A leak-resistant group user authentication key agreement method and system

A technology of key agreement and user authentication, which is applied in the anti-leakage group user authentication key agreement method and system field, can solve the problems of not considering, measuring channel attacks, and suffering some actual attacks, etc., and achieves high efficiency, High security, no need for hardware support

Active Publication Date: 2021-01-15
HUBEI UNIV OF TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Especially in the public environment, for example, in the Internet of Things, mobile Internet or Ad Hoc network, since most of the nodes are exposed in the public environment, they are vulnerable to channel measurement attacks
The effectiveness of this new type of attack is sometimes much higher than that of cryptanalysis, because it does not require complex mathematical calculations or expensive special equipment, which poses a serious threat to equipment or system security.
[0004] In the traditional group authenticated key exchange (Group Authenticated Key Exchange, AGKE) scheme, the researchers did not consider this kind of leakage attack, on the contrary, they assumed that the internal state information of the cryptosystem is completely confidential, and here assume Therefore, the AGKE scheme in this sense cannot maintain the security of the scheme in a real leakage environment, and has even suffered some actual attacks
At present, in response to the above problems, engineers usually use some physical means, such as masking technology, hiding technology, etc., to eliminate this type of leakage attack, and assume that the real environment is close to the theoretical environment at this time, but due to the inability to accurately define and theoretical analysis, the rationality of this assumption cannot be well demonstrated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A leak-resistant group user authentication key agreement method and system
  • A leak-resistant group user authentication key agreement method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0025] please see figure 1 , an anti-leakage group user authentication key agreement method provided by the present invention, specifically comprising the following steps:

[0026] Step 1: System initialization, generate public-private key pair according to user identity;

[0027] Step 1.1: The system is a group composed of n users, each user is defined as U 1 ,...,U n ,n=poly(κ), each user U i Calculation (sk i ,pk i ) = KeyGen(1 κ ) to generate their respective public and private keys (sk i ,pk i ); where n represents the number of system users, κ rep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anti-leakage group user authentication key negotiation method and system. The anti-leakage group user authentication key negotiation system is a group composed of n user members; each user has a pair of private and public keys; and the key has a public key encryption algorithm which can meet adaptive selection of plaintext afterward leakage attack security and specifically comprises a key generation algorithm, an encryption algorithm and a decryption algorithm. The method comprises five parts, including, system initialization, first interaction for generation of message parameters, second interaction for generation of public parameters, third interaction for generation of key parameters, and authentication key negotiation for verification of the key parameters and generation of a system communication key. The anti-leakage group user authentication key negotiation method and system have reached to the provable safety in cryptology, are high in safety, can be still implemented safely and stably in a leakage environment and have very high practicability; by combining with a public key encryption algorithm, an anti-leakage group authentication key negotiationprotocol is provided, and a scheme efficiency is increased.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an anti-leakage group user authentication key negotiation method and system. In particular, it relates to an authentication key agreement method and system that resists leakage attacks in group communication in combination with cryptographic tools in view of the characteristics that communication may be leaked by attackers during the interaction process of group members in an actual environment. Background technique [0002] With the rapid development of the Internet of Things, mobile Internet, industrial Internet, and cloud computing, more and more group communication methods are popular in people's lives, such as voice or video conferencing, online TV on demand, group chat, online teaching, live broadcast, etc. Group-oriented web application. On the one hand, such an interactive method makes people's communication more convenient and faster, and promotes the rise of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08
CPCH04L9/0825H04L9/0838
Inventor 阮鸥王子豪周靖廖雅晴杨阳黄雄波
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products