Bidirectional identity authentication method based on lightweight CA, computer program and storage medium

A two-way identity authentication and lightweight technology, which is applied in the field of two-way identity authentication based on lightweight CA, computer programs and storage media, can solve the problems of high communication transmission overhead, identity privacy leakage, and resource consumption, etc., to reduce Occupies storage resources, transmits less information, and has the effect of security

Inactive Publication Date: 2021-04-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problems existing in the prior art when authenticating nodes in a mobile ad-hoc network, there is a risk of identity privacy disclosure, high communication transmission overhead, and high resource consumption, a two-way identity authentication based on a lightweight CA is provided. method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bidirectional identity authentication method based on lightweight CA, computer program and storage medium
  • Bidirectional identity authentication method based on lightweight CA, computer program and storage medium
  • Bidirectional identity authentication method based on lightweight CA, computer program and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Such as figure 1 , a two-way identity authentication method based on a lightweight CA, including:

[0040] Initialization: CA node and ordinary node generate a public-private key pair, and the CA node sends the public key of the CA node to the ordinary node in the domain;

[0041] Intra-domain authentication: The ordinary nodes of both parties to be communicated apply for their respective secondary public keys from the CA node, and send their respective secondary public keys to the other party. Both parties receive the secondary public key of the other party for identity verification, and the verification process initiates the negotiation session password process Establish a secure channel to send messages;

[0042] Cross-domain authentication: Multi-domain CA nodes sign the alliance public key to establish a trust alliance. When a common node roams to a different region, the CA node corresponding to the different region verifies the authenticity of the node's identity...

Embodiment 2

[0092] On the basis of Embodiment 1, a computer program is provided, which includes computer program instructions, wherein, when the program instructions are executed by a processor, they are used to implement the lightweight CA-based two-way identity authentication in Embodiment 1 The process corresponding to the method.

Embodiment 3

[0094] On the basis of Embodiment 1, a computer-readable storage medium is provided, on which computer program instructions are stored, wherein, when the program instructions are executed by a processor, they are used to implement the lightweight CA-based The process corresponding to the two-way authentication method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a bidirectional identity authentication method based on lightweight CA, which comprises the following steps: initialization: a CA node and a common node generating a public and private key pair, and the CA node sending a CA node public key to the common node in the domain; intra-domain authentication: the common nodes of the two parties to be communicated respectively applying for respective auxiliary public keys from the CA node and sending the respective auxiliary public keys to the opposite parties, and the two parties receiving the auxiliary public keys of the opposite parties to perform identity authentication and establishing a secure channel to send messages by initiating a negotiation session password process; cross-domain authentication: establishing a trust alliance by mutual signing of alliance public keys among CA nodes of multiple domains, verifying the authenticity of node identities by the CA nodes corresponding to different regions and signing and issuing temporary auxiliary public keys for the CA nodes when the common nodes roam to the different regions, and initiating an authentication request to the common nodes in the different regions through the temporary auxiliary public keys, and if the authentication is passed, initiating a negotiation session password process to establish a secure channel to send a message.

Description

technical field [0001] The invention relates to the authentication field, in particular to a lightweight CA-based two-way identity authentication method, computer program and storage medium. Background technique [0002] The current main security authentication mechanisms in mobile ad hoc networks include centralized authentication and distributed authentication. [0003] Centralized authentication applies the existing PKI-based certificate authentication mechanism to the mobile ad-hoc network, and selects nodes in the network as CAs to perform certificate issuance, issuance, and revocation. This authentication mechanism requires centralized management of certificates, and it is difficult to directly apply to mobile ad hoc networks with limited resources such as computing, storage, and bandwidth. On the one hand, the certificate storage of a large number of nodes increases the storage burden of CA nodes. Invalidate the storage of newly added nodes. On the other hand, the C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/069H04L9/32
CPCH04L9/3273H04L9/3268
Inventor 卿昱李春燕陈卫涛李小花李佳楠余双波
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products