Lightweight anonymous authentication and key negotiation method in multi-server environment
An anonymous authentication and key negotiation technology, applied in the field of information security, can solve the problems of single function, easy account impersonation attack, unable to provide key negotiation function, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0037] Example 1
[0038] Now as user U 3 To server S 6 Take anonymous authentication and key negotiation as an example, the specific method is as follows:
[0039] (1) System establishment and selection of system parameters
[0040] The registration center RC selects the SHA-2 algorithm and the fuzzy extractor according to the security requirements of the system, and makes the SHA-2 algorithm and the fuzzy extractor public, and then writes the SHA-2 algorithm and the Rep(.) algorithm of the fuzzy extractor to the user's smart card In SC, the smart card has a certain storage capacity, computing capacity and the ability to connect to a remote server, such as OR1200 of the open source 32-bit processor RISC.
[0041] (2) The server and user are registered in the RC registry
[0042] Assuming that the server and the user register their real identities in the registry and become legal members of the system, let the registry RC select a key x with a binary length of l and a one-way Hash func...
Example Embodiment
[0054] Example 2
[0055] In this embodiment, after step (2) the server and the user are registered in the registration center RC, the fingerprint of user 3 is accidentally damaged, and the password pw needs to be changed 3 And / or biological information b 3 ,Specific steps are as follows:
[0056] (a) Password pw 3 And / or biological information b 3 Updates of
[0057] The specific method is: User U 3 Insert the user's smart card SC into the card reader and enter the ID 3 , Pw 3 , B′ 3 , The user’s smart card SC uses the Rep(.) algorithm of the fuzzy extractor to recover the user U 3 The biological key Rep(Δ 3 ,b′ 3 )=θ′ 3 , And calculate A′ 3 =h(pw 3 ||θ′ 3 ), verify F 3 =h(ID 3 ||A′ 3 ) Is established, if not established, the user smart card SC automatically interrupts the request; if established, the user is prompted to enter a new password And / or biological information User U 3 Recollect your own biological information And choose a new password by G e n ( b 3 ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap