Authentication key negotiation method enabling identity privacy and non-malleable security

An authenticated key agreement, non-extensible technology, applied in the field of authenticated key agreement, can solve the difficult configuration and application problems of IKE algorithm

Active Publication Date: 2015-11-25
赵运磊
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This also makes it difficult for the IKE algorithm to be configured and applied on computing-limited devices (such as mobile phones, smart cards, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication key negotiation method enabling identity privacy and non-malleable security
  • Authentication key negotiation method enabling identity privacy and non-malleable security
  • Authentication key negotiation method enabling identity privacy and non-malleable security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0057] Also, in the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without the specific details or in the particular manner described.

[0058] In addition, the steps shown in the flow dia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an authentication key negotiation method enabling identity privacy and non-malleable security. The method includes the following steps that: a first device transmits a determined expression, namely, X'=AX<d>, to a second device, wherein A= g is the public key of the first device, X=g<x> and d=h<d>(X, aux<d>); the second device determines an expression, namely, Y'=BY<e>, wherein B=g is the public key of the second device, Y=g<y>, and e=h<e> (Y, aux<e>), and determines S according to a DH- index y, a private key b and X', determines K and K based on S, and determines an expression, namely, C=AE(K,(I, B, CERT(B), Y, Data)) according to K and an authentication encryption function AE, transmits Y' and C to the first device; and the first device determines S according to a DH- index x, a private key a and Y', and determines K and K based on S, and the first device determines an expression, namely, C=AE (K, (I, A, CERT, X, Data)) according to K, and transmits C to the second device. According to the session key negotiation method, based on reasonable parameter setting, each device operations 2.5 modular exponentiation, and therefore, the data computation load of each device can be greatly decreased, and the generation efficiency of session keys can be improved, and the method can be applied more flexibly.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to an authentication key negotiation method with identity hiding and non-extensible security. Background technique [0002] Authenticated cryptographic negotiation is the core content of cryptographic theory and applications. Most of the authenticated key agreement protocols need to transmit the identities and public key information of the two parties in plain text. In the era of mobile Internet, user identity and public key certificate information are often sensitive information in many applications. Therefore, the development of identity-hiding authentication key agreement methods has attracted a lot of attention in network and information security theory and application engineering in recent years. [0003] The current mainstream identity-hiding key agreement protocol is the international standard of the IKE protocol of the IETF. The operation process of the IKE protocol is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 赵运磊李俊全
Owner 赵运磊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products