Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices

A technology for quantum secure communication and mobile devices, applied in the field of quantum secure communication identity authentication systems, can solve problems such as rights theft, digital signatures with low anti-quantum computing capability, and key fob loss, and achieves the effect of reducing the amount of computation

Active Publication Date: 2020-07-10
南京如般量子科技有限公司 +1
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008]2. After the key card is lost or stolen, it may be used directly and cause damage to the rights and interests corresponding to the user account
For example, transfer all the rights and interests of the user account, resulting in the theft of rights and interests
[0009]3. Existing digital signatures are not highly resistant to quantum computing, and may be calculated to obtain the signature private key
In order to make the digital signature anti-quantum computing ability, the digital signature must be encrypted, which increases the calculation amount of the digital signature.
[0010]4. The ID of the existing network communication subject is exposed on the network, and the security of user privacy is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
  • Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
  • Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0100] In this embodiment, R is W's issuing service station.

[0101] Due to the regional limitation of network connection (for example, the wireless connection can only access the local service station, or the operator can only access the local service station), S is W's access service station.

[0102] Step 1: W→S.

[0103] The n-1 mobile devices take a unified time timeR and an authentication request message Request.

[0104] Each mobile device generates the key PK that can be used for the next round of signatures iTempNew / SK iTempNew , (i∈1,n-1, where SKiTempNew is a random number, PKiTempNew=SKiTempNew*P.

[0105] Each mobile device is calculated using the ECIES algorithm

[0106] EPK i =ENC(PK iMain ||PK iTemp ||PK iTempNew , PK 0Temp )={EPK iR ,EPK ic ,EPK it}. to EPK iR Calculate the offset to get EPK' i ={EPK iR -HG(timeR||x i ||IDW i ),EPK ic ,EPK it}. where HG is a hash function that maps integers to elliptic curve points.

[0107] Each mobile...

Embodiment 2

[0147] In this embodiment, R is W's issuing service station and W's access service station.

[0148] Step 1: W→R.

[0149] The n-1 mobile devices take a unified time timeR and an authentication request message Request.

[0150] Each mobile device generates the key PK that can be used for the next round of signatures iTempNew / SK iTempNew (i∈[1,n-1]). Among them, SK iTempNew is a random number, PK iTempNew =SK iTempNew *P.

[0151] Each mobile device is calculated using the ECIES algorithm

[0152] EPK i =ENC(PK iMain ||PK iTemp ||PK iTempNew , PK 0Temp )={EPK iR ,EPK ic ,EPK it}. to EPK iR Calculate the offset to get EPK' i ={EPK iR -HG(timeR||x i ||IDW i ),EPK ic ,EPK it}. Among them, HPK Temp =H(PK Temp ).

[0153] Each mobile device combines timeR and Request into Tx, let TxsigR=HPK Temp , calculate TxsigE=H(TxsigR||Tx).

[0154] Each mobile device calculates the signature component ReqSig i =SK iTemp +SK iMain *TxsigE(mod q).

[0155] Make ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices. The system comprises a plurality of service stations and a plurality of groups of mobile devices. The service station comprises an issuer and an access service station. The mobile devices in the same group issues a key card by the same issuer and shares the same device ID and device key in a (n, n) secret sharing mode, and the corresponding ID component and key component are respectively stored in the mobile equipment key card and the issuer keycard. According to the invention, the device ID and the device key are secretly shared through a plurality of mobile devices, the permanent key component and the temporary key component are used to sign or encrypt the message, the temporary key is updated after each authentication transaction, and the complete device ID and the complete device key are not transmitted in the network in the whole authentication process, so that the security is improved, and the rights and interests corresponding to the mobile device are guaranteed.

Description

technical field [0001] The invention relates to the technical field of quantum communication identity authentication, in particular to a quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices. Background technique [0002] Identity authentication is the basic technology to achieve information security. The system checks the user's identity to confirm whether the user has access and use rights to certain resources, and can also perform identity authentication between systems. [0003] With the rapid development of the mobile Internet, the internal business websites of enterprises and institutions are also gradually developing towards mobile terminals. In order to facilitate the staff to understand the work content at any time, users hope to be able to access the internal website server of the unit through portable mobile terminals. If there is a loophole in identity authentication, it will lead to data leakag...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0852H04L9/0869H04L9/0894H04L9/0643H04L9/0825
Inventor 富尧钟一民杨羽成
Owner 南京如般量子科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products