Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Key agreement method for identity-unpaired wireless network cross-domain handover authentication

A switching authentication and key negotiation technology, applied in the field of key negotiation, can solve problems such as difficulty in resisting temporary private key leakage attacks, achieve the effects of resisting temporary private key leakage attacks, reducing computing overhead, and improving efficiency

Active Publication Date: 2020-01-31
SOUTHWEST JIAOTONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the situation where the attacker uses his own ability to obtain the temporary private key of both parties, the attacker can generate the session key negotiated between the user and the authentication server in the foreign region, so this method is difficult to resist the temporary private key disclosure attack initiated by the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0027] A key agreement method for identity-unpaired wireless network cross-domain handover authentication, the steps of which are:

[0028] A. Apply for switching

[0029] When the user moves to a foreign region, the user sends a switch authentication request to the foreign region authentication server to access the foreign region; the switch authentication request includes: the public temporary identity TID of the user U , the key K shared between the user and the home domain authentication server generated by the user using bilinear pairing mapping UH , for the user's real identity ID U , user timestamp T U and the user's temporary public key R UF The ciphertext information after encrypting the message; the authentication server in the foreign region forwards the switching authentication request of the user to the authentication server in the home region;

[0030] The user's temporary identity TID U Generated by the following operation: the user randomly selects a posit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A key agreement method based on identity-unpaired wireless network cross-domain handover authentication. Reduce the computing cost of the user; in the stage of authenticating the user's identity, the home domain authentication server calculates the shared key with the user, which is consistent with the shared key generated by the user, and replaces the bilinearity in the calculation of the shared key by the home domain authentication server pair operation. The method improves the efficiency of handover authentication by means of no bilinear pairing operation between the user and the home domain authentication server. In the key negotiation phase, the session key negotiated between the user and the authentication server in the foreign region includes not only the temporary private key of both parties, but also their respective long-term private keys. The security of the key is guaranteed, effectively resisting the attack of temporary private key leakage.

Description

technical field [0001] The invention relates to a key negotiation method for identity-unpaired wireless network cross-domain handover authentication. Background technique [0002] In a wireless network, seamless and secure handover of users across domains is one of the important services, that is, when a user moves from the home domain to a foreign domain, the connection can be maintained without restriction. In order to achieve secure handover, the authentication server in the foreign region needs to authenticate the user's identity and negotiate the session key. However, since the authentication server in the foreign region does not have the user's registration information, the authentication of the mobile user is realized through the participation of the authentication server in the home region, which constitutes an authentication key negotiation process involving three parties. On the basis of secure switching authentication and key negotiation, it should also provide u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/02H04W12/04H04W12/06H04W36/14
CPCH04W12/02H04W12/04H04W12/06H04W36/14
Inventor 张文芳雷丽婷王小敏
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products