieve the effect of reducing overhead, high security, and high security

Active Publication Date: 2014-01-29
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND +1
View PDF2 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be used to solve the problem of cross-domain authentication for users to access resources in different trusted domains in a trusted cloud computing environment. key negotiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for certificateless cross-domain authentication in credible could computing environment
  • Method for certificateless cross-domain authentication in credible could computing environment
  • Method for certificateless cross-domain authentication in credible could computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The specific implementation manner of the method will be described in detail below in conjunction with the accompanying drawings.

[0031] Description of the main cryptography knowledge and security assumptions used in this method:

[0032] 1. Bilinear pairing: let G 1 , G 2 is the additive cyclic group and the multiplicative cyclic group of the prime number q in the middle order of the elliptic curve, and P is G 1 the generator of G , and G 1 The discrete logarithm problem on is intractable, then the bilinear map e:G between two groups 1 ×G 1 →G 2 satisfy the following properties:

[0033] (1) Bilinearity: e(aP,bQ)=e(P,Q) ab , for all P,Q∈G 1 ;a, b∈Z are all established;

[0034] (2) Non-degenerate: there is P, Q∈G 1 , making e(P,Q)≠1;

[0035] (3) Computability: For P, Q∈G 1 , there is an efficient algorithm to compute e(P,Q).

[0036] 2. This method assumes that the central authentication server S is a trusted third party and can accurately respond to each...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for certificateless cross-domain authentication in a credible cloud computing environment and belongs to the technical field of cloud computing safety. According to the method for certificateless cross-domain authentication in the credible cloud computing environment, the certificateless public key cryptography technology is introduced into cross-domain authentication, credible cross-domain authentication is achieved in the process of credible cloud computing, a certificateless public key cryptosystem is applied, the problem of the certificate maintenance expense of a traditional digital certificate authentication system and the problem of private key trusteeship of a public key cryptography system based on the identity are solved. According to the method for certificateless cross-domain authentication in the credible cloud computing environment, a user public key is generated based on the identity, a part of a private key of a user is generated by the user, and the other part of the private key of the user is generated by a center authentication server. According to the method for certificateless cross-domain authentication in the credible cloud computing environment, a certificate system is abandoned, the expense of the authentication system is reduced, the private key of the user is protected at the same time, bilinear pairing computation is applied to the certificateless public key cryptosystem, it is proved that a safety hypothesis based on bilinear pairing computation is high in safety, the certificateless public key cryptosystem is used for identity authentication and session key negotiation, and therefore it is ensured that the system is high in safety.

Description

technical field [0001] The invention relates to a certificateless cross-domain authentication method in a trusted cloud computing environment. The method introduces certificateless public key cryptography technology into cross-domain authentication, realizes trusted cross-domain authentication in trusted cloud computing, and belongs to the field of cloud computing security technology. Background technique [0002] Since Google proposed the concept of "cloud computing" in 2006, cloud computing has attracted more and more attention from the industry. In a broad sense, cloud computing is based on the idea that "the network is a computer" and integrates computing resources and storage resources on the Internet. Form a large-scale resource pool, so that resources can be quickly deployed and released through simple management or interactive processes, provide corresponding services for remote computer users, and realize resource allocation on demand. Cloud computing has become a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L29/06H04L9/08
Inventor 赵朋川曾颖明陈志浩李红王斌
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products