Three-factor identity authentication and key negotiation method in multi-server environment

A multi-server, identity authentication technology, applied to the public key of secure communication, user identity/authority verification, key distribution, can solve the problems of high communication cost, increased communication steps, communication traffic bottleneck, etc., to ensure security , the effect of reducing communication steps and costs, and improving the efficiency of protocol operation

Active Publication Date: 2018-12-07
HANGZHOU NORMAL UNIVERSITY
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above-mentioned proposed protocols all have security holes, and in the authentication phase, the server needs to send the user's authentication information to the Registered / Authenticate Center (Registered / Authenticate Center)
This increases the number of communication steps and makes the communication cost high
At the same time, when a large number of users send authentication requests, there is a communication traffic bottleneck

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention is further described below.

[0037] A method for three-factor identity authentication and key negotiation that does not require the participation of a trusted third-party registration / authentication center in the authentication stage in a multi-service environment proposed by the present invention includes the following stages: registration center initialization stage, server registration stage, client registration stage, authentication and key negotiation stage, and the functional part of user port token replacement, the specific steps are as follows:

[0038] Phase 1: Initialization of a trusted third party, the Registered Center (Registered Center), the Registration Center selects large prime numbers p and q as its long-term private key. Choose a one-way hash function h(.). And the big prime Q and its primitive root g in the DH (Diffie-Hellman) algorithm.

[0039] Phase 2: Server registration phase, which includes the following steps:

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a three-factor identity authentication and key negotiation method in a multi-server environment. The method comprises the following phases: a registration center initializationphase, a server registration phase, a client registration phase and an authentication and key negotiation phase, and a functional portion of client password replacement. By adoption of the three-factor identity authentication and key negotiation method disclosed by the invention, the participation of a trusted third party registration/authentication center is not required in the authentication phase, thus reducing the communication steps and costs, improving the protocol operation efficiency and ensuring the security of the protocol at the same time. The mutual authentication of the two parties is realized by a static DH value shared by the client and the server uniquely, and the confidentiality of a session key is realized by a dynamic DH value shared by both parties uniquely and used for calculating the session key so as to ensure the security of an established channel. The three-factor identity authentication and key negotiation method disclosed by the invention has authenticationproperty and confidentiality, is secure and provides an efficient multi-server three-factor identity authentication and key negotiation protocol on the communication.

Description

technical field [0001] The invention relates to a three-factor user identity authentication and key generation protocol in a multi-server environment that does not require the participation of a trusted third party in the authentication stage, and belongs to the technical field of cryptographic protocols. Background technique [0002] With the rapid development of contemporary network technology, especially the development and growth of a series of network technologies closely related to life such as the Internet of Things in recent years, our life and the network have been closely integrated. From electronic wallets that can be used in food markets, to online shopping for clothing, to booking hotels from mobile apps, to online ticketing and shared bicycles. The four largest parts of people's lives: basic necessities of life. All can be realized through the network. The more people's lives are inseparable from the network, the more they need to pay attention to the securit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/30H04L9/08
CPCH04L9/0838H04L9/302H04L9/3033H04L9/321H04L9/3297H04L63/0861H04L63/0869H04L63/0876H04L65/1073
Inventor 谢琪牟航黄凌峰吴彩霞
Owner HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products