A certificateless cross-domain authentication method in a trusted cloud computing environment

A cloud computing environment and authentication method technology, applied in the field of certificate-free cross-domain authentication, to achieve the effects of high security, high security, and reduced overhead

Active Publication Date: 2016-12-07
706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND +1
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be used to solve the problem of cross-domain authentication for users to access resources in different trusted domains in a trusted cloud computing environment. key negotiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A certificateless cross-domain authentication method in a trusted cloud computing environment
  • A certificateless cross-domain authentication method in a trusted cloud computing environment
  • A certificateless cross-domain authentication method in a trusted cloud computing environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The specific implementation manner of the method will be described in detail below in conjunction with the accompanying drawings.

[0031] Description of the main cryptography knowledge and security assumptions used in this method:

[0032] 1. Bilinear pairing: let G 1 , G 2 is the additive cyclic group and the multiplicative cyclic group of the prime number q in the middle order of the elliptic curve, and P is G 1 the generator of G , and G 1 The discrete logarithm problem on is intractable, then the bilinear map e:G between two groups 1 ×G 1 →G 2 satisfy the following properties:

[0033] (1) Bilinearity: e(aP,bQ)=e(P,Q) ab , for all P,Q∈G 1 ;a, b∈Z are all established;

[0034] (2) Non-degenerate: there is P, Q∈G 1 , making e(P,Q)≠1;

[0035] (3) Computability: For P, Q∈G 1, there is an efficient algorithm to compute e(P,Q).

[0036] 2. This method assumes that the central authentication server S is a trusted third party and can accurately respond to eac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a certificateless cross-domain authentication method in a trusted cloud computing environment. The method introduces certificateless public key cryptography technology into cross-domain authentication, realizes trusted cross-domain authentication in trusted cloud computing, and belongs to the field of cloud computing security technology. The invention adopts the certificateless public key cryptosystem, and solves the problem of certificate maintenance overhead in the traditional digital certificate authentication system and the private key trusteeship problem of the identity-based public key cryptosystem. In the present invention, the user's public key is generated based on the identity, and the user's private key is generated by the user and the central authentication server respectively. The present invention abandons the certificate system, reduces the overhead of the authentication system, and protects the user's private key at the same time. The certificateless cryptographic system adopts bilinear pairing operation, and it has been proved that the security assumption based on bilinear pairing operation has high security. The invention adopts the non-certificate public key cryptosystem to carry out the identity authentication and the negotiation of the session key, which ensures that the system has higher security.

Description

technical field [0001] The invention relates to a certificateless cross-domain authentication method in a trusted cloud computing environment. The method introduces certificateless public key cryptography technology into cross-domain authentication, realizes trusted cross-domain authentication in trusted cloud computing, and belongs to the field of cloud computing security technology. Background technique [0002] Since Google proposed the concept of "cloud computing" in 2006, cloud computing has attracted more and more attention from the industry. In a broad sense, cloud computing is based on the idea that "the network is a computer" and integrates computing resources and storage resources on the Internet. Form a large-scale resource pool, so that resources can be quickly deployed and released through simple management or interactive processes, provide corresponding services for remote computer users, and realize resource allocation on demand. Cloud computing has become a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L9/08
Inventor 赵朋川曾颖明陈志浩李红王斌
Owner 706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products