Three-party authentication key agreement protocol generating method based on certificates

A technology of key agreement and three-party authentication, which is applied in the field of three-party secure communication in wireless networks, and can solve problems such as inapplicability to wireless networks and low computing efficiency

Inactive Publication Date: 2014-03-12
CHANGZHOU UNIV
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing three-party authentication protocols use bilinear pairing, which has low computational efficiency and is not suitable for wireless networks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-party authentication key agreement protocol generating method based on certificates
  • Three-party authentication key agreement protocol generating method based on certificates
  • Three-party authentication key agreement protocol generating method based on certificates

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention is described in further detail now in conjunction with accompanying drawing. These drawings are all simplified schematic diagrams, which only illustrate the basic structure of the present invention in a schematic manner, so they only show the configurations related to the present invention.

[0042]In the certificate-based three-party authentication key agreement generation method of the present invention, each of the three communication parties A, B, and C has a pair of keys (PK A ,SK A ), (PK B ,SK B ) and (PK C ,SK C ), where PK A 、PK B 、PK C is the public key of A, B, C, SK A 、SK B 、SK C are the private keys of A, B, and C. The authenticity of the key is attested by a certificate issued by a certificate authority. The forms of certificates of parties A, B, and C are as follows:

[0043] Cert(A)=A ,g,p,q,g a ,{ID A ,g,p,q,g a} sigCA >

[0044] Cert(B)=B ,g,p,q,g b ,{ID B ,g,p,q,g b} sigCB >

[0045] Cert(C)=C ,g,p,q,g c ,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a three-party authentication key agreement protocol generating method based on certificates. The method is applied to a wireless network system and comprises the steps: (1) three communication parties A, B and C respectively send respective certificate to other two parties; (2) after the communication party A receives the certificates sent by the communication parties B and C, x is randomly selected as a temporary private key, the formulas that MA=(g*g<c>)*g<x> , NA1=(g)<x> and NA2=(g<c>)<x> are calculated, then the communication party A sends MA and NA1 to the communication party B, and sends MA and NA2 to the communication party C, and the processing modes of the communication parties B and C are identical with that of the communication party A; (3) after the communication party A receives the messages sent by the communication party B and the communication party C, calculation and verification are performed, if the formula is false, a protocol is stopped from operating; if the formula is successful, a session key is calculated; the modes of calculating the session keys of the communication party B and the communication party C are identical with that of the communication party A; (4) an agreement is completed. According to the three-party authentication key agreement protocol generating method based on the certificates, modular and exponent arithmetic and a hash function are used, the operation efficiency is higher, and the agreement can resist the man-in-the-middle attack, the unknown secret key sharing attack and the secret key reveal impersonation attack, so that the safety is high.

Description

technical field [0001] The invention relates to the field of cryptography, in particular to a new method for generating a certificate-based three-party authentication key agreement agreement, which is suitable for three-party secure communication in a wireless network. Background technique [0002] Key Agreement Protocols (KAP for short) is an important means of protecting network security. It can enable two or more parties to confirm the identity of each other during the communication process, and after confirming the true identity of the other party, negotiate Generate a secret session key known only to two or more communicating parties. [0003] In 1976, Diffie and Hellman pioneered the concept of public key cryptography and the first key agreement protocol - Diffie-Hellman protocol, and then many scholars started research on it. In 2000, Joux proposed the first three-party key agreement protocol using bilinearity on elliptic curves. Since then, many three-party key agr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 丁辉潘操王洪元刘鸿飞
Owner CHANGZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products