Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication key exchange method based on message recovery signature

A technology for authenticating keys and messages, applied in the field of cryptography, can solve the problems of large communication volume, inability to achieve perfect forward security, weak forward security, etc., achieve high security, save communication overhead, and reduce communication traffic Effect

Active Publication Date: 2019-07-09
XIDIAN UNIV
View PDF13 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology allows for better control over how data transmitted through networks are protected against unauthorized access or manipulated by others during transmission. It also reduces network traffic while still ensuring that authorised users have their own unique identification code (ID). Additionally it improves overall efficiency when signing messages on different devices simultaneously without sending them separately. Overall this results in increased safety measures being taken across multiple types of communications systems.

Problems solved by technology

This patented technical solution describes different types of keys exchanging algorithms: secret encryption (SE) for enhancing data privacy while maintaining confidentiality; asymmetric key agreement (AKE), where both sides agree upon a shared symmetric key before signing any new encrypted documents. These techniques aimed at improving the overall performance and reliability of these systems against various forms of attackers like maneuverings and brute force attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication key exchange method based on message recovery signature
  • Authentication key exchange method based on message recovery signature
  • Authentication key exchange method based on message recovery signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0035] refer to figure 1 , the implementation steps of the present invention include as follows:

[0036] Step 1. Each user generates their own digital signature public-private key pair.

[0037] 1.1) The first user generates his own signature public-private key pair

[0038] (1.1a) The first user uses a signature key generation algorithm to generate a digital signature public-private key pair. The parameters of the signature key generation algorithm are: (N, Q), where N is a power of 2, Q is a prime number and Q≡1mod2N , take N=512, Q=12289 here;

[0039] (1.1b) Calculate the standard deviation

[0040] (1.1c) according to the discrete Gaussian distribution Sample a 2N-dimensional vector, where each component has a mean of 0 and a standard deviation of σ f The one-dimensional discrete Gaussian distribution of , then the 2N...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication key exchange method based on a message recovery signature, and mainly solves the problems of relatively large communication traffic and relatively weak security in an original scheme. The method comprises the following implementation steps: each user generates a digital signature public and private key pair; the first user generates a secret key packagingpublic and private key pair of the first user and signs and sends the secret key packaging public and private key pair; the second user verifies the signature sent by the first user; the second user encapsulates the key and generates a hash value of the session process; the second user signs the ciphertext and the Hash value of the session process and sends the ciphertext and the Hash value to thefirst user; the first user verifies the signature sent by the second user; the first user de-packages and verifies the hash value of the session process; and both parties calculate session keys. Theauthentication key exchange protocol is constructed through the digital signature with the message reply mode and the key packaging mechanism, the communication traffic is saved, the security of the protocol is improved, and the method can be used for the Internet of Vehicles and ground-air communication.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products