A Key Exchange Protocol Based on Location and Password
A technology of key exchange protocol and password, applied in the field of key exchange protocol
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] The present invention needs to solve the problem that the four verifiers verify the location information and password information of the new entrant synchronously, negotiate to generate a high-entropy session key, and provide a security key for the next step of confidential communication. Specifically, the following issues need to be addressed:
[0024] 1) How do the four verifiers determine the location information of the joining party and verify their location information synchronously;
[0025] 2) How does the new joiner verify the password information of the four verifiers and generate a high-entropy session key at the same time;
[0026] 3) How four verifiers can generate the same high-entropy session key while verifying the joining party's location and password information.
[0027] The invention provides a security protocol for generating a session key by combining a password and a location to authenticate a joiner in wireless communication. Specifically, in wi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


