Security authentication method based on chameleon hash function

A hash function and security authentication technology, which is applied in the field of security authentication based on the Chameleon hash function, can solve problems such as difficult to meet the switching requirements of 5G network mobile terminals, and achieve the goal of ensuring authenticity, reducing the number of communication rounds, and avoiding malicious operations Effect

Active Publication Date: 2022-01-04
SOUTHWEST JIAOTONG UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The horizontal handover of homogeneous wireless technology is difficult to meet the handover requirements of mobile terminals in 5G networks, and further consideration needs to be given to switching the network connection of mobile terminals from one wireless technology to another, so that mobile terminals can maintain the best performance during the movement process. connect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security authentication method based on chameleon hash function
  • Security authentication method based on chameleon hash function
  • Security authentication method based on chameleon hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074]The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0075] Please refer to figure 1 As shown, the present invention realizes a kind of security authentication method based on chameleon hash function, and its steps are:

[0076] S1. Perform system initialization on the key generation center, and select system public parameters to improve the system. Specifically, it includes the following steps:

[0077] Select the safety factor k to generate a large prime number p with k bit...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safety certification method based on a chameleon hash function, which relates to the field of wireless communication safety certification of heterogeneous wireless networks and mainly comprises the following operation steps of: firstly, system initialization is performed on a key generation center to select the system public parameters and finish system establishment; the home domain network server HS completes registration; the foreign region network server FS completes registration; the mobile terminal MT completes registration; the home domain network server HS distributes switching authorization information to a legal and credible mobile terminal MT; and the mobile terminal MT and the foreign region network server FS complete authentication switching and session key negotiation. According to the method, the security real-time authentication of the mobile terminal and the foreign region network in the heterogeneous wireless network can be effectively realized, and the identity privacy of the mobile terminal and the resistance to temporary private key leakage and replay attacks are ensured. Moreover, in the authentication process, the mobile terminal consumes less resources.

Description

technical field [0001] The invention belongs to the field of wireless communication security authentication of heterogeneous wireless networks, and in particular relates to a security authentication method based on a chameleon hash function. Background technique [0002] Driven by business and user needs, the fifth-generation mobile communication technology, with its higher transmission rate and lower transmission delay, supports users' high-level demand for information and provides users with a better network experience. The multi-level and coexistence of multiple access modes of the 5G network give it significant advantages in terms of network deployment flexibility and system capacity. The horizontal handover of homogeneous wireless technology is difficult to meet the handover requirements of mobile terminals in 5G networks, and further consideration needs to be given to switching the network connection of mobile terminals from one wireless technology to another, so that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3257H04L9/0861H04L9/0838H04L9/0844H04L63/123H04L63/1441H04L63/08
Inventor 张文芳邱爽王小敏
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products