Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Two-way authentication and key agreement method under multi-server architecture

A key agreement, two-way authentication technology, applied in the field of multi-server architecture, can solve problems such as the difficulty of computing discrete logarithms

Active Publication Date: 2022-06-21
杭州后量子密码科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The security of the D-H key exchange algorithm relies on the fact that while it is relatively easy to compute the exponent modulo a prime, it is difficult to compute the discrete logarithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Two-way authentication and key agreement method under multi-server architecture
  • Two-way authentication and key agreement method under multi-server architecture
  • Two-way authentication and key agreement method under multi-server architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] (1) System initialization

[0039] In the system initialization phase, the registration server generates initialization parameters for the registration phase, mutual authentication and key negotiation phases. The following table shows the symbols in the system and their meanings.

[0040] Table 1 Symbols and their meanings

[0041]

[0042]

[0043] The registration server runs the system parameter generation function Gen(1 n ), the input of the system parameter generation function is n∈Z + , the output parameters and the process are as follows:

[0044] (1.1) Select bilinear mapping group

[0045] The registrar selects the bilinear mapping group G 1 and G 2 , the order of both groups is q, and P is G 1generator of and P∈G 1 , is a bilinear mapping operation.

[0046] (1.2) Generate system master key and system public key

[0047] The registration server generates random numbers As the system master key, and calculate the system public key P pub =sP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a two-way authentication and key negotiation protocol under the multi-server framework. The protocol completes the two-way authentication between the user and the big data server under the multi-service architecture, and generates a session key between the two types of entities, aiming at verifying the authenticity of the identities of both parties and realizing the anonymous authentication of the user. The secure access of legal users on the network prevents unauthorized users from entering the network to obtain sensitive data, and ensures the confidential transmission of later data on open channels. Its technical points are: two-way authentication and key agreement protocol under multi-server architecture, use biological key to verify user's identity, use public key encryption to hide user's identity, and use Diffie–Hellman (D‑H) key exchange technology to generate The authentication data is complete anonymous authentication of both parties and generates a session key. On the basis of ensuring anonymity, the protocol simplifies the authentication and key agreement process, reduces the communication cost and calculation cost in the authentication and key agreement process, and achieves the effect of one authentication for multiple visits by the user. The network provides security. This protocol is suitable for secure access and transmission of network data under open channels.

Description

technical field [0001] The invention belongs to the field of information security under a multi-server architecture, and relates to technologies such as D-H key exchange technology, bilinear mapping technology, hash function and protocol security analysis method, etc. In order to solve the security problems when sensitive data is transmitted on the open channel, a bidirectional authentication and key agreement method under the multi-server architecture is proposed. The user and the big data server in the method complete the two-way anonymous authentication and generate the session key based on the D-H key exchange technology, aiming to realize the secure access of the legitimate user to the network and ensure the confidential transmission of the data on the open channel. Background technique [0002] Diffie-Hellman (D-H) key exchange technology is a key exchange algorithm published by Whitefield Diffie and Martin Hellman in 1976. This key exchange technique enables two user...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/60G06F21/34G06F21/32
CPCG06F21/445G06F21/34G06F21/602G06F21/32
Inventor 李凤银王艳丽黄宝贵王颖崔洋于思琦
Owner 杭州后量子密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products