Identity-free three-factor remote user authentication method

An authentication method and technology for remote users, applied in the field of remote user authentication, can solve problems such as reducing user experience and system fault tolerance, and violating three-factor authentication, achieving the effect of untraceability and anonymous login.

Inactive Publication Date: 2016-08-17
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF7 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, in the current remote user authentication scheme based on three factors, the user is required to enter the user name in addition to the password, smart card, and identity provided by the user. Experience and System Fault Tolerance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-free three-factor remote user authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] Specific embodiments of the present invention are described in detail below.

[0030] In step 1, the server initializes the elliptic curve E over the field GF(p) p And generate server private key s and public key PK=sP, select a one-way hash function h(·) and fuzzy extraction function {Gen(·), Rep(·,·)}. Finally, the server publishes the system public parameters p , h(·), Gen(·), Rep(·,·)>.

[0031] In step 2, the following stages are specifically included:

[0032] User U i Just select PW i Instead of selecting a user identity and entering biometric information Bio i , generated by fuzzy extraction function (σ i , θ i ) = Gen(Bio i ), where σ i is the eigenvalue, and θ i for auxiliary strings. Afterwards, the client generates h(σ i ||n b ) and send it to the server as a registration request through a secure channel, where n b is a random number.

[0033] The server receives user U i The registration request h(σ i ||n b ), generate a random number n i ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of multi-factor authentication protocols and discloses an identity-free three-factor remote user authentication method. Identity-free three-factor authentication is realized through elliptic curve based public key cryptography. The method includes steps: 1, a server generates a public and private key pair and other public parameters; 2, a user submits registration information to the server, and a registration center returns corresponding data or a smart card; 3, the user inputs a password and biological features and inserts the smart card to calculate registration parameters which are sent to the server, and by corresponding data exchange between the user and the server, authentication and key agreement are realized, and a session key is generated. On the basis of a remote user authentication environment, user authentication can be smoothly realized through the server without identity input; on the basis of three-factor authentication with the password, the smart card and the biological features involved, safety of the method is guaranteed, and all referred attacks can be resisted, and the method is applicable to fields of security, finance and the like high in safety requirement.

Description

technical field [0001] The invention relates to a three-factor remote user authentication method without user identity, in particular to a remote authentication method using elliptic curve cryptography and based on passwords, smart cards and biometric features. Background technique [0002] Authentication methods based on passwords, smart cards and biometric features are more practical and safe and effective authentication mechanisms in remote computer systems. At present, this type of solution has been initially applied in real life, mainly including some application scenarios with high security requirements, such as electronic banking and other fields. However, the type of authentication schemes that have been proposed so far are still insufficient in terms of user experience and system security. For example, in all current solutions, users must be required to provide and enter their user identity or user name when registering and logging in, but this process violates the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/3066H04L9/3231
Inventor 熊虎苑晨陈伟闫东杰范鹏程卢震宇
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products