Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Realization method of perfect forward security deniable key exchange protocol of online bidding system

A key exchange protocol and forward security technology, which is applied in the online bidding system to improve the field of forward security deniable key exchange protocol implementation, and can solve the problems of increasing protocol burden, losing deniability, and not knowing the construction method. Improve the effect of forward security and strong security

Inactive Publication Date: 2018-01-05
SOUTH CHINA NORMAL UNIVERSITY
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The protocol uses the Schnorr signature as a PoK scheme to construct, allowing the sender to prove the knowledge of the proof without revealing it, so the protocol cannot achieve complete deniability
The YAK protocol is weakly forward secure, and has not achieved perfect forward security
[0008] In 2011, Cremers and Feltz proposed that it is possible to obtain perfect forward security and deniability at the same time by using a signature method to construct a round of authentication key agreement. far from full deniability
However, this construction method requires participants to share an additional key, which obviously increases the burden of the protocol.
And so far it is not known whether the construction method is always completely deniable, the author did not give the corresponding proof
[0010] In 2015, Florian Bergsma and others proposed the ORKE protocol, which has good security properties and achieves perfect forward security, but it does not have complete deniability, because the protocol also uses a signature scheme to construct the protocol and thus loses completeness. Repudiation
[0011] From the above analysis, it can be seen that there is currently no round of authenticated key exchange that has both complete deniability and perfect forward security to meet the application requirements of deniable forward security in online bidding systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realization method of perfect forward security deniable key exchange protocol of online bidding system
  • Realization method of perfect forward security deniable key exchange protocol of online bidding system
  • Realization method of perfect forward security deniable key exchange protocol of online bidding system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0071] The present invention defines the non-interactive Designated Verifier Proof of Knowledge (DV-PoK) and proposes an efficient non-interactive Designated Verifier Proof of Knowledge scheme, and then combines the non-interactive Designated Verifier Proof of Knowledge (DV-PoK) scheme and Diffie-Hellman protocol to construct a round of deniable authenticated key exchange protocol (DAKE protocol), which has both perfect forward security and complete deniability. Such as figure 1 As shown, it specifically includes the following steps:

[0072] Non-interactive Designated Verifier Proof of Knowledge (DV-PoK) definition:

[0073] The present invention formally defines the concept of non-interactive designated authenticator's knowledge proof, which has completeness, special reliability, adaptive zero-knowledge, unforgeability and symmetry. The unforgeability and symmetry make the protocol constructed by the present invention have perfect forward security and complete denia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a realization method of a perfect forward security deniable key exchange protocol of an online bidding system. The realization method comprises the following steps: S1, defining a non-interactive specified verifier knowledge certificate which has completeness, special reliability, self-adaptive zero knowledge, unforgeability and symmetry, wherein a constructed protocol is provided with the perfect forward security and the complete deniability through the unforgeability and the symmetry; S2, constructing a non-interactive specified verifier knowledge certificate scheme;S3, constructing a round of deniable authentication key exchange protocol through a Diffie-Hellman type protocol, wherein the deniable authentication key exchange protocol is provided with the perfectforward security and the complete deniability at the same time. Through the realization method disclosed by the invention, the round of authentication key exchange protocol with completely deniable forward security is constructed, a good combination is achieved on the security and the efficiency, and a demand of the current electronic bidding system is satisfied.

Description

technical field [0001] The invention relates to the technical field of perfecting forward security authentication, and more specifically, relates to a method for realizing a perfect forward security deniable key exchange protocol in an online bidding system. Background technique [0002] The online bidding system has been widely used, but the user's privacy and rights have not been well protected in the bidding system. Therefore, it is urgent to design a protocol for protecting user privacy and rights, and at the same time has a perfect forward security authentication protocol to meet the application requirements of deniable forward security in the online bidding environment, so as to prevent malicious receivers from revealing secrets, and illegal first Three-way fraud, threats to the sender. It belongs to the field of information security. [0003] With the development of domestic e-commerce, e-commerce has developed very rapidly since the formal launch of e-commerce in m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06G06Q30/08
Inventor 王立斌杨景添
Owner SOUTH CHINA NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products