Node authentication method and device based on non-interactive zero-knowledge proof

An authentication method and node technology, applied in the computer field, can solve problems such as poor user experience and low node authentication efficiency, and achieve the effect of improving efficiency

Active Publication Date: 2019-01-18
BEIJING UNIV OF POSTS & TELECOMM
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In order to solve the problems of low node authentication efficiency and poor user experience in the traditional node authentication method based on zero-knowledge proof, on the one hand, the present invention provides a node authentication method, including:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Node authentication method and device based on non-interactive zero-knowledge proof
  • Node authentication method and device based on non-interactive zero-knowledge proof
  • Node authentication method and device based on non-interactive zero-knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0037] At present, the mobile crowd sensing network can greatly enrich the functions of people. As independent individuals in society, people will not only use the perception data in the network, but also actively "produce" data and upload it to the network for other users to use. Users start as the main body of data perception, collection, analysis and mining, complete the whole process spontaneously, and then complete the perception tasks published on the network. However, when many users share perception data in order to cooperate to complete the same task, they need to cooperate with each other, that is, node authentication.

[0038] In the traditional node authentica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a node authentication method and device based on a non-interactive zero-knowledge proof, and the method comprises the steps: setting a registration party between a requesting party and a verification party as a third party trusted mechanism; enabling the registration party to perform the information generation and transmission in an authentication process between the requesting party and the verification party, and enabling the requesting party and the verification party not to perform the information interaction in the whole node authentication process besides that theverification part is informed of whether the authentication of the requesting party is successful or not. Therefore, any secret information of the requesting party cannot be leaked, so as to achieve the high confidentiality of the privacy information of the requesting party. Moreover, the requesting party and the verification party do not need to perform the information interaction for many timesfor the successful authentication, thereby improving the efficiency of node authentication and the user experience.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a node authentication method and device based on non-interactive zero-knowledge proof. Background technique [0002] As an emerging product in the era of big data, the mobile crowd sensing network can greatly enrich the functions of people. As independent individuals in society, people will not only use the perception data in the network, but will actively "produce" data and upload it to the network. In order to be used by other users, users start as the main body of data perception, collection, analysis and mining, and complete the whole process spontaneously, and then complete the perception tasks published on the network. With the popularization of mobile terminal equipment, mobile crowd sensing network has begun to have a wide range of applications and has penetrated into all aspects of social life, such as environmental pollution-free quality monitoring, intelligen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/083H04L9/321H04L9/3218
Inventor 刘杨陈凯敏关建峰许长桥
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products