Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication protocol method based on error correcting code

A technology of identity authentication and error-correcting codes, which is applied to user identity/authority verification, countermeasures against encryption mechanisms, and key distribution. small effect

Active Publication Date: 2016-09-21
东台城东科技创业园管理有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a zero-knowledge identity authentication protocol based on error-correcting codes to solve the problem of heavy communication and storage burden in the authentication protocol based on encoding

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication protocol method based on error correcting code
  • Identity authentication protocol method based on error correcting code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1. An identity authentication protocol method based on an error-correcting code

[0053] Specifically, the system parameters are set as follows: the code length of the quasi-dye error-correcting code C is n=128, the dimension k=64, the codimension r=64, the error-correcting capability of the code w=49, and the finite field F q Among them, q=256, indicating that the number of bits N=8 required by q. Generate a permutation function σ of seed length l σ =128, the output length l of the hash function h =160. In each round of the authentication protocol, the probability that the prover P cheats successfully is about 1 / 2, so the protocol goes through δ=16 rounds, and the probability that the prover P cheats successfully decreases to 2 -16 , can be ignored. Calculated by the following formula, the volume of the check matrix H of the quasi-dye correction code C is N×n=1024bits, the length of the ciphertext y is N×r=512bits, and the length of the key s is N×n=1024...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity authentication protocol method based on an error correcting code. The method comprises the following steps: I, generating a system parameter: a key pair is (sk, pk)=(s,(y, H, w)), wherein sk is a private key, pk is a public key, and a disclosed hash function is h(.); and II, identity authentication: repeatedly executing sub-steps of the step II for [delta] times. The identity authentication protocol method is implemented in a zero-knowledge authentication way, and comprises the system parameter generation step and the identity authentication step. The identity authentication step is further optimized, so that the communication overhead of an authentication protocol is reduced. Meanwhile, the defect that an identity authentication scheme based on a number theory problem is not safe any more under a quantum computer is overcome, and the identity authentication protocol method has the capability of resisting quantum computing and is still safe under the quantum computing.

Description

technical field [0001] The invention belongs to the technical field of the Internet and relates to an identity authentication protocol method based on an error correction code. Background technique [0002] With the continuous development of Internet technology, the legality identification of user identity is a very important issue. At present, widely used identity authentication schemes based on number theory problems require modular exponentiation calculations in the implementation process, which requires high computing power of devices, and is difficult to apply to embedded devices with limited resources. Moreover, the Shor quantum algorithm proposed in 1994 made the cryptosystems based on number theory problems, such as RSA, ECC, etc., no longer safe. [0003] The encryption scheme based on error-correcting codes can resist quantum computing attacks, and its encryption process only needs XOR operation. In 1978, McEliece proposed the first public key cryptosystem based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L9/08H04L9/32H04L29/06
CPCH04L9/002H04L9/0861H04L63/067H04L63/0838H04L63/1441
Inventor 韩牟冯晓林马世典华蕾王运文刘文山
Owner 东台城东科技创业园管理有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products