Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Password-based Anonymous Entity Authentication Method

A password and entity technology, which is applied in the field of computer technology and information security, can solve problems such as insufficient efficiency, and achieve the effect of effective efficiency and protection of identity privacy

Active Publication Date: 2019-04-09
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for large-scale systems, the efficiency of these schemes is not sufficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Password-based Anonymous Entity Authentication Method
  • A Password-based Anonymous Entity Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0041] Embodiment 1. General construction of a password-based anonymous authenticated key exchange protocol

[0042]Based on the above components, this embodiment aims to give the general structure of the password-based anonymous authenticated key exchange protocol of the present invention. This construction requires that the space of the algebraic message authentication code is consistent with the plaintext space of the password encryption scheme.

[0043] 1. System establishment stage

[0044] Given a security parameter λ, the server generates system parameters and publishes them, and at the same time generates corresponding private keys and stores them secretly. The specific execution steps are as follows:

[0045] 1) Select domain parameters in is a cyclic group of order p, where p is a prime number with at least 2λ bits, and g is the group A generator of .

[0046] 2) Select two independent cryptographic hash functions and H 2 : {0, 1}* → {0, 1} k ,in is th...

Embodiment 2

[0075] Embodiment 2: An example of an efficient password-based anonymous authenticated key exchange method

[0076] This embodiment aims at constructing an efficient instance of an anonymous password-based authentication key exchange method based on a specific algebraic message authentication code scheme, and is a specific instantiation of the general construction described in embodiment 1).

[0077] This embodiment uses an algebraic message authentication code scheme based on q-SDH assumption, denoted as MAC SDH . MAC is given below SDH The specific description of each algorithm and the construction of the corresponding zero-knowledge proof and certificate description proof algorithm:

[0078] 1)keyGen(1) λ ): Input the security parameter λ, select the domain parameter in is a cyclic group of order p, where p is a prime number with at least 2λ bits, and g is the group A generator of . Then, in Randomly select an element γ in the group, and calculate ω←g γ . Fina...

Embodiment 3

[0117] Embodiment 3: Application of the above-mentioned anonymous authentication method in the TLS protocol

[0118] This embodiment aims to provide a method of applying the above-mentioned authentication method under the TLS protocol, which is an example of the application of the instantiation method in embodiment 2 in real life, and the specific application method is as follows:

[0119] Before the TLS connection is established, the user and the server complete the system establishment phase and user registration phase described in Embodiment 2. In the user registration stage, the server also needs to issue an additional digital certificate cert mac . This certificate is issued by the server, and its owner is a virtual entity apake; the certificate includes an elliptic curve parameter and the public key ω, the MAC SDH The public parameters of the scheme; the type of the certificate is apake; the public key signature algorithm is (SigMAC, SHA256), where SigMAC=(Show, Show...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous entity identification method based on a password. The method comprises the following steps that 1) a server generates a private key of the server and a system parameter according to a given safety parameter; 2) a user emits a login request to the server and the server issues a voucher sigma to the user; and then the user encrypts the voucher sigma and stores; 3) when the user logs in the server, the server generates a message Y for the user and carries out signature so as to acquire sigma S, and then (Y, sigma S) is sent to the user; 4) the user uses a public key in the system parameter to verify the (Y, sigma S), and if verification passes, the user generates a message X; 5) the user uses login request information and the sigma to generate a showing certificate sigma C related to a label (X, Y, sigma S); and then (X, sigma C) is sent to the server; and 6) the server verifies whether the (X, sigma C) is legal, and if the(X, sigma C) is legal, anonymous verification of the user passes. In the invention, privacy protection of the user can be realized.

Description

technical field [0001] The invention belongs to the field of computer technology and information security technology, and relates to schemes such as using algebraic message authentication codes, zero-knowledge proofs, digital signatures, password encryption, etc., so that users can protect their privacy while conducting legal identity authentication to the server. The specific performance is as follows: A password-based anonymous entity authentication method. Background technique [0002] With the advent of the era of cloud computing, big data and the Internet of Things, more and more user privacy information is exposed on the Internet. In particular, in recent years, the exposure of a series of privacy information leakage incidents has made users pay more attention to personal privacy protection. In addition, the emergence of "black industry chain" in the network has also exacerbated the leakage of user privacy. The private information of these users may be spread to ever...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06
CPCH04L9/3066H04L9/3221H04L9/3226H04L9/3247H04L63/08
Inventor 张振峰杨糠王宇辰
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products