TLS handshake protocol for identity-based cryptosystem

A technology of identity password and handshake protocol, which is applied in the field of basic communication, can solve problems such as high delay and large amount of calculation, and achieve the effects of reducing network delay, high security, and saving network traffic and memory

Active Publication Date: 2016-10-26
NAT UNIV OF DEFENSE TECH
View PDF3 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In view of the above situation, in order to overcome the defects of the existing technology, the purpose of the present invention is to provide a TLS handshake protocol and deployment method based on the identity cryptography system, which can effectively solve the problem of certificate lookup, Problems such as high delay and large amount of calculation caused by transmission, verification, etc., while ensuring security, improve the performance of the handshake protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TLS handshake protocol for identity-based cryptosystem
  • TLS handshake protocol for identity-based cryptosystem
  • TLS handshake protocol for identity-based cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The specific embodiment of the present invention is described in detail below in conjunction with accompanying drawing;

[0058] The purpose of the present invention is to propose an identity-based TLS handshake protocol, which can get rid of the troubles of certificate transmission and verification, simplify the handshake process, complete the authentication of both parties at the same time, and establish a secure session. The present invention will be described below in conjunction with a specific embodiment in which a user Alice (abbreviated as A) in the same domain initiates a secure connection to a user Bob (abbreviated as B). In this embodiment, a credible self-trust authority (Self-Trust Authority, STA) in the domain completes the task of the PKG.

[0059] Such as Figure 1-2 Shown, overall process of the present invention comprises the following steps:

[0060] 1) Establishment of an identity-based cryptographic system and distribution of private keys;

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a TLS handshake protocol for an identity-based cryptosystem, and in particular relates to the field of basic communication of trusted security networks. The problems of high delay, high calculation amount and the like due to finding, transferring, verifying and the like of a certificate in a TLS handshake process in the traditional PKI system can be solved by defining a new ciphersuite; and the handshake protocol performance is improved while the security is ensured. The handshake protocol comprises the following steps of: (1), establishing the identity-based cryptosystem, and distributing secret keys; and (2), handshaking to negotiate a security parameter. The TLS handshake protocol disclosed by the invention has the advantages that: the certificate is unnecessary to send and verify, such that the network flow and the memory are saved; authentication and secret key negotiation are completed simultaneously; the number of messages is reduced; the network delay is reduced while the high security is ensured; and the TLS handshake protocol is perfectly compatible with a TLS by newly increasing a selective ciphersuite and an expansion option.

Description

technical field [0001] The invention relates to the basic communication field of trusted and secure networks, in particular to a TLS handshake protocol based on an identity password system. Background technique [0002] The Transport Layer Security (TLS) protocol is located between the transport layer and the application layer. It is developed on the basis of the Secure Socket Layer (Secure Socket Layer, SSL) protocol and provides authentication, confidentiality and integrity for information transmission. and other security services; [0003] The handshake protocol is the core part of TLS. It completes the functions of cryptographic algorithm negotiation, authentication and session key generation between the client and the server. The certificate issued by the public key infrastructure (PKI) implements authentication and key exchange. On the one hand, certificate query and certificate path construction lead to large computing overhead and time delay. On the other hand, cert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/166
Inventor 王小峰薛天谢岢洋李龙平邢倩倩钟求喜王飞张博锋刘宇靖
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products