Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity-based distributed authentication method and system in a multi-server environment

A multi-server and authentication method technology, applied in the field of identity-based distributed authentication generation methods and systems, can solve problems such as key disclosure attacks

Active Publication Date: 2021-09-24
WUHAN UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In these protocols, the user needs to directly use or restore the private key to generate the authentication message during the authentication process, causing key disclosure attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-based distributed authentication method and system in a multi-server environment
  • An identity-based distributed authentication method and system in a multi-server environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In the following description of the present invention, RC means a registration center, which is responsible for selecting coefficient parameters, generating master private keys, and generating user and server private keys. G 1 is an additive cyclic group of order prime q, G T is a multiplicative cyclic group of order prime q. When two integers are multiplied (or integer symbols multiplied), if there is no ambiguity, the multiplication sign "·" is omitted, for example, a·b is simplified to ab. When multiplying integers and points, do not omit the multiplication sign "·" if there is no ambiguity. For example, a·P cannot be simplified to aP.

[0052] mod q represents the modulo q operation, and the priority of the modulo q operation is the lowest, for example, a+b(mod q) is equivalent to (a+b)modq, and ab mod q is equivalent to (ab)mod q. "≡" represents a congruence formula, that is, a≡b(mod q) is equivalent to a(mod q)=b(mod q). gcd(a, b) means finding the greatest co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity-based distributed authentication method and system in a multi-server environment. First, the registration center is U i Generate (R i ,s i ), and a pair of random numbers. for S j Generate (R j ,s j ), and generate a public-private key pair; send a key pair to a party P 1 , sending another key pair to the other party P 2 . Two devices P participating in the authentication process 1 and P 2 , generate a random number respectively. P 1 Calculation (C 1 ,C,X 1 ) and send it to P 2 . P 2 Calculation (C 2 , X 2 ) and send it to P 1 . P 1 Decrypt C 2 , get the signature τ i , after the signature verification is passed, P 1 Publish the generated signature (X i , τ i ). User encrypted signature generation C 3 sent to the server and to C 3 Decrypt and verify the correctness of the signature, and do MAC to get C 4 and sent to the user. user authentication C. 4 , if correct, mutual authentication. The invention can guarantee the security of the private key.

Description

technical field [0001] The invention belongs to the field of information security, in particular to an identity-based distributed authentication generation method and system in a multi-server environment. Background technique [0002] With the diversification of information and the rapid development of digitization, many affairs are carried out on the Internet, such as e-commerce, e-government and so on. Completion of these electronic transactions usually involves multiple parties, requiring multiple parties to confirm the correct identity of other parties to ensure the authenticity and confidentiality of the transaction. The identity authentication protocol allows participants to prove their identities and verify the legitimacy of the identities of other participants, and finally negotiate a common session key to achieve secure communication in an open network, which is one of the important mechanisms to achieve secure network communication . [0003] The first key agreem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32
CPCH04L9/008H04L9/0863H04L9/0869H04L9/3247
Inventor 何德彪张韵茹王婧冯琦
Owner WUHAN UNIV