Bidirectional anonymous authentication system and method based on mimicry defense principle

An anonymous authentication, anonymous authentication protocol technology, applied in the field of two-way anonymous authentication system, can solve the problems of poor network information security, DAA anonymous authentication can not be actively defended and so on

Active Publication Date: 2020-10-02
NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Technical purpose: In view of the defects in the prior art that DAA anonymous authentication cannot be actively defended and the security of network information is poor, the present invention discloses a two-way anonymous authentication system and method based on the principle of mimic defense, using DAA two-way anonymous authentication technology, Adding a mimic module in the signature detection side, while realizing remote anonymous authentication of the underlying devices connected to the Internet of Things network, at the same time ensuring the access security of the Internet of Things devices at the technical architecture level, with "high reliability, high credibility, high "Available" trinity attribute to ensure the security of the IoT system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional anonymous authentication system and method based on mimicry defense principle
  • Bidirectional anonymous authentication system and method based on mimicry defense principle
  • Bidirectional anonymous authentication system and method based on mimicry defense principle

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The present invention discloses a two-way anonymous authentication system and method based on the mimic defense principle. The scheme will be further described and explained below in conjunction with the accompanying drawings.

[0055] The symbols and their definitions used in this scheme are shown in Table 1;

[0056]

[0057] This solution includes the issuer of the certificate, the signer, the signer, and the signature checker Verifier. The signer is also called the platform platform. The platform platform can be divided into: the host host and the trusted computing platform module TPM.

[0058] The basic principles involved in this program are as follows:

[0059] 1) CL signature: CL signature is Camenisch-Lysyanskaya signature. It is used in group signature or aggregate signature scenarios to improve the anonymity of the signature and reduce the computational complexity of the signature. CL signature is also a signature scheme suitable for zero-knowledge proof, which can s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a bidirectional anonymous authentication system and method based on a mimicry defense principle, and is applied to the technical field of information security. The method comprises the steps that a certificate issuer is initialized; a Join sub-protocol runs between a platform and the certificate publisher; the platform operates a Sign sub-protocol between the TPM and the Host; and a signature detection party operates the Verify sub-protocol through a heterogeneous executive body. According to the invention, a DAA bidirectional anonymous authentication technology is adopted; a mimicry module is added in the signature detection party; while remote anonymous authentication of the underlying equipment accessing the Internet of Things network is realized, the endogenoussecurity function of the mimicry module can effectively resist any security threat implemented by using a known and unknown software and hardware vulnerability back door in a target system, so that the access security of the Internet of Things equipment is ensured at the technical architecture level, the three-in-one attribute of high reliability, high credibility and high availability is achieved, and the security of the Internet of Things system is ensured.

Description

Technical field [0001] The invention relates to the technical field of information security, in particular to a two-way anonymous authentication system and method based on the mimic defense principle. Background technique [0002] At present, the Internet of Things is developing rapidly, and more and more Internet of Things devices are put into use. At the same time, considering the intelligent process of the Internet of Things, the computing capabilities of terminal devices will also have rapid development compared with the original RFID. With the improvement of computing power, the work undertaken by terminal equipment is also developing in more, more complex and more sensitive directions. More and more sensitive data will be collected and analyzed through these equipment to complete corresponding tasks. The more criminals will look at these sensitive data and try to collect them for ulterior purposes. Therefore, the security of the Internet of Things system will also face mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3247H04L9/3263H04L9/3268H04L63/0421H04L63/0823H04L63/0869H04L63/1483
Inventor 郁晨赵海宁羊子煜王泽雨陈垚陈立全冯海生
Owner NANJING REDMATRIX NETWORK SECURITY TECH R & D INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products