Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Privacy protection identity authentication method supporting thin client under blockchain PKI (Public Key Infrastructure)

A thin client and privacy protection technology, applied in the field of information security, can solve problems such as difficulty in completing identity authentication services based on blockchain PKI, limited storage capacity and computing power, and inability to download blockchains, so as to prevent man-in-the-middle attacks, The effect of protecting data privacy and protecting query privacy

Active Publication Date: 2018-11-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF11 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This patented technique uses techniques like PIR or other similar methods to support securely storing and accessing digital signatures on remote servers without compromising their security measures by requiring them be stored separately from each other's databases. It also ensures that queries can only access specific parts of the database instead of all overall improving efficiency when performing certain functions within an organization.

Problems solved by technology

This technical issue addressed in this patented text relating to how current systems use Public Keys or Digital Signatures (PKIs), both being vulnerabilities with multiple points of failures due to attacks like manhoursaving or malware injection. While Bitcoins allows securely storing large amounts of complex mathematical functions called hashes over time, they also require high computational resources at their disposal compared to classical algorithms like Diffie Hellman algorithm.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Privacy protection identity authentication method supporting thin client under blockchain PKI (Public Key Infrastructure)
  • Privacy protection identity authentication method supporting thin client under blockchain PKI (Public Key Infrastructure)
  • Privacy protection identity authentication method supporting thin client under blockchain PKI (Public Key Infrastructure)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] The thin client Bob needs to verify that the identity information is ID A , let d=2, l=3, have k=9, m=4. Bob chooses 8 identity IDs arbitrarily, which are ID B , ID C ,...,ID I . Such as figure 2 As shown, the 9 identity information ID A , ID B ,...,ID I Put it into a 3×3 grid after obfuscation, and use the position vector (1, 2) to represent the ID A position in the grid. Next, Bob generates two random vectors By calculating the ID A The position vector (1, 2) and XOR to get two new vectors Subsequently, Bob sends the same 3×3 grid and two different vectors to all four full-node users, specifically, to C 00 send vector to C 01 send vector to C 10 send vector to C 11 send vector

[0052] Full node user C 00 Find Get the position vector (3, 1). The position vector (3, 1) corresponds to the identity information ID H , so C 00 Traverse the blockchain to obtain the public key PK H , and the result X 1 = PK H Return to Bob; C 01 Find ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection identity authentication method supporting a thin client under a blockchain PKI (Public Key Infrastructure), and belongs to the technical field of information security. The method disclosed by the invention comprises the following steps of: system initialization, generation of an authentication request, generation of an inquiry request, an inquiry stage,a detection stage, a confirmation stage and session establishment. The method disclosed by the invention utilizes technologies of PIR (Private Information Retrieval) and the like, so that the methodsupports the thin client with limited storage capacity and calculation capacity in a blockchain to complete user identity authentication in the decentralized PKI, and meanwhile, the inquiry privacy ofthe thin client is protected. According to the invention, a blockchain-based PKI technology is used, so that problems of single point failure, difficulty in mutual trust among multiple CAs (Certificate Authorities) and the like of a conventional PKI; the PIR technology is utilized, so that an identity authentication function of the thin client under the decentralized PKI is achieved; the PIR technology is utilized, so that the data privacy in the inquiring process of the thin client is protected; and a random number is added in the authenticating process so as to prevent a man-in-the-middle attack and ensure that a message cannot be counterfeited or tampered in the authenticating process.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products