Unlock instant, AI-driven research and patent intelligence for your innovation.

Information service entity cross-domain authentication method based on SM2 cryptographic algorithm

A cryptographic algorithm and information service technology, which is applied in the cross-domain authentication of information service entities based on the SM2 cryptographic algorithm, and in the field of cross-domain identity verification process, can solve the problems of slow authentication speed and low security

Active Publication Date: 2019-10-15
XIDIAN UNIV
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to address the defects in the above-mentioned prior art, and propose a method for cross-domain authentication of information service entities based on the SM2 cryptographic algorithm, which is used to solve the problems of slow cross-domain authentication of information service entities and low security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information service entity cross-domain authentication method based on SM2 cryptographic algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Attached below figure 1 , to further describe the implementation steps of the present invention.

[0070] Step 1, generate group public key and group private key.

[0071] The key generation center randomly selects an element c∈Z q , where ∈ means belonging to the symbol, Z q Represents an integer string of order q, where q represents a large prime number.

[0072] The key generation center takes the element c as the group private key s and saves it, and uses the product of the group private key s and the base point G as the group public key, where G represents the base point of order n on the elliptic curve, and n represents a large prime number.

[0073] When q is an odd prime number, it is required that q>2 191 ; when q is a power of 2 m When , it is required that m>192 and be a prime number, when q is an odd prime number, the elements in the prime field are represented by integers 0, 1, 2, q-1; when q is a power of 2 m When , the binary extension domain F of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an information service entity cross-domain authentication method based on an SM2 cryptographic algorithm. The method mainly solves the problems that in the current cross-domainprocess, the computing complexity is high, the cross-domain authentication speed is slow, and the safety is low. According to the technical scheme, a signature scheme based on an SM2 cryptographic algorithm is adopted to verify the legality of the identity of a user, a timestamp is added, a user label in the identity verification process is signed, a label notarization center verifies the label ofthe user, and a server determines whether to start service for the user according to a verification result, so that cross-domain authentication is realized. According to the invention, the problems of low identity authentication speed and low security in the cross-domain authentication process in the prior art are overcome, and the efficiency and security of the cross-domain authentication process are improved while the authentication accuracy between domains is ensured.

Description

technical field [0001] The invention belongs to the technical field of communication, and further relates to an information service entity cross-domain authentication method based on SM2 encryption algorithm in the technical field of network communication. The invention can be used in the cross-domain authentication process when a user in a trust domain sends a request to access a server providing service in another trust domain under the condition of multiple scenarios and multiple users in a communication network. Background technique [0002] The information service entity ISE (Information Services Entity) in the case of multiple scenarios and multiple users in the communication network refers to a service activity provider that provides open and shared information on the Internet. The interaction mode of the information service entity ISE directly affects the security of information services. With the lightweight of mobile terminals, in various scenarios, such as resourc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/30H04L9/32
CPCH04L9/0643H04L9/0825H04L9/0869H04L9/3066H04L9/3247
Inventor 马文平宋玉龙刘小雪
Owner XIDIAN UNIV