Security chip based on PUF and zero knowledge proof, application method, system and medium

A zero-knowledge proof and security chip technology, which is applied in the field of security chips based on PUF (Physically Unreproducible Function) and zero-knowledge proof, can solve the problem of not meeting the security certification requirements of the Internet of Things environment, the long time required for certification, and the increased Big security risks and other issues, to achieve the effect of simple and efficient authentication process, fast authentication speed, and simple interface

Active Publication Date: 2019-10-11
北京智涵芯宇科技有限公司
View PDF11 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] As mentioned above, the existing authentication methods often require multiple rounds of interaction between the authentication requester and the authentication server to complete the authentication, which not only cannot meet the security authentication requirements of the IoT environment, but also increases security risks due to round-trip interactions. , at the same time authentication takes longer, more power consumption is required to complete the authentication, and the user experience is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip based on PUF and zero knowledge proof, application method, system and medium
  • Security chip based on PUF and zero knowledge proof, application method, system and medium
  • Security chip based on PUF and zero knowledge proof, application method, system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0078] In this embodiment, the function expression of the first execution circuit to generate a publicly available zero-knowledge identification number PID according to the ChipID is shown in formula (1):

[0079] PID = ModMult(ChipID, ChipID, Z) (1)

[0080]Among them, PID represents a publicly available zero-knowledge identification number, ChipID is a unique chip ID, Z is a specified large integer, and ModMult(ChipID, ChipID, Z) represents the result of multiplying ChipID and ChipID to take the modulus of the large integer Z. The function expression of the ID number generated by the GEN_PID command for zero-knowledge identification is shown in formula (1): the first execution circuit squares the value of ChiID and takes the modulus of the large number Z, where Z is a large integer. In order to achieve sufficient security, The number of bits of Z needs to reach 1024 bits; PID is a publicly available zero-knowledge identification number. Due to the difficulty of factoring lar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security chip based on PUF and zero knowledge proof, an application method, a system and a medium. The security chip based on PUF and zero knowledge proof comprises a PUF circuit module, a ChipID generation circuit module, a zero knowledge proof circuit module and a main control module. The zero knowledge proof circuit module comprises a first execution circuit used for generating a publicable zero knowledge identification number PID and a second execution circuit used for generating a proof code P. An identity authentication application method comprises the step of realizing the identity authentication method based on the lightweight security chip based on the security chip. The identity authentication method does not need a complex interactive protocol. The request end and the server end only need to execute zero knowledge proof calculation. Compared with a digital signature and authentication method based on a public key cryptographic algorithm, the identity authentication method is simpler and has the advantages of good universality, high security, low authentication overhead, simple authentication process and the like.

Description

technical field [0001] The present invention relates to the technical fields of integrated circuit design and information security, in particular to a security chip based on PUF (Physically Unreproducible Function) and zero-knowledge proof, and an application method, system and medium. Background technique [0002] With the rapid development of information technology and the popularization and application of digital and intelligent information systems, the security issues of information systems have become increasingly prominent. The safe and credible identity authentication of the access client by the server system has become the basis of all information system security. Users and terminals can obtain corresponding services from the server only after confirming the legitimacy of their identities. At present, the identity authentication is mainly the identity authentication of the user and the information equipment operated by the user. With the rapid development of the Inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3278H04L9/3221
Inventor 陈晓飞郑朝霞文浩王若凡夏恒炀
Owner 北京智涵芯宇科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products