Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based authentication key negotiation method based on lattice

An authentication key agreement and identity technology, applied in the field of lattice-based identity-based authentication key agreement, can solve problems such as poor security, achieve the effect of eliminating public key certificates, good performance, and easy implementation

Pending Publication Date: 2022-04-01
ZHONGYUAN ENGINEERING COLLEGE
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the technical problem of poor security of the existing key agreement method, the present invention proposes a lattice-based identity-based authentication key agreement method, which is applicable to the handshake process of the latest version 1.3 Transport Layer Security (TLS) protocol Based on the identity authentication key agreement on the lattice, the security of the scheme depends on the intractability of the difficult problem on the lattice, which can resist quantum computing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based authentication key negotiation method based on lattice
  • Identity-based authentication key negotiation method based on lattice
  • Identity-based authentication key negotiation method based on lattice

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] Such as figure 1 As shown, a lattice-based identity-based authentication key agreement method, based on the construction of lattice problems, can resist quantum attacks, and its steps are as follows:

[0043] Step 1: The registration and information initialization of the communication entity between the client and the server, so as to realize the stable connection between the client and the server.

[0044] Such as figure 2 As shown, the PKG system i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a lattice-based identity-based authentication key negotiation method, which comprises the following steps of: registering and initializing information of communication entities of a client side and a server side to realize stable connection between the client side and the server side; a protocol initiator of TLS protocol handshake generates a temporary public and private key pair, generates a ciphertext according to a message, and sends the ciphertext and the temporary public key to a protocol responder by using Client Hello; after receiving the message, the protocol responder performs identity authentication and generates a ciphertext, and sends the ciphertext to the protocol initiator through Server Hello; after receiving the message, the protocol initiator carries out decryption and identity verification on the ciphertext, and if the identity verification is passed, the protocol initiator calculates a session key and carries out key export with the protocol responder; otherwise, the protocol initiator rejects the message and directly terminates key agreement. The security of the method is based on the lattice difficulty problem, quantum computing attacks can be resisted, and the method has more advantages in security and execution efficiency.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to a lattice-based identity-based authentication key negotiation method. Background technique [0002] At present, the vast majority of security protocols widely deployed in network information systems (such as the Internet and other public network infrastructures) are implemented using traditional public key cryptosystems such as Diffie-Hellman, RSA, and ECC. The security of these traditional public key cryptosystems The property is often built on the basis of classical number theory problems such as large integer decomposition problems and discrete logarithm problems. In recent years, the rapid development of quantum computing technology and its great potential in solving large-scale computing problems have brought unprecedented impact on the security of the above-mentioned traditional public key cryptosystems. Post-quantum security protocols are imperative. Trans...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L9/40
Inventor 倪亮高丽平单芳芳谷威力周恒昇张亚伟
Owner ZHONGYUAN ENGINEERING COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products