Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing vehicle-mounted network identity authentication system and method based on secret sharing and multiple mobile devices

A mobile device and secret sharing technology, applied in the field of identity authentication, can solve the problems of user account rights damage, increase the amount of digital signature calculation, and low user privacy security, and achieve the effect of protecting all rights and interests

Active Publication Date: 2020-06-12
南京如般量子科技有限公司 +1
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 2. After the key card is lost or stolen, it may be used directly and cause damage to the rights and interests corresponding to the user account
For example, transfer all the rights and interests of the user account, resulting in the theft of rights and interests;
[0010] 3. The anti-quantum computing ability of the existing digital signature is not high, and the private key of the signature may be calculated. In order to make the digital signature anti-quantum computing ability, the digital signature must be encrypted, which increases the calculation amount of the digital signature;
[0011] 4. The ID of the existing network communication subject is exposed in the network, and the security of user privacy is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing vehicle-mounted network identity authentication system and method based on secret sharing and multiple mobile devices
  • Anti-quantum computing vehicle-mounted network identity authentication system and method based on secret sharing and multiple mobile devices
  • Anti-quantum computing vehicle-mounted network identity authentication system and method based on secret sharing and multiple mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] First, briefly introduce the principle and process of secret sharing.

[0074] Randomly select n different non-zero elements X0, X1, X2, ..., Xn-1 from the finite field GF(q) of prime order q, and distribute them to participants Pi (i=0, 1, 2, . . . , n-1). The secret information is SK, select t elements a0, a1, a2, ..., a(t-1) from GF(q), and construct a polynomial Then there is SKi=f(Xi) (0≤i≤n-1).

[0075] Obtaining any t shadow secrets from n participants can restore SK, the specific steps are as follows: According to the formula The t Lagrangian parameters λi can be obtained, so SK can be obtained according to the formula SK=f(0)=∑λi*SKi.

[0076] In the present invention, a user holds multiple mobile devices, and the user can only obtain the authentication of the server through multiple mobile devices and routing devices. User IDs are shared in (t, n) secrets, with each shadow secret being (Xi, IDi). As long as the t group of secrets is collected, the user ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anti-quantum computing vehicle-mounted network identity authentication system and method based on secret sharing and multiple mobile devices. The system comprises a plurality of mobile devices, a routing device and a server, a single server is provided with a plurality of routing devices, a single routing device is provided with a plurality of mobile devices, and the same user corresponds to one routing device and a plurality of mobile devices belonging to the routing device. According to the method, the ID and the secret key of the user are secretly shared and distributed to the routing device and the secret key cards of the plurality of mobile devices, so that malicious information acquisition caused by violent cracking of the secret key cards is avoided, and information loss caused by losing of the secret key cards is also avoided; each piece of mobile equipment and the corresponding routing device must be subjected to signature authentication to completethe whole signature, so that all rights and interests of the corresponding account are greatly protected; the undisclosed user public key is added into the signature process of the server, so that thesignature can resist the attack of quantum computing without additional encryption protection.

Description

technical field [0001] The invention relates to the field of identity authentication, in particular to a quantum computing-resistant vehicle network identity authentication system and method based on secret sharing and multiple mobile devices. Background technique [0002] Identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] The in-vehicle network is formed by connecting the mobile device held by the user to the in-vehicle routing device through a short-distance connection, and the in-vehicle routing device is connected to the server through the network. The actual specific form of mobile devices can be car keys, mobile communication terminals (such as mobile phones, etc.), wearable devices (such as Bluetooth headsets, smart glasses, smart watches, etc.), IC cards, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/085H04L9/0869H04L63/0442H04L9/3247H04L9/3297H04L63/083H04L9/3255
Inventor 富尧钟一民茆冬梅
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products