System and method for computing private keys for self certified identity based signature schemes

A private key and identity technology, applied in the field of public session key, can solve problems such as user damage

Active Publication Date: 2019-09-20
HUAWEI INT
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the key generation center is compromised, this means that all users of the system will also be compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for computing private keys for self certified identity based signature schemes
  • System and method for computing private keys for self certified identity based signature schemes
  • System and method for computing private keys for self certified identity based signature schemes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0096] The present invention relates to a system and method for generating a private key for a device participating in an identity-based self-certified signature scheme, wherein the device uses the private key to create a public session key for encoding digital communication between devices. Specifically, the private key generated according to the system and method of the present invention is only known to the device itself, and not to any other third parties.

[0097] In addition, before calculating the public session key, the entity pair or device pair will first verify the authenticity of each entity or device. Once each entity is authenticated, the entity pair will then generate a public session key, which is used to encode digital communications between entities.

[0098] figure 1 It shows a block diagram of an entity pair authentication and public session key generation system according to an embodiment of the present invention. Those skilled in the art will recognize that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This document describes a system and method for generating private keys for devices participating in a self-certified identity based encryption scheme whereby the private key is used by the devices to establish a common session key for encoding digital communications between devices.

Description

Technical field [0001] The present invention relates to a system and method for generating a private key for a device participating in an identity-based self-certified signature scheme, wherein the device uses the private key to create a public session key for encoding digital communication between devices. Specifically, the private key generated according to the system and method of the present invention is only known to the device itself, and not to any other third parties. Background technique [0002] Due to the convergence of multiple technologies, more and more devices can wirelessly communicate with the Internet seamlessly or wirelessly exchange communications between devices. This kind of aggregation makes the prospect of the Internet of Things (IoT) more and more important in recent years. In the Internet of Things, millions of entities or devices (ie objects) will be connected to each other. These devices include devices or entities such as smart chips, smart plugs, s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/00
CPCH04L9/008H04L9/0847H04L9/3247H04L9/3263H04L9/0869
Inventor 杨艳江王贵林李铁岩
Owner HUAWEI INT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products