Anonymous bidirectional authentication method in mobile social network based on single hash function and false identity

A mobile social network and single-item hashing technology, which is applied in the field of anonymous two-way authentication based on single-item hash functions and pseudo-identities, can solve the problems of easy information leakage, large amount of encryption and decryption calculations, etc.

Inactive Publication Date: 2016-08-17
HUNAN UNIV OF SCI & ENG
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problems of large amount of encryption and decryption calculations and easy leakage of information existing in the existing mobile social process, the present invention proposes a new

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous bidirectional authentication method in mobile social network based on single hash function and false identity
  • Anonymous bidirectional authentication method in mobile social network based on single hash function and false identity
  • Anonymous bidirectional authentication method in mobile social network based on single hash function and false identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0057] The following typical mobile social network scenario: Each user carries a smart mobile terminal, and can communicate with each other through WIFI or 4G. When they want to participate in social activities such as making friends on the mobile social network, they will respectively start the The same mobile application APP and initiates a registration request to the trusted server TTP that provides the service. Due to the privacy of these information, users hope to ensure that other irrelevant private information is not disclosed while obtaining the calculation results of common interests (attribute intersection) between users. The attribute matching model of mobile social network is as follows: figure 1 shown.

[0058] The specific process of the method of the present invention is as figure 2 As shown, the specific example steps are as follows:...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous bidirectional authentication method in a mobile social network based on the single hash function and the false identity. The self characteristic attributes of users are subjected to hash through the function characteristic of the single hash function, the hash result and the identifiers of the users are encrypted and sent to a TTP through a public key. After the TTP authenticates the permission of the users, the hash results of different users are compared, and therefore the similarity of the attributes of the users is obtained. In the process, the TTP sends the respective identifiers to the matched users to help the user to establish an identical shared key, then the TTP encrypts the matched attribute set through the key negotiated by the users and sends the matched attribute set to the users participating in friend making. The access permission of the users is controlled through an identity authentication and key negotiation dual-authentication mechanism, and the calculating and storage loads of an intelligent user terminal are relieved through the strong calculating and storage capacity of the TTP.

Description

technical field [0001] The invention relates to the field of computer science and technology, in particular to an anonymous two-way authentication method based on a single-item hash function and a pseudo-identity in a mobile social network. Background technique [0002] With the development of smart mobile terminal devices (smart phones, tablet computers, etc.), mobile social network software has been rapidly applied on smart phones and tablet computers, such as WeChat, Meituan, and Zhiquan. In mobile social networks, users can find potential friends with the same or similar hobbies as themselves by sharing their personal configuration files with other users for feature matching, which has become an important application in mobile social software. The profile of personal interests and hobbies attributes can be automatically generated by the dating APP software installed on the user's smart terminal (for example: generated according to the points of interest of the user brows...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/321H04L9/3236H04L63/0421H04L63/0869H04L63/0876H04L63/1466
Inventor 罗恩韬
Owner HUNAN UNIV OF SCI & ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products