Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for solving key collision problem of combined public key (CPK)

A technology that combines public keys and keys, applied in the field of cryptography, and can solve problems such as difficulty in key replacement and user key collision

Inactive Publication Date: 2016-05-04
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there have always been several problems in the innovative development of CPK, such as hidden dangers of collusion, difficulty in key replacement, possible collision of user keys, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for solving key collision problem of combined public key (CPK)
  • Method for solving key collision problem of combined public key (CPK)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0026] To generate the identification key of CPK, firstly, the selection sequence of public-private key factors is generated through the hash operation of user identification and the row mapping algorithm, and then the corresponding elements are selected in the public-private key matrix, and combined to generate a public-private key pair. The factors corresponding to the positions in the public-private key matrix satisfy the elliptic curve discrete logarithm problem ECDLP. There are two reasons for the collision of user keys: the mapping coordinates are the same as the selected coefficients, which are generated by the hash operation, and the result of the modulo addition operation is the same. The CPK review report of the 2007 European Cryptography Annual Conference believes that the security problem of hash should not be regarded as the security p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for solving the key collision problem of combined public key (CPK). Based on the process of the original CPK algorithm that a selection sequence of public and private key factors is generated through the hash algorithm and the line mapping algorithm of a user identifier, corresponding elements are then selected from a public and private key matrix, and the selected elements are combined to generate public and private key pairs, the following two improvements are added: when users apply for registration in a key management center (KMC), the KMC carries out database de-weighting of public keys generated by the applying user identifiers, so as to generate non-collision user combined key pairs; a two-step verification method is adopted for identity authentication during mutual accesses among the users. The method adopting the solution not only solves the key collision of CPK, but also has the characteristics of large-scale authentication, high simplicity and convenience of authentication, offline authentication process and the like.

Description

technical field [0001] The invention relates to a method for a combined public key CPK key collision problem, in particular to a method for solving the combined public key CPK key collision problem, belonging to the field of cryptography. Background technique [0002] The combined public key system (CPK) was formally proposed by the senior cryptography expert Nan Xianghao in 2003. It creatively takes the seed key as the core and combines a variety of classic cryptographic algorithms to solve the identification key generation skillfully. And this world problem of management. A small number of public-private key factors can generate unlimited public-private key pairs, and generate certificates based on user identification, so that user identity can be authenticated offline without third-party certification. CPK has the advantages of high security, low key storage capacity, and good flexibility, and has been highly praised by experts at home and abroad. However, there have al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
CPCH04L9/30H04L9/3066
Inventor 任勋益李鹏程
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products