Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Improved AKA identity authentication system and method based on symmetric secret key pool and relay communication

An identity authentication and relay communication technology, applied in the field of private identity authentication and key negotiation, can solve the problems of key information leakage, insufficient transmission of important information, and inability to maintain the freshness of the key seed or the variable range, etc. The effect of ensuring safety and improving safety

Active Publication Date: 2018-12-07
RUBAN QUANTUM TECH CO LTD
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] 1. In group communication, there is usually only one or a small number of key seeds involved in group key negotiation, which cannot keep the freshness of key seeds or the range of change is small, and it is easy to be cracked
[0008] 2. At present, the encryption method between members and relays in the group mainly relies on the group key for encryption. There is no key for separate communication between the two parties, and the transmission of important information is relatively not secure enough.
[0009] 3. The random number parameters in key generation in the AKA mechanism are exposed, which will increase the risk of the negotiated key being cracked
And the verification of SQN's verification mechanism is scoped, not unique, and has a certain degree of contingency
[0010] 4. Most of the messages sent and received in the authentication are sent in plain text or encrypted with a weak encryption method, which is easy to leak key information and reduce the security of authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Improved AKA identity authentication system and method based on symmetric secret key pool and relay communication
  • Improved AKA identity authentication system and method based on symmetric secret key pool and relay communication
  • Improved AKA identity authentication system and method based on symmetric secret key pool and relay communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] systems mannual

[0075] The scenario of this embodiment is as figure 1 As shown, in this figure, member R, member A0, member A1, member A2, member A3, member A4, and member C are all members of the same group, and member R is a relay unit.

[0076] In this figure, the active party participating in the authentication is C, which contains the private key pool K C and group key pool K G ; The passive party participating in the authentication is R, which contains the private key pool K R and group key pool K G .

[0077] The private key pool is a symmetric key pool between members and the server, and the group key pool is a symmetric key pool between members in the group.

[0078] Member S is the key management server and also serves as the server. Both member C and member R belong to S, which contains the private key pool and group key pool K of all members. G .

[0079] As a communication relay, member R has performed identity authentication and key negotiation wi...

Embodiment 2

[0138] systems mannual

[0139] Such as Figure 4 As shown, the identity authentication system of the present invention may include multiple key management servers, and different key management servers are located in different quantum network service stations. Each quantum network service station is in the quantum communication network, so quantum network service stations can share inter-station quantum keys through QKD, thus ensuring high information security.

[0140] Such as Figure 4 , in this figure, member R, member A0, member A1, member A2, member A3, member A4 and member C are all members of the same group, and member R is a relay unit. The active party participating in the authentication is C, who is a member of the group and contains the private key pool K C and group key pool K G ; The passive party participating in the authentication is R, which is a relay member and contains a private key pool K R and group key pool K G ; Members S1 and S2 are key management...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an improved AKA identity authentication system and method based on a symmetric secret key pool and relay communication. The AKA identity authentication system comprises a member participating in AKA identity authentication, a relay and a server. The member, the relay and the server share a group secret key pool. The member and the relay use a secret key seed from the groupsecret key pool and combine with a random number parameter to calculate and acquire a negotiation secret key between the member and the relay in an AKA identity authentication process, wherein the random number parameter is correspondingly obtained by using a pointer address A in the group secret key pool. In the AKA identity authentication process, the relay acquires the pointer address A throughthe server, and the member acquires a parameter for generating the pointer address A from the server via the relay, and generates the pointer address A by using the parameter. In the invention, the safety of communication can be further increased.

Description

technical field [0001] The invention relates to the technical field of secure communication, in particular to private identity authentication and key agreement based on group data network. Background technique [0002] Authentication, that is, identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] With the development of quantum computers, classical asymmetric encryption algorithms will no longer be safe, and symmetric key algorithms will become popular in both authentication and encryption and decryption fields. For example, the AKA mechanism, one of the commonly used authentication methods based on symmetric key algorithms in the field of mobile communications, is currently used. The full name of AKA is "Authentication and KeyAgreement", that is, authentication and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06H04B10/70
CPCH04B10/70H04L9/0838H04L9/085H04L9/0852H04L9/0869H04L63/06H04L63/0807H04L63/083H04L63/0876
Inventor 富尧钟一民余秋炜
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products