Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and system based on certificateless clustering signatures and without bilinear pairs

An authentication method and linear pairing technology, applied in the fields of information security and confidential communication, can solve problems such as low efficiency and achieve the effect of improving efficiency

Inactive Publication Date: 2020-11-10
SUN YAT SEN UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a problem in the existing schemes based on certificateless aggregate signatures: the number of bilinear pairs will increase linearly with the increase of the number of signers, so the efficiency of the scheme is lower
Therefore, the efficiency of the authentication scheme based on certificateless cluster signature needs to be further improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and system based on certificateless clustering signatures and without bilinear pairs
  • Authentication method and system based on certificateless clustering signatures and without bilinear pairs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0022] see figure 1 , figure 1 It shows a flow chart of an embodiment of the authentication method based on certificateless clustering signature without bilinear pairing of the present invention, which includes:

[0023] S101, the key generator and the tracking mechanism initialize the system and generate system public parameters;

[0024] S102, the user generates an anonymous user identity according to the user's real identity and system public parameters;

[0025] S103, the key generator generates the user's local private key according to the system public parameters and the user's anonymous identity;

[0026] S104, the user randomly generates a user public key;

[0027] S105, the user signs the message sent to the verifier according to the system public par...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a authentication method and system based on certificateless clustering signatures and without bilinear pairs, which comprises the following steps that: a key generator and a tracking mechanism initialize a system to generate system common parameters; a user generates a user anonymous identity according to the user real identity and the system public parameter; the key generator generates a user local private key according to the system public parameter and the user anonymous identity; the user randomly generates a user public key; the user signs the message sent to theverifier according to the system public parameter, the user anonymous identity, the user local private key and the user public key; the verifier performs single signature authentication according to the signatures; the verifier performs aggregate signature according to the signature; and the verifier performs aggregation signature authentication according to the aggregation signatures. The invention further discloses an authentication system based on the certificateless clustering signatures and without the bilinear pair. According to the invention, the efficiency of an authentication scheme based on certificateless aggregation signatures can be effectively improved, and the communication security is ensured.

Description

technical field [0001] The invention relates to the technical field of information security and confidential communication, in particular to an authentication method based on a certificateless clustering signature without bilinear pairing and an authentication system based on a certificateless clustering signature without a bilinear pairing. Background technique [0002] With the introduction of the concept of certificateless public key cryptography (Certificateless Public Key Cryptography, CLS-PKC), the certificate management and maintenance issues in the traditional public key cryptography system and the key escrow issues in the identity-based cryptography system have been effectively resolved. solve. In 2003, Al-Riyami and Paterson proposed the first certificateless signature scheme (Certificateless Signature Scheme, CLS). In certificateless public key cryptography, a trusted authority (TA: Trusted Authority) consists of a key generator (PKG: Private Key Generator) and a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06G06K9/62
CPCH04L9/3247H04L9/3255H04L9/0866H04L63/0421G06F18/23
Inventor 熊婉君王若梅周凡
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products