An Identity-Based Anonymous Authentication Method and System

An anonymous authentication and identity technology, applied in the field of information security, can solve problems such as threats to the rights and interests of other users, system security, etc.

Active Publication Date: 2020-08-07
WUHAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when restoring the private key, the user who has obtained the complete private key can perform illegal authentication without the knowledge of other parties, threatening the rights and interests of other users and the security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity-Based Anonymous Authentication Method and System
  • An Identity-Based Anonymous Authentication Method and System
  • An Identity-Based Anonymous Authentication Method and System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be described in detail below in conjunction with examples. The following embodiments only show that the present invention is a possible implementation, not all possible implementations, and are not intended to limit the present invention.

[0041] In the following description of the present invention, the authenticated party is referred to as the user for short, and the authenticating party is referred to as the server for short. When two integers are multiplied (or integer symbols multiplied), if there is no ambiguity, the multiplication sign "·" is omitted, for example, a·b is simplified to ab. mod n means modulo n operation, and the priority of modulo n operation is the lowest. For example, a+b mod n is equivalent to (a+b) mod n, and ab mod is equivalent to (ab) mod n. "≡" represents a congruence formula, that is, a≡b mod n is equivalent to a mod n=b mod n. gcd(a, b) means finding the greatest common factor of integers a and b, if gcd(a, b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity-based anonymous authentication method and system. The method comprises the following steps: a server generates two partial private keys and sends the same to double parties P1 and P2 participating in the authentication respectively, wherein P1 and P2 generate a main authentication code (the formula is described in the specification) and R in an authentication process, and the privacy and reliability of the interactive information between P1 and P2 are ensured by using zero knowledge proof; after the P1 obtains the main authentication code, the P1 generatesa pseudo-address AID, generates a third temporary public key R3, calculates a final authentication code alpha, and sends the authentication information (AID, R, R3, alpha, T) the server, and the server verifies the authentication information and feeds back the authentication information to a user, after the successful completion of three times of handshake, the server can establish secure communication with the user. The identity-based anonymous authentication method and system are suitable for jointly completing identity-based distributed anonymous authentication without exposing the respective partial authentication private keys of the both parties together, the both parties holding the partial private keys must participate in the authentication at the same time, and the complete authentication private key does not need to be restored.

Description

technical field [0001] The invention belongs to the field of information security, in particular to an identity-based authentication method and system. Background technique [0002] Anonymous authentication protocols are an important part of network security communication. By implementing an anonymous authentication protocol, two participants can authenticate each other on a public channel and negotiate a session key for secure communication in an open network. In an anonymous protocol based on traditional public-key cryptography authentication, both parties to the communication have a pair of public and private keys: a public key and a private key, where the private key is used to generate authentication information, and the public key is used to verify the legitimacy of the information. In order to solve the difficult problem of certificate management in the anonymous authentication protocol based on traditional public key cryptography, researchers use the idea of ​​publi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/08H04L9/32H04L29/06
CPCH04L9/008H04L9/0825H04L9/0847H04L9/0869H04L9/0894H04L9/3218H04L9/3242H04L63/0853
Inventor 何德彪王婧冯琦
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products