Implicit certificate distribution method and system

An implicit certificate and certification center technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as inability to apply TwistedEdwards curves

Active Publication Date: 2019-07-05
DATA COMM SCI & TECH RES INST +1
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect described in this patented method relates to improving security measures by utilizing special mathematical techniques such as Randomization Theory (RAT). This approach allows us to create secure systems without relying on any external factors like physical attacks from outside sources.

Problems solved by technology

This patented technical problem addressed in this patents relating to ensuring security during online transactions involves controlling access rights between users who use their own private keys while also signing up against each other over encrypted communication channels like SSL/TLS protocols.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implicit certificate distribution method and system
  • Implicit certificate distribution method and system
  • Implicit certificate distribution method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and are used together with the embodiments of the present invention to explain the principle of the present invention.

[0042] The process of issuing the original implicit certificate ECQV is as follows:

[0043] Firstly, the authentication center CA generates system parameters, including the security elliptic curve and the generator G of the elliptic curve. Suppose the private key of the certification center is k ca , the corresponding public key is Q CA =k ca g.

[0044] The implicit certificate process for user A is as follows:

[0045] 1) User A generates a random number a∈[1,n-1], calculates aG, and then sends aG to the authentication center;

[0046] 2) The authentication center selects a random number k∈[1,n-1], and calculates kG, where n is the order of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an implicit certificate distribution method and an implicit certificate distribution system, belongs to the technical field of intelligent Internet of Vehicles and digital currencies, and realizes implicit certificate distribution which can adapt to different elliptic curves and is wider in application. The method comprises the following steps of using an authentication center to generate the system parameters; generating a random number r according to temporary public and private keys generated by the user and the authentication center; calculating coordinates Y of the user on the elliptic curve according to the random number r, the temporary public key of the user and the generation element G; generating an authentication result s of the user according to information including the coordinates of the user on the elliptic curve, the public key and the private key of the authentication center and the identity of the user; and sending the authentication result sand the user coordinate Y to the user for the user to generate a new user public key and a new private key. The method is suitable for a common Weierstrass elliptic curve equation and can also be usedfor an Edwards curve which is high in current recognition degree and wide in application range, randomness does not depend on an authentication center, and the small subgroup attacks can be resisted.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner DATA COMM SCI & TECH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products