Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-quantum computing anonymous identification method and system based on implicit certificate

A technology of identity recognition and quantum computing, applied in the field of alliance chain, can solve problems such as ID information leakage, high risk of identity recognition server being attacked by DOS, information leakage, etc., and achieve the effect of improving security

Active Publication Date: 2021-06-22
RUBAN QUANTUM TECH CO LTD +1
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If lost, it may cause ID information leakage
If the ID is recorded at multiple identification devices, ID tracking can be realized, which is a serious information leakage in some application scenarios
[0005] 2. Identity recognition needs to be recognized by the identity recognition server, and the identity recognition server is at a higher risk of being attacked by DOS
If the communication and storage data are obtained by the enemy, the enemy can realize ID tracking, which is a serious information leakage in some application scenarios

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing anonymous identification method and system based on implicit certificate
  • Anti-quantum computing anonymous identification method and system based on implicit certificate
  • Anti-quantum computing anonymous identification method and system based on implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0060] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0061] It should be understood that, unless otherwise specified herein, the steps are not strictly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to an anonymous identification method and system based on implicit certificates against quantum computing. Through the implementation between the members of the alliance chain that communicate with each other, the members of the alliance chain include client members and server members, all parties are equipped with key cards, and all key cards store algorithm parameters and server public key pools ; The key card of the server stores a server secret shared private key pool and a client public key pool, and the client public key pool stores a client unit corresponding to each client one by one, and the client unit is stored in the client public key pool. The client unit includes the user name, real identity, public key update status, implicit certificate and false identity of the corresponding client; the key card of the client is stored with the random number of the client public key pointer, the client private key And the private key parameter does not disclose one's own real identity in the message sent by User, but discloses one's own false identity, which further improves the security of the interaction between all parties.

Description

technical field [0001] This application relates to the field of consortium chains, in particular to a method and system for anti-quantum computing anonymous identity identification based on implicit certificates. Background technique [0002] Blockchain is a brand-new distributed infrastructure and computing paradigm. It uses an ordered chained data structure to store data, uses consensus algorithms to update data, and uses cryptography to ensure data security. In blockchain-based transactions, ensuring the data security of transactions and the privacy of customers is a necessary condition for the further development of blockchain. For this reason, cryptography technology, especially public key cryptography, has been widely used in blockchain. The alliance chain is a branch of the blockchain, so it is also a distributed and decentralized public database. The difference from other chains is that it is aimed at members of specific groups and limited third parties. A pre-sele...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/62G06F21/60G06F21/73G06F21/33
CPCG06F21/33G06F21/602G06F21/6254G06F21/73
Inventor 富尧钟一民杨羽成
Owner RUBAN QUANTUM TECH CO LTD