Lightweight anonymous authentication method suitable for resource-limited equipment

An anonymous authentication and resource-constrained technology, applied in the field of information security, can solve problems such as limitations, achieve the effect of reducing requirements and reducing computing overhead

Active Publication Date: 2020-05-08
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to propose a lightweight anonymous authentication method suitable for resource-constrained devices, which solves the limitation of traditional anonymous authentication methods for computing resource-constrained devices widely used in information systems, so as to simultaneously realize anonymity Authentication, privacy protection and session key generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight anonymous authentication method suitable for resource-limited equipment
  • Lightweight anonymous authentication method suitable for resource-limited equipment
  • Lightweight anonymous authentication method suitable for resource-limited equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The solutions of the present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0036] A lightweight anonymous authentication method suitable for resource-constrained devices proposed by the present invention is implemented by using an information system model, and the information system model includes the following three entities, such as figure 1 Shown:

[0037] Network Management Center (Network Management Center): acts as a key generation center and is responsible for the registration of restricted devices and information centers in the information network. It is similar to a trusted third party and manages the entire information network and is responsible for the initialization of public parameters.

[0038] Restricted Equipment: Communication terminals with limited computing resources should register with the network management center and pre-load public parameters before accessing the information center and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a lightweight anonymous authentication method suitable for resource limited equipment, the method is realized by adopting an information system model, and the information systemmodel comprises three entities of a network management center, the limited equipment and an information center, and specifically comprises the following steps: setting system parameters, registering,signing, verifying and confirming a secret key. The invention can be suitable for equipment with limited computing resources. The invention discloses an anonymous authentication method. Only one elliptic curve point multiplication operation needs to be executed at the authentication end, and compared with a previous elliptic curve-based anonymous authentication method, the method has the advantages that the overhead of computing resources and communication resources is further reduced while the security is ensured, so that the method is more suitable for resource-limited equipment, and the requirement of the equipment on the computing capacity is reduced.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to a lightweight anonymous authentication method suitable for resource-limited devices. Background technique [0002] Identity authentication is an important barrier to protect computer systems and data security, but the rapid development of information technology has exposed some disadvantages of traditional identity authentication methods, and users are prone to reveal too much identity information or attribute information during authentication. Therefore, simultaneously protecting user authentication and privacy has become a key issue in the field of information security. The anonymous authentication technology can keep the user anonymous while the user is authenticated, thereby ensuring the privacy of the authenticated user. Therefore, this technology can realize both anonymous authentication and privacy protection. However, the traditional anonymous authenticati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32H04L29/06
CPCH04L9/0643H04L9/083H04L9/0861H04L9/3252H04L63/0421H04L63/083H04L63/0869
Inventor 丁旭阳谢盈王筱翔王骞王志波张小松
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products