Unlock instant, AI-driven research and patent intelligence for your innovation.

A secure multi-party authentication method and system supporting batch authentication

An authentication method and multi-party technology, applied in the field of information security passwords, to achieve the effect of ensuring privacy and improving computing efficiency

Active Publication Date: 2022-03-08
GUILIN UNIV OF ELECTRONIC TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a secure multi-party authentication method and system that supports batch authentication, aiming to solve the problem of efficient authentication when multiple users build an ad hoc communication network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure multi-party authentication method and system supporting batch authentication
  • A secure multi-party authentication method and system supporting batch authentication
  • A secure multi-party authentication method and system supporting batch authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Embodiments of the present invention are described below through specific examples, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific implementation modes, and various modifications or changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention. It should be noted that, in the case of no conflict, the following embodiments and features in the embodiments can be combined with each other.

[0067] It should be noted that the diagrams provided in the following embodiments are only schematically illustrating the basic ideas of the present invention, and only the components related to the present invention are shown in the diagrams rather than the number, shape and shape of the compo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a secure multi-party authentication method that supports batch verification, including: the system administrator selects security parameters, generates system public parameters and master private keys, and writes the system public parameters into the block chain; the system administrator uses the The system public parameters and master private key are used to assign attribute vectors and user tags to each user, and the generated user public parameters are written into the blockchain; for authentication requirements, the system administrator uses the system public parameters and master private key Generate a ciphertext predicate label and write it into the blockchain; each user uses the system public parameters and the ciphertext predicate label to generate its own metadata and writes it into the blockchain; each user uses the system public The parameter batch verifies whether the metadata of other users is correct, and if it is correct, continue to select legitimate users who meet the predicate conditions to complete the authentication process.

Description

technical field [0001] The invention relates to the field of information security ciphers, in particular to a secure multi-party authentication method and system supporting batch authentication. Background technique [0002] With the rapid development of information technology and Internet of Things technology, various wireless Internet of Things devices have been widely used. Wireless IoT devices can communicate in an ad-hoc network mode, and cooperate with each other to complete tasks specified by users. For example, in a field working environment, it may be difficult for users to connect to external communication signals. At this time, wireless IoT devices can be used to build a temporary self-organizing communication platform, and the platform can be used to complete expected tasks. [0003] However, when building an ad hoc communication network, wireless IoT devices need to be able to verify the identities of other devices, and only verified devices can jointly build a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
CPCH04W12/06H04W4/70H04W84/18
Inventor 王玉珏丁勇赵萌
Owner GUILIN UNIV OF ELECTRONIC TECH