Unlock instant, AI-driven research and patent intelligence for your innovation.

Hierarchical Identity Base-based Authenticated Key Agreement Method and Negotiation System without Certificate

An authenticated key agreement, certificate-free technology, applied in the field of authenticated key agreement methods and negotiation systems, can solve problems such as difficulties, achieve high efficiency, and meet the effect of basic security requirements

Active Publication Date: 2018-05-15
BEIHANG UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the key agreement protocol without bilinear pairing operation, the security of the protocol is based on the assumption of elliptic curve discrete logarithm difficulty, namely is the cyclic addition group of order q on the elliptic curve, given two elements in Computing a from P, aP is hard, but computing aP from P, a is easy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hierarchical Identity Base-based Authenticated Key Agreement Method and Negotiation System without Certificate
  • Hierarchical Identity Base-based Authenticated Key Agreement Method and Negotiation System without Certificate
  • Hierarchical Identity Base-based Authenticated Key Agreement Method and Negotiation System without Certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0041] In the description of the present invention, it should be understood that the terms "first" and "second" are used for description purposes only, and should not be understood as indicating or implying relative importance.

[0042] These and other aspects of embodiments of the invention will become apparent with reference to the following description and drawings. In these descriptions and drawings, some specific implementation manners in the embodiments of the present invention are specifically disclosed to represent some ways of i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-certificate-based authentication key negotiation method and negotiation system based on a hierarchical identity base. The method includes: obtaining an elliptic curve cyclic addition group according to an input security constant, and selecting a master private key and two security keys. Calculate the public key of the system based on the hash function of the system; calculate the partial private key and partial public key of the first user according to the master private key, the identity of the first user and a selected set of random numbers; calculate the partial private key and partial public key of the first user according to the partial private key and Calculate the private key of the first user based on a random number of the first user; calculate the partial private key and partial Public key: calculate the session key according to the temporary information, private key, and public key selected by the second user and the third user. The invention has the following advantages: it is suitable for large-scale systems; it has high efficiency; it has no key trusteeship problem; and it meets the security requirements of key negotiation.

Description

technical field [0001] The invention relates to a non-certificate encryption system, in particular to a non-certificate-based authentication key negotiation method and negotiation system based on hierarchical identity bases. Background technique [0002] Public key cryptography is an important technology to ensure network and information security. In the traditional public key infrastructure (PKI, Public Key Infrastructure), a trusted third party is required to issue certificates for users to prove the legal identity of users, so it involves many certificate management issues and occupies a lot of system-related resources. In order to simplify the certificate management process of traditional public key infrastructure, Shamir proposed an Identity Based Cryptosystem (IBC, Identity Based Cryptosystem) in 1984. This system does not use certificates, and directly uses the user's identity as the public key, and the private key is generated by the trusted private key generation c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 刘建伟苏航陶芮冯伯昂宋晨光夏丹枫
Owner BEIHANG UNIV