Efficient certificateless authenticated key agreement method and system without bilinear pairing operation

A technology of authenticated key agreement and bilinear pairing, which is applied in the field of authenticated key agreement to achieve the effect of improving anti-jamming attack, improving reliability, and low overhead

Active Publication Date: 2022-02-08
WUHAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] So far, forming a KCI attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient certificateless authenticated key agreement method and system without bilinear pairing operation
  • Efficient certificateless authenticated key agreement method and system without bilinear pairing operation
  • Efficient certificateless authenticated key agreement method and system without bilinear pairing operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The present invention is mainly based on the non-certificate authentication / self-authentication public key mechanism, and proposes a session key negotiation method for realizing two-party authentication based on difficult problems. This method fully considers the perfect forward security, prevents counterfeiting attacks, KCI attacks, replay attacks and other problems in the negotiation process, and uses the symmetric key confirmation stage after negotiation to ensure the reliability of the negotiation. Compared with previous schemes, the negotiation of the session key authenticated by the present invention is safer and more reliable, and the negotiation process is more efficient.

[0056] Firstly, the technical terms involved in this embodiment are defined as follows:

[0057] User: a legal session entity, the participant of a session in the network, or the message sender / receiver of a communication, which may be a process, a computer, a mobile terminal or a sensor node...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

In order to enable the overhead of an authenticated key agreement process to tend to be the lowest on the basis of ensuring safety and reliability, the invention discloses a novel certificateless authenticated key agreement method without bilinear pairing operation. According to the method, mutual authenticated key agreement is realized by integrating a Schnorr signature with a public key basic difficulty problem; as long as an attacker cannot obtain a long-term user private key, a part of private keys and a temporary private key of a certain party at the same time and does not initiate counterfeit and forgery attacks after obtaining the long-term user private key and the part of private keys, a session key obtained by agreement through the method is safe; and reliable key agreement is realized by adding a key confirmation link. The invention also discloses a system based on the method. An ECC-based embodiment shows that the amount of calculation only has a scale of three scalar multiplications, each party needs to send two messages in an agreement stage (without key confirmation), but the total amount of the messages is equivalent to that of similar protocols, so that the invention provides the safe, reliable and efficient authenticated session key agreement method and system.

Description

technical field [0001] The invention belongs to the technical field of authentication key agreement in network security, in particular to a public key-based non-certificate authentication or self-authentication key agreement (or distribution, distribution, exchange) method, which can be used for inter-node security in distributed networks Efficiently negotiate shared session keys. Background technique [0002] With the continuous development and application of next-generation networks, security issues have become increasingly prominent. In order to realize the secure communication of open and interconnected computer networks, especially the secure communication of wireless networks, we need to use public key technology to securely construct a session symmetric key between two users, that is, we need to solve the authentication key agreement (AKA , AuthenticatedKeyAgreement) problem. Recently, there are mainly studies by Deng Lunzhi, Liu Yong, Tu Hang, Seung-Hyun Seo, Mutaz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/0838H04L9/0861H04L9/3226H04L63/1441
Inventor 孙发军
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products