Method and device of two-side authentication secret key negotiation based on certificateless

An authenticated key agreement, certificateless technology, applied in the field of two-party authenticated key agreement based on certificateless, can solve complex certificate management issues and other issues

Inactive Publication Date: 2017-12-05
ZTE CORP
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the above-mentioned technical problems, the present invention provides a method and device for two-party authentication key agreement based on certificates, which can overcome the complex certificate management problems in traditional public key cryptosystems and the inherent problems of identity-based cryptosystems. The key escrow problem, and does not depend on the bilinear pairing operation, improves the efficiency of the system, especially suitable for wireless mobile devices with limited computing power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device of two-side authentication secret key negotiation based on certificateless
  • Method and device of two-side authentication secret key negotiation based on certificateless
  • Method and device of two-side authentication secret key negotiation based on certificateless

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0150] The entities involved in the system of this embodiment are as follows:

[0151] (1) KGC: Responsible for system parameter generation, namely the KGC master key and system public parameter set, and a trusted third party that produces part of the user's private key;

[0152] (2) User A: the original initiating entity of the session;

[0153] (3) User B: the response entity of the session;

[0154] image 3 It is a schematic flowchart of Embodiment 2 of a method for two-party authentication key negotiation based on no certificate provided by the present invention, and the specific steps are as follows:

[0155] Step A, generate KGC master key and system public parameter set; specific steps are as follows:

[0156] Step 1: KGC operation system parameter production algorithm: KGC according to the set security parameters k∈Z + , select two k-bit large prime numbers p and q and satisfy q|p-1, and generate a prime field elliptic curve E / F P Additive cyclic group G with upp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and device of two-side authentication secret key negotiation based on certificateless. The device comprises a parameter module and a negotiation module, a system public parameter set and the master key, part of secret keys, the secret value, the private key and the public key of a key generation center (KGC) are generated, and the two-side secret key negotiation is performed so as to overcome the problem of complex certificate management in a traditional public key cryptosystem and the problem of inherent secret key trusteeship based on the identity of the cryptosystem, and the method and device of two-side authentication secret key negotiation based on certificateless do not depend on the bilinear pairing operation so as to improve the system efficiency and are specially suitable for a wireless mobile device with limited capability.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and device for non-certificate-based two-party authentication key negotiation. Background technique [0002] At present, key agreement is an important cryptographic primitive, which can ensure that two or more users establish a shared session key by exchanging information in an open network environment, and the users participating in the communication pass the shared session key To encrypt and decrypt communication data to ensure the security of network communication. Among them, authenticated key agreement is a key agreement with authentication (explicit authentication or implicit authentication) function, which can provide the authentication function of the identity and key of the communication user, so that it can effectively resist the third party s attack. [0003] In the prior art, most of the authentication key agreement methods are proposed under t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0844H04L9/08
Inventor 刘勇张家明陆小慧
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products