Traceable anonymous authentication method based on elliptic curve

An elliptic curve, anonymous authentication technology, applied in wireless communication, public key of secure communication, user identity/authority verification, etc., can solve the problems of untraceable identity of signers, leakage of privacy of sending nodes, etc., and achieve resistance and denial of service effect of attack

Inactive Publication Date: 2016-07-27
GUANGDONG UNIV OF PETROCHEMICAL TECH
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0020] The technical problem to be solved by the present invention is: based on elliptic curve cryptography technology, using ring signature technology to realize anonymous communication, solving the problem of privacy leakage of sending nodes in wireless sensor networks, ensuring the authenticity and integrity of sending messages; Add some additional information in the ring, and if necessary, the real identity of the signer can be tracked through the cooperation of all nodes in the ring to solve the problem that the identity of the signer cannot be traced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable anonymous authentication method based on elliptic curve
  • Traceable anonymous authentication method based on elliptic curve
  • Traceable anonymous authentication method based on elliptic curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] It will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0060] Please refer to figure 1 , the application basis of the traceable anonymous authentication method based on the elliptic curve of the present invention is: the Sink in the wireless sensor network is a convergence node, which is mainly responsible for the connection between the sensor network and the external network, and can also be regarded as a gateway node; the sink node can Complicated calculations are entrusted to the security server for processing, which is the gateway connecting the wireless sensor network and the external network;

[0061] refer to figure 2 , before the method of the present invention is applied, the system is initialized first, and the security server generates initialization parameters, and the security server is responsible for generating, storing, and distributing security parameters in the entire signature and authentication ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traceable anonymous authentication method based on an elliptic curve. The method comprises following stages of initializing a system and generating a secrete key, generating anonymous signatures, authenticating the signatures, linking and tracing nodes. According to the method, a ring signature algorithm in a data signing process is improved; the ring signatures and the elliptic curve are combined; the linkage performance is increased; moreover, traceability to malicious nodes is provided, thus finding out the malicious nodes efficiently and accurately; the network security is improved; a critical value is unnecessary; an efficient hop-by-hop message authentication mechanism is provided; the privacy leakage problem of sending nodes in a wireless sensor network can be solved; moreover, the reality and integrity of the sent messages are ensured; and the malicious nodes can be traced if necessary.

Description

technical field [0001] The invention relates to the technical field of information security transmission in wireless sensor networks, in particular to a traceable anonymous authentication method based on elliptic curves. Background technique [0002] About Wireless Sensor Networks [0003] A wireless sensor network generally consists of one or more resource-rich base stations and a large number of resource-constrained sensor nodes. It is used to form self-organizing and adaptive groups in different scenarios to detect, collect, process and transmit data. Due to the remarkable characteristics of sensor networks such as easy deployment, self-organization, easy camouflage and strong fault tolerance, it is widely used in civilian and military fields. [0004] The current applications of wireless sensor networks mainly include: [0005] (1) Military field. Used to monitor enemy troops and equipment, real-time status of the battlefield, and search for enemies and attacks. [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04W12/02H04W12/06
CPCH04L9/3066H04L9/3247H04L63/0421H04W12/02H04W12/06
Inventor 舒磊常芬王良民陈媛芳傅树霞
Owner GUANGDONG UNIV OF PETROCHEMICAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products