Three-party verifiable key agreement method for centralized mobile positioning system

A technology for authenticated key negotiation and mobile positioning, which is applied in the field of three-party certifiable key negotiation for centralized mobile positioning systems, and can solve the problems of high algorithm complexity, inability to guarantee forward security, and inability to resist active attacks. Guaranteed safety, operability, and complete functionality

Active Publication Date: 2022-08-09
SOUTHEAST UNIV +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Aiming at the technical problems in the above key agreement methods, such as the length of the key is too long, the complexity of the algorithm is high, the reliance on the third-party certificate authority, the reliance on the key generation center, the inability to resist active attacks and the inability to guarantee forward security, etc., the present invention provides The three-party authenticated key agreement method of the centralized mobile positioning system adopts the self-designed self-designed ECC three-party authenticated key agreement algorithm to ensure that each entity in the system can generate session keys safely and reliably during the interaction; for key length The problem of too long and the high complexity of the algorithm, the key length used by the present invention based on the ECC algorithm is shorter, and the encryption and decryption speed is faster than the modular exponentiation operation; for the problem of relying on third-party certificate agencies and relying on the key generation center, The method of the invention enables each entity in the system to generate a public-private key pair and its own certificate locally, without relying on other institutions for key custody or participating in certificate verification during mutual authentication; for the problem of being unable to resist man-in-the-middle attacks, the invention provides The self-designed signature algorithm and identity authentication algorithm are used in the authentication process, which can effectively avoid fake authentication responses and resist man-in-the-middle attacks; for the problem that forward security cannot be guaranteed, the present invention introduces a non-disclosed random The number reaches the one-time secret effect to ensure forward security; the method of the present invention can be successfully applied to a centralized mobile positioning system to ensure that the three-party entities in the centralized mobile positioning system can safely and reliably generate session keys, and have high encryption strength, The key length is short, the algorithm efficiency is high, and the characteristics of not relying on a third-party organization, the present invention is also applicable to multi-party entity interactive authentication key negotiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-party verifiable key agreement method for centralized mobile positioning system
  • Three-party verifiable key agreement method for centralized mobile positioning system
  • Three-party verifiable key agreement method for centralized mobile positioning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments:

[0061] Based on the self-designed self-certified ECC three-party verifiable key negotiation algorithm, the present invention provides a method for interactive authentication and key negotiation applied to a centralized mobile positioning system. The present invention can be deployed as a separate authentication negotiation function module in existing In some three-party interaction systems, as the initial module of entity online security interaction, it generates session keys safely and reliably for multi-entity interaction; The key length is short and the computational complexity is low, and it can run stably in a lightweight computational unit; at the same time, the security of the long-term key can be guaranteed to the greatest extent without relying on a certificate authority and a key generation center; and the method of the prese...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a three-party verifiable key negotiation method for a centralized mobile positioning system. By independently designing a self-certified ECC three-party certifiable key negotiation algorithm, the mutual authentication between a communication entity client, a central server and a positioning terminal is realized. Negotiate with the key to generate a secure session key; by using the self-designed self-certificate registration algorithm, the client, the central server and the positioning terminal can generate the public-private key pair and their own certificate locally, without the need for the key generation center and the The participation of certificate authority solves the problem of certificate management, certificate authentication overhead and third-party key escrow problem; by using self-designed signature algorithm and identity authentication algorithm, two-way authentication of communication entities can be realized, which can effectively resist man-in-the-middle attacks and Replay attack: The designed self-certified ECC three-party verifiable key agreement algorithm achieves the effect of one-time-one-password by setting a secure random number, ensuring forward security.

Description

technical field [0001] The invention relates to the field of computer network communication and network security, in particular to a three-party certifiable key negotiation method for a centralized mobile positioning system. Background technique [0002] With the development of Internet technology, centralized network service systems are widely used in enterprises due to their advantages of convenient deployment, convenient management, safety and reliability, such as centralized mobile positioning systems, centralized IoT systems, and centralized remote control systems. However, with the continuous development of the application technology of the centralized network service system, the security problems brought by it have gradually become prominent. In the multi-entity interaction system similar to the centralized mobile positioning system, most of them only provide the function of data transmission in plaintext, and it is difficult to ensure the security of data interaction...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/32
CPCH04L9/3066H04L9/0825H04L9/0838H04L9/3268H04L9/3297
Inventor 蒋睿朱普明裴蓓吴松洋
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products