User Identity Mutual Authentication Method Based on Elliptic Curve Code
An elliptic curve, user identity technology, applied in the privacy protection, wireless communication security field, can solve the problem of system security loss, and achieve the effect of speeding up the authentication speed, reducing the number of verifications, communication overhead and computing overhead.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.
[0048] The method of the present invention includes system initialization, user registration stage and user identity mutual authentication stage, such as figure 1 shown.
[0049] This example is implemented through the following steps:
[0050] Step 1. System initialization. First, the CA (certification center) selects a SEC 2 standard-recommended key length based on the prime number field GF(p) with a key length of 160bit elliptic curve E(GF(p)). The elliptic curve equation is:
[0051] the y 2 =(x 3 +ax+b)(mod p), a,b∈GF(p), and (4a 3 +27b 2 )mod p≠0;
[0052] Elliptic curve domain parameter is T=(p,a,b,G,n,h), CA randomly selects an integer s CA as its private key, and s CA ∈[2,n-2], by calculating P CA =s CA G obtains its public key;
[0053] Step 2, user registration phase, first users Alice and Bob generate their public / privat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com