Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implicit certificate distribution method and system

An implicit certificate and certification center technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as inability to apply TwistedEdwards curves

Active Publication Date: 2021-07-02
DATA COMM SCI & TECH RES INST +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It has been more than 20 years since the proposal of ECQV, and there has been almost no change so far. The signature algorithm it is based on has been the standard of 20 or 30 years ago, and cannot be applied to the currently recognized and widely used Twisted Edwards curve.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implicit certificate distribution method and system
  • Implicit certificate distribution method and system
  • Implicit certificate distribution method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings, wherein the accompanying drawings constitute a part of the application and are used together with the embodiments of the present invention to explain the principle of the present invention.

[0042] The process of issuing the original implicit certificate ECQV is as follows:

[0043] Firstly, the authentication center CA generates system parameters, including the security elliptic curve and the generator G of the elliptic curve. Suppose the private key of the certification center is k ca , the corresponding public key is Q CA =k ca g.

[0044] The implicit certificate process for user A is as follows:

[0045] 1) User A generates a random number a∈[1,n-1], calculates aG, and then sends aG to the authentication center;

[0046] 2) The authentication center selects a random number k∈[1,n-1], and calculates kG, where n is the order of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an implicit certificate distribution method and system, belonging to the technical fields of intelligent vehicle networking and digital currency, and realizes the distribution of implicit certificates that can adapt to different elliptic curves and has wider application. Generate a random number r with the temporary public and private keys generated by the certification center; calculate the user's coordinate Y on the elliptic curve according to the random number r, the user's temporary public key and the generator G; The center's public key, private key, and user's identity information generate the user's authentication result s; the authentication result s and the user's coordinate Y are sent to the user for the user to generate a new user's public key and private key. The present invention is suitable for ordinary Weierstrass elliptic curve equations, and can also be used for Edwards curves which are widely recognized and widely used.

Description

technical field [0001] The invention relates to the technical field of digital currency, in particular to an implicit certificate distribution method and system. Background technique [0002] The trusted center (certification authority, CA) plays the role of the top trusted root node as the central role in the secure public key infrastructure. The trusted center binds the user's public key and identity together as a digital certificate by issuing a certificate. A digital certificate is similar to an ID card in real life. It is a piece of electronic data that contains the identity information of the certificate holder and is issued by a certification center. It can provide network applications with the key and certificate management system necessary for cryptographic services such as encryption and digital signatures. . These certificates usually consist of the user's identity information, the user's public key, and a signature generated by a trusted authority. [0003] In...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/06G06Q20/38H04L9/08H04L9/30H04L9/32
CPCG06Q20/065G06Q20/3829H04L9/0844H04L9/3066H04L9/3263
Inventor 林齐平郑丽娟
Owner DATA COMM SCI & TECH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products