Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A privacy-preserving identity authentication method that supports thin clients under blockchain pki

A technology for privacy protection and identity authentication, applied in user identity/authority verification, trust model of public key infrastructure, digital transmission system, etc. Based on blockchain PKI identity authentication services and other issues, to achieve the effect of preventing man-in-the-middle attacks, protecting data privacy, and protecting query privacy

Active Publication Date: 2020-05-12
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Such users have limited storage capacity and computing power, cannot download the entire blockchain, and are difficult to complete blockchain-based PKI identity authentication services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A privacy-preserving identity authentication method that supports thin clients under blockchain pki
  • A privacy-preserving identity authentication method that supports thin clients under blockchain pki
  • A privacy-preserving identity authentication method that supports thin clients under blockchain pki

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0051] The thin client Bob needs to verify that the identity information is ID A , let d=2, l=3, have k=9, m=4. Bob chooses 8 identity IDs arbitrarily, which are ID B , ID C ,...,ID I . Such as figure 2 As shown, the 9 identity information ID A , ID B ,...,ID I Put it into a 3×3 grid after obfuscation, and use the position vector (1, 2) to represent the ID A position in the grid. Next, Bob generates two random vectors By calculating the ID A The position vector (1, 2) and XOR to get two new vectors Subsequently, Bob sends the same 3×3 grid and two different vectors to all four full-node users, specifically, to C 00 send vector to C 01 send vector to C 10 send vector to C 11 send vector

[0052] Full node user C 00 Find Get the position vector (3, 1). The position vector (3, 1) corresponds to the identity information ID H , so C 00 Traverse the blockchain to obtain the public key PK H , and the result X 1 = PK H Return to Bob; C 01 Find ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a privacy protection identity authentication method supporting a thin client under the block chain PKI, belonging to the technical field of information security. The method of the invention includes the following steps: system initialization, generating authentication request, generating query request, query phase, detection phase, confirmation phase and session establishment. The method of the present invention utilizes technologies such as PIR, so that it supports thin clients with limited storage and computing capabilities in the block chain to complete user identity authentication in a decentralized PKI, while protecting the query privacy of the thin clients. The present invention uses blockchain-based PKI technology to solve the problems of traditional PKI single-point failure and multi-CA mutual trust difficulties; uses PIR technology to realize the identity authentication function of thin clients under decentralized PKI; uses PIR technology to protect thin clients Data privacy during the query process; random numbers are added during the authentication process to prevent man-in-the-middle attacks and ensure that messages are not forged and tampered during the authentication process.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a privacy protection identity authentication method supporting a thin client under a block chain PKI. Background technique [0002] PKI (Public Key Infrastructure) is a security infrastructure that uses public key cryptography to support encryption, authentication, integrity and non-repudiation services, and is widely used in the Internet electronic certification service industry. The traditional PKI architecture relies on a trusted third party, that is, the CA center (Certificate Authority, certificate certification authority). Only when a certain CA is trusted, can the digital certificate issued by the CA to the user be trusted. However, in practical applications, PKI technology has: (1) single point of failure problem, once the core CA is controlled by an attacker, all certificates are untrustworthy; (2) multi-CA mutual trust is difficult, user certifi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/32H04L29/06
CPCH04L9/006H04L9/3226H04L63/08H04L63/083
Inventor 李洪伟姜文博刘森徐国文任彦之杨浩淼
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products