Lightweight certificateless authentication method, client and system

An authentication method and a certificate-free technology, applied in the field of information security, can solve problems such as high algorithm complexity, heavy storage space and transmission bandwidth, and difficult implementation, and achieve the effect of low computational complexity

Pending Publication Date: 2020-06-05
BEIJING SANSEC TECH DEV
View PDF9 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, SM2 authentication is currently the most widely used public key authentication method. The disadvantage is that identity authentication requires the participation of digital certificates, which is a relatively heavy burden for the storage space and tr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight certificateless authentication method, client and system
  • Lightweight certificateless authentication method, client and system
  • Lightweight certificateless authentication method, client and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The principles and features of the present invention will be described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.

[0031] With the rapid development of the Internet of Things, the security issues of the Internet of Things have received more and more attention. The Internet of Things terminal device is the weakest link in the entire Internet of Things security, which brings security risks to all devices connected to the Internet of Things. Therefore, strengthening the security level of IoT terminal equipment has become an urgent problem to be solved in the current development of IoT. However, the bandwidth of the Internet of Things environment is generally low. Therefore, in the current authentication algorithm, the SM2 authentication that needs to use digital certificate parameters and the SM9 authentication with complex alg...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a lightweight certificateless authentication method, client and system, and relates to the technical field of information security. The method comprises the following steps: the client generates a temporary public key and a temporary private key, and sends an identity label and the temporary public key to a key generation center; the key generation center calculates according to the identity identifier and the temporary public key to obtain a part of public key and a part of private key, and sends the part of public key and the part of private key to the client; the client calculates according to the temporary private key and the part of private key to obtain a complete private key; and when the client performs public key verification with a third party, verification is performed with the third party according to the complete private key, the identity identifier and the part of the public key. The method is suitable for the environment of the Internet of Things,is low in operation complexity, can be compatible with an existing public key infrastructure, and does not need complex certificate management, the client has complete autonomy for the private key, does not have a secret key escrow problem, and needs less data to be transmitted during public key authentication.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a lightweight certificateless authentication method, client and system. Background technique [0002] At present, public key authentication technology is an effective technology to enhance the security of IoT terminal devices. There are two main public key authentication technologies commonly used in China, SM2 public key authentication and SM9 public key authentication. Among them, SM2 authentication is currently the most widely used public key authentication method. The disadvantage is that identity authentication requires the participation of digital certificates, which is a relatively heavy burden for the storage space and transmission bandwidth of lightweight IoT terminal devices; SM9 Authentication is a public key authentication method based on identity identification. The disadvantage is that the algorithm is complex and difficult to implement on lightweight I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/083H04L9/0869H04L63/08H04L63/083
Inventor 杨国强
Owner BEIJING SANSEC TECH DEV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products