Anonymous authentication method based on security hardware

An anonymous authentication and hardware technology, applied in electrical components, transmission systems, etc., can solve the problems of low authentication efficiency, high storage cost and high computing cost, and achieve the effect of reducing storage cost, computing cost and communication cost.

Inactive Publication Date: 2017-08-18
ANHUI UNIVERSITY
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the deficiencies in the above-mentioned prior art, the present invention provides an anonymous authentication method based on secure hardware, in order to effectively solve the high storage cost and calculation cost and authentication efficiency in the anonymous authentication process of the client in the existing mobile network Low problem, while improving the privacy of the client and the security of the application server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous authentication method based on security hardware
  • Anonymous authentication method based on security hardware
  • Anonymous authentication method based on security hardware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0081] Among the existing schemes based on the verification table, such as the scheme of Liu et al. Among the existing schemes based on the pseudonym pool, such as Zhao's scheme. To achieve RSA1024 bit security level, bilinear mapping e:G 1 ×G 1 →G 2 Group G of order q in 1 defined on the elliptic curve y 2 =x 3 On +x(modp), where p is a 512-bit large prime number, and q is a 160-bit Solinas prime number. Some of the main cryptographic operations are defined as follows, T P Indicates the running time of a bilinear pairing operation, T E Indicates the running time of a power operation, T SM Indicates the running time of a pairing-based multiplication operation, T H Indicates the running time of a hash-to-point hash operation. In the Inter(R)PXA270 624MHZ processor and the personal digital device hardware environment of the Linux system, the running time results of each operation obtained by using the MIRACL cryptographic function library are as follows: T P =96.20ms,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous authentication method based on security hardware. The method is characterized in that the method is applied to an internet environment that consists of a trusted center, a plurality of mobile clients and a plurality of application servers. The method comprises the following steps: 1, the trusted center generates system parameters as well as private keys and public keys of all participants; 2, any of the mobile clients generates a signature; 3, the mobile clients generate keys and ciphertexts; 4, the security hardware decrypts with the keys and resigns the signatures; 5, the application servers authenticate the re-signatures, generate authentication codes, and send the authentication codes to the mobile clients; and 6, the mobile clients authenticate the authentication codes and obtain subsequent services from the application servers. By adopting the anonymous authentication method disclosed by the invention, the problem of high storage cost and calculation cost and low authentication efficiency in an anonymous authentication process of the clients in an existing mobile network can be effectively solved, and meanwhile, the privacy of the clients and the security of the application servers can be increased.

Description

technical field [0001] The invention relates to the technical field of data encryption and anonymous identity authentication, in particular to an anonymous authentication method suitable for protecting user identity privacy and data confidentiality in mobile networks. Background technique [0002] In the general client-server network model that requires anonymous identity authentication, there are mainly two different parties: the client and the server. When a client requests a service from a server, the server can provide services to the client only after confirming the legitimacy of the client's identity. At present, the identity anonymity of the client is mainly reflected in two aspects: on the one hand, it only anonymizes other users in the network and publishes identity information to the server; on the other hand, it not only anonymizes other users in the network, but also anonymizes the server. Obviously, the latter has a higher level of privacy. Application scenari...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0853
Inventor 石润华邓云霞郑立伟仲红崔杰张顺
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products