Attribute-based user identity authentication method and system

A user identity authentication and attribute technology, applied in the field of network security, can solve the problem of partial privacy leakage of users, and achieve the effects of improving security, improving authentication efficiency, and reducing communication overhead and computing overhead.

Inactive Publication Date: 2020-06-05
NANJING UNIV OF SCI & TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional methods of authenticating mobile device users are based on passwords, keys, or fingerprints. The problem with these traditional methods is that once the password is leaked or the user passes the initial authentication of the fingerprint and does not exit, unauthorized users may gain access to Access to User Information
In addition, there is still the problem of partial privacy leakage of users in the traditional identity authentication process.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based user identity authentication method and system
  • Attribute-based user identity authentication method and system
  • Attribute-based user identity authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0090] combine figure 1 , the present invention is an attribute-based user identity authentication system, including a third-party attribute organization, an authentication applicant, and an authentication server;

[0091] The third-party attribute mechanism is used to initialize the entire system;

[0092] The authentication applicant is used to generate an attribute certificate;

[0093] The authentication server is configured to check the validity of the attribute index to determine the authentication.

[0094] combine Figure 3-5 , an attribute-based user identity authentication method, comprising the following steps:

[0095] Step 1. The third-party attribute organization initializes the entire system, such as Figure 4 shown.

[0096] First, the common attribute set A U formalized as A U = {a1, a2, an} whose output is the system master key MK sys and the public parameter PK sys , where: system master key MK sys =(β, gα)

[0097] Public parameter PK sys Includ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based user identity authentication method and system. The method comprises the following steps: firstly, a third-party attribute mechanism initializes the whole system; then an authentication applicant generates an attribute certificate; and finally, an authentication server checks the validity of the attribute index to finish authentication. The system comprises the third-party attribute mechanism, the authentication applicant and the authentication server, and the third-party attribute mechanism is used for initializing the whole system; the authentication applicant is used for generating the attribute certificate; and the authentication server is used for checking the validity of the attribute index and determining authentication. The method and thesystem are used for an authentication technology to protect the identity of the user and prevent privacy leakage, and the attribute-based method of a bilinear pair is introduced into identity authentication, so that the security of the identity authentication of the user is improved, and the authentication efficiency is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an attribute-based user identity authentication method and system. Background technique [0002] The continuous development and progress of wireless communication technology, cloud computing and other information technologies enable cloud storage to provide unlimited, convenient and low-cost services. More and more individual users and enterprise users store their important information on the cloud server. At the same time, due to the flexible and convenient management and use methods of mobile devices, mobile devices such as smart phones and tablet computers combined with cloud storage have become an inseparable part of people's daily life. [0003] The information stored in the cloud usually contains some sensitive information, such as account information, medical records, medical records and other data. Improper access by unauthorized users will lead to serious conseq...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0861H04L9/321H04L9/3236H04L9/3297H04L63/083H04L63/10
Inventor 黄婵颖王佳贺俞研魏松杰张功萱
Owner NANJING UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products