Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Group broadcast authentication method based on block chain and PUFs

An authentication method, blockchain technology, applied in the field of information security, can solve the problems of access, use, disclosure interruption, vulnerability to physical and clone attacks, etc., to ensure tamper-proof and accountability, resist modeling attacks, Avoid the effect of exposure

Pending Publication Date: 2022-03-01
东南大学深圳研究院
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

That means they are vulnerable to physical and cloning attacks, which can easily lead to unauthorized access, use, disclosure, interruption, modification, inspection, recording or destruction of private messages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group broadcast authentication method based on block chain and PUFs
  • Group broadcast authentication method based on block chain and PUFs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Such as figure 1 As shown, the specific steps of the authentication phase are as follows:

[0028] Step A1: PWD by user password or biometric A Exclusive OR to get the actual stimulus group, randomly select the stimulus C with the sequence number n A , and obtain the corresponding response R through the PUFs module A . Generate the shared secret key and auxiliary data hlp through the Gen function.

[0029] Step A2: Device A constructs M 1 The parameters are sent to the blockchain node Server s , including: device-side pseudo-identity (in this case, PID A ), device group pseudo-identity PG ID , Chinese remainder theorem mapping parameter Y, sequence number n, auxiliary data hlp and blockchain address generator e Adr .

[0030] Step A3: Blockchain Node Server s Based on the Chinese remainder theorem, the parameter m is calculated s, so as to obtain the parameter X, and use it to calculate the actual group identity G ID and device identity intermediate quantity...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a group broadcast authentication method based on a block chain and PUFs (Physical Unclonable Frameworks). The method comprises a registration stage, an authentication stage and an updating stage, the registration stage comprises registration of a block chain node, registration of a device end and registration of a group; in the authentication stage, key negotiation and bidirectional authentication between a device end and a block chain node are completed; the authentication of the block chain node to the equipment end comprises two steps of authentication including initial authentication and secondary authentication, and the authentication of the equipment end to the block chain node is one-time authentication; in the updating stage, updating of authentication parameters of the equipment end and updating of registration parameters of the equipment end on the block chain are completed by the block chain node; according to the method, the PUFs and the block chain technology are combined, the single-point failure problem existing in the PUFs and the traceability of broadcast messages are solved, meanwhile, the physical aggression resistance of the equipment end is guaranteed, anonymity is achieved through the anonymous ID, and expansibility management and lightweight authentication of group members are achieved.

Description

technical field [0001] The invention relates to a group broadcast authentication method based on blockchain and PUFs, belonging to the field of information security. Background technique [0002] With the continuous innovation and increasing number of IoT applications, the automation and intelligence of IoT systems also means that data exchange will be carried out directly between different sensors and other smart electronic devices, such as wearable devices in IoT systems, Car accessories and smart home devices. As an essential message sharing technology, it is different from unicast, broadcast and multicast because of its one-to-many characteristics, it is more suitable for large-scale IoT scenarios, widely used in intelligent transportation, medical monitoring, emergency broadcasting and other scenarios and can effectively Handle the explosion of data. Moreover, with the continuous expansion of the application scale of the Internet of Things and the explosive growth of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L63/0869H04L63/0823H04L63/0876H04L63/1441H04L63/123H04L9/0838H04L9/0866H04L9/0891H04L9/3278H04L9/3297
Inventor 李冰袁鹏伟
Owner 东南大学深圳研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products