Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication and cipher key negotiation method under multi-server architecture

A key agreement, multi-server technology, applied in electrical components, transmission systems, etc., can solve problems such as difficulty in server update, achieve the effect of achieving anonymity, reducing storage overhead, and protecting privacy

Active Publication Date: 2018-08-14
KOAL SOFTWARE CO LTD
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The technical problem to be solved by the present invention is: Considering the existing multi-server architecture in the process of authentication and key agreement between the user and the multi-server: 1. The user is blocked by any server, other users or other malicious The problem of attackers linking cross-server behavior; 2. The amount of data stored by users for login authentication and key negotiation is linearly related to the number of servers, and it is difficult to update when servers increase. Therefore, a multi-server architecture is provided. authentication and key agreement method to solve the above problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication and cipher key negotiation method under multi-server architecture
  • Authentication and cipher key negotiation method under multi-server architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the technical means, creative features, goals and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0038] see figure 1 and figure 2 , shown in the figure is an authentication and key agreement method under a multi-server architecture of the present invention, comprising the following steps:

[0039] Step 101, system establishment

[0040] In this embodiment, the SM3 algorithm is selected as the hash function h, and the key derivation function KDF is constructed using the SM3 algorithm, and the selected function is made public.

[0041] Step 102, user registration

[0042] User U selects ID, password PW, extracts biometric value BIO, and calculates P=h(PW||BIO), and then submits ID and P to registration center RC through a secure channel.

[0043] After the registration center RC receives the ID and P, it calculates A=h(ID||x), C=h(ID||h(...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication and cipher key negotiation method under a multi-server architecture. The authentication and cipher key negotiation method comprises steps that 1) a system isestablished; 2) users register on a registration center; 3) users and servers are used for the authentication and the cipher key negotiation. The authentication and cipher key negotiation method is advantageous in that a single-time registration function and a multi-point registration function can be realized, and the participation of the registration center in the authentication and cipher key negotiation process is not required; the anonymity of the users can be realized, and the servers cannot acquire the identities of the users, and then the privacy of the users can be well protected; andat the same time, the unlinkability of different servers is realized, and attackers cannot establish the connection among the users and the plurality of servers; and finally, according to the invention, the adding of the server only requires the communication between the registration center and the new server, and the users are not required to carry out any operation.

Description

technical field [0001] The invention belongs to the technical field of computer and information security, and specifically relates to an authentication and key negotiation method under a multi-server architecture, which can realize that the data storage capacity for user login authentication and key negotiation does not increase with the increase in the number of servers, and simultaneously realizes The user's login authentication and key agreement behavior cannot be linked across servers. Background technique [0002] With the extensive development of information technology and Internet technology, there are more and more servers in the network that provide services to the outside world. In a general server system, it is composed of many servers with different services and functions. When a user logs in to the server, authentication and key negotiation are required. Under the multi-server architecture, it is generally composed of users, registration center RC and servers....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/06H04L63/061H04L63/0815H04L63/1441
Inventor 杨文山任伟
Owner KOAL SOFTWARE CO LTD