Identity-no-pairing-based secret key agreement method for wireless network cross-domain switching authentication

A switching authentication and key negotiation technology, applied in the field of key negotiation, can solve problems such as difficulty in resisting temporary private key leakage attacks, and achieve the effects of resisting temporary private key leakage attacks, reducing computing overhead, and improving efficiency

Active Publication Date: 2017-11-17
SOUTHWEST JIAOTONG UNIV
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the situation where the attacker uses his own ability to obtain the temporary private key of both parties, the attacker can generate the session key negotiated between the user and the authentication server in the foreign region, so this method is difficult to resist the temporary private key disclosure attack initiated by the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] A key agreement method for identity-unpaired wireless network cross-domain handover authentication, the steps of which are:

[0028] A. Apply for switching

[0029] When the user moves to a foreign region, the user sends a switch authentication request to the foreign region authentication server to access the foreign region; the switch authentication request includes: the public temporary identity TID of the user U , the key K shared between the user and the home domain authentication server generated by the user using bilinear pairing mapping UH , for the user's real identity ID U , user timestamp T U and the user's temporary public key R UF The ciphertext information after encrypting the message; the authentication server in the foreign region forwards the switching authentication request of the user to the authentication server in the home region;

[0030] The user's temporary identity TID U Generated by the following operation: the user randomly selects a posit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity-no-pairing-based secret key agreement method for wireless network cross-domain switching authentication. According to the method provided by the invention at a request handover stage, a bilinear pairing operation that is generated by a user and is involved in secret key sharing with a home-domain authentication server is replaced, so that the calculation cost of the user is lowered; and at a user identity authentication stage, the home-domain authentication server calculates a secret key shared with the user to realize consistency with the shared key generated by the user and the bilinear pairing operation for shared key calculation by the home-domain authentication server is replaced. With the method, because no bilinear pairing operation is applied to the user and the home-domain authentication server, the switching authentication efficiency is improved. At the key agreement stage, the session key for agreement between the user and a foreign-domain authentication server not only includes temporary keys of the two sides but also includes respective long-term private keys; and as long as the long-term private key of one side is not leaked, the security of the agreement session key is ensured, so that the attack of the temporary keys leakage is resisted.

Description

technical field [0001] The invention relates to a key negotiation method for identity-unpaired wireless network cross-domain handover authentication. Background technique [0002] In a wireless network, seamless and secure handover of users across domains is one of the important services, that is, when a user moves from the home domain to a foreign domain, the connection can be maintained without restriction. In order to achieve secure handover, the authentication server in the foreign region needs to authenticate the user's identity and negotiate the session key. However, since the authentication server in the foreign region does not have the user's registration information, the authentication of the mobile user is realized through the participation of the authentication server in the home region, which constitutes an authentication key negotiation process involving three parties. On the basis of secure switching authentication and key negotiation, it should also provide u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W36/14
CPCH04W12/02H04W12/04H04W12/06H04W36/14
Inventor 张文芳雷丽婷王小敏
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products