Identity-based authentication method and identity-based authentication system with secret key negotiation

A technology for key negotiation and authentication methods, applied in user identity/authority verification, transmission systems, key distribution, and can solve problems such as protocol man-in-the-middle attacks

Active Publication Date: 2016-05-11
AEROSPACE INFORMATION
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] An existing public key key agreement protocol is the Diffie-Hellman key exchange protocol, but this protocol is vulnerable to man-in-the-middle attacks, so authentication is required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based authentication method and identity-based authentication system with secret key negotiation
  • Identity-based authentication method and identity-based authentication system with secret key negotiation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] This embodiment provides a processing flow of an identity-based authentication method with key agreement as follows: figure 1 As shown, the following processing steps are included:

[0049] Step S110, based on the security parameters, the server generates and publishes the security parameters using basic operations on the elliptic curve.

[0050] Based on the security parameter k, the server S selects a cyclic group G of prime order p on the elliptic curve E on the finite field, and the generator of the cyclic group G is P. random selection of parameters in Calculate P s = d s p. Pick two secure hash functions and

[0051] Set the master key to d s , the public system parameters are (E, G, P, P s , H 1 , H 2 ).

[0052] Step S120, the user terminal sends the user's identity to the server, and the server generates the user's public key and private key according to the user's identity and the system parameters, and sends the user's public key and The...

Embodiment 2

[0066] This embodiment provides an identity-based authentication device with key agreement, and its specific structure is as follows figure 2 As shown, the following modules are included: server 21, user terminal 22;

[0067] The server 21 is configured to use basic operations on elliptic curves to generate and disclose system parameters based on security parameters, generate the user's public key and private key according to the user's identity and the system parameters, and transfer the user's The public key and the private key are sent to the user terminal; and the user terminal uses the user's public key and private key to perform mutual authentication and negotiate a session key;

[0068] The user terminal 22 is configured to send the user's identity to the server, and use the user's public key and private key to perform mutual authentication and negotiate a session key with the server.

[0069] Further, the server 21 is specifically configured to select a cyclic group ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides an identity-based authentication method and an identity-based authentication system with secret key negotiation. The identity-based authentication method mainly comprises the steps of generating and disclosing a system parameter by a server based on a safety parameter; transmitting identity identification of a user to the server by user terminal, generating the public key and the private key of a user by the server according to the identity identification and the system parameter of the user, and transmitting the public key and the private key of the user to the user terminal; and performing mutual authentication and session key negotiation by means of the public key and the private key of the user between the server and the user terminal. The embodiment of the invention provides the identity-based authentication method and the identity-based authentication system with secret key negotiation. The identity-based authentication method and the identity-based authentication system can realize mutual authentication between the client and the server. Furthermore in the mutual authentication process, session key is negotiated and authentication can be effectively and safely realized by means of basic operation on an elliptical curve. The identity-based authentication method and the identity-based authentication system can be widely applied in electronic commerce.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to an identity-based authentication method and system with key negotiation. Background technique [0002] With the continuous development of science and technology and the rapid dissemination of information, trusted security has received extensive attention and research. Two large international organizations related to trusted security have emerged, namely the trusted computing group (trustedcomputinggroup) and the global platform organization (GlobalPlatform). It is applied to mobile devices, and the global platform organization has developed a trusted execution environment (trusted execution environment) standard, which aims at the trusted security of mobile devices and is applied in practice. With the continuous development of e-commerce and the rapid popularization and application of mobile devices, trusted security has entered every aspect of life. [0003] Ke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 亓延峰郭宝安徐树民田心刘振王卓
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products