Password authentication method for preventing password certificate from being leaked
A password authentication and credential technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as obtaining user passwords, achieve strong security guarantees, and enhance password protection effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0022] (1) System initialization phase
[0023] Determine the system public parameter set {p, G, g, G according to the security parameters T , H, e, t, n}, where p is a prime number, G is a multiplicative cyclic group of order p, g is a generator of G, and G T is a cyclic group of order p, H: {0, 1} * →G is a secure hash function, e: G×G→G T is a bilinear map, t is the threshold in the threshold secret sharing scheme, and n is the number of key servers.
[0024] authentication server Generate a secret k according to the following steps, and in the key server Share the secret k in a threshold manner:
[0025] 1) Choose a secret evenly and consistently Compute and store g k ;
[0026] 2) random selection Where i=1,...,t-1, construct a t-1 degree polynomial f(x)=k+a 1 x+…+a t-1 x t-1 mod p;
[0027] 3) for each key server Calculate the sub-secret f(i)=k+a 1 i+…+a t-1 i t-1 mod p, where i=1,...,n;
[0028] 4) Send the sub-secret f(i) to the key serve...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com