Certificate-free remote anonymous authentication method based on third party in cloud application

An anonymous authentication, certificate-free technology, applied in the field of information security, can solve the problems of high computational complexity, inability to resist public key replacement attacks, not considering the limited storage space of users, etc., to achieve high security, achieve anonymity, and improve security. sexual effect

Active Publication Date: 2014-09-17
XIAN XIDIAN BLOCKCHAIN TECH CO LTD
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method solves the problem of key escrow, it still has high computational complexity, cannot achieve comple

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-free remote anonymous authentication method based on third party in cloud application
  • Certificate-free remote anonymous authentication method based on third party in cloud application
  • Certificate-free remote anonymous authentication method based on third party in cloud application

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0028] Reference figure 1 , The implementation steps of the present invention are as follows:

[0029] Step 1. The network manager M initializes the system:

[0030] (1a) The network manager M determines the size of the safety factor l and the prime number q according to the security needs, and uses the elliptic curve to select the appropriate cyclic addition group G 1 And cyclic multiplication group G 2 Construct a bilinear pair map e(G 1 ,G 2 )→G 2 ;

[0031] (1b) The network manager M chooses two collision-free hash functions H 1 :{0,1} * →G 1 with Where H 1 Is to map 0 / 1 sequences of unequal length to the cyclic addition group G 1 The hash function of one element on H 2 Is the 0 / 1 of unequal length and the cyclic addition group G 1 The elements in are mapped to the integer multiplication group of modq The hash function of an element on

[0032] (1c) The integer multiplication group of the network manager M from modq Randomly select an integer s as its private key, and calculate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificate-free remote anonymous authentication method based on a third party in a cloud application, and the method mainly solves the problem that remote bidirectional authentication in the prior art is poor in safety. The method is achieved through the steps that (1) a network manager M initializes a system; (2) the network manager M conducts identity register on a user U, and issues a system account to the user U; (3) the network manager conducts identity register on a service provider S, and sends part of the identity information of the legitimate user U to the service provider S; (4) the user U sends a service request to the service provider S in an anonymous mode through the system account; (5) the service provider S and the user U conduct bidirectional authentication. According to the method, the requirement for a certificate is omitted, the defects of secret key trusteeship are omitted as well, safety in anonymous bidirectional authentication is improved, and the method can be used for identity authentication when a remote user in a wireless body area network conducts service request.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a certificateless remote anonymous authentication method, which can be used for remote user identity authentication in a wireless body area network (WBAN). Background technique [0002] Cloud computing is one of the research hotspots in the IT field at present, and is considered to be the fourth generation of IT industrial revolution after the Internet. Cloud computing is based on the Internet and distributed computing technology. It integrates originally independent and scattered resources such as computing, storage and bandwidth to form a resource pool, and shields users from details such as storage hardware configuration, distributed processing, disaster recovery and backup. Provide storage resources as a service to users through the Internet. Users rent resources in the pool from cloud service providers according to their actual demand for storage resources, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/08H04L12/24
Inventor 刘景伟孙蓉党利娜
Owner XIAN XIDIAN BLOCKCHAIN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products