Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous authentication method, device and system, medium and equipment

An anonymous authentication and authentication request technology, applied in the field of information security, can solve the problems of difficulty and low efficiency of anonymous authentication

Active Publication Date: 2022-04-12
BEIJING HAITAI FANGYUAN HIGH TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Embodiments of the present disclosure provide an anonymous authentication method, device, system, medium, and equipment to solve the problems of high difficulty and low efficiency of anonymous authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous authentication method, device and system, medium and equipment
  • Anonymous authentication method, device and system, medium and equipment
  • Anonymous authentication method, device and system, medium and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below with reference to the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the present disclosure, not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0073] It should be noted that the "multiple or several" mentioned herein refers to two or more. "And / or" describes the association relationship of associated objects, indicating that there may be three types of relationships, for example, A and / or B may indicate: A exists alone, A and B exist simultaneously, and B exists independently. The character " / " generally indicates that the contextual objects are an "or" relationship.

[0074] The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anonymous authentication method, device and system, a medium and equipment. According to the scheme provided by the disclosure, a server receives an authentication request sent by a registration client, the authentication request carries a first encryption vector Q, the registration client adopts a fully homomorphic encryption algorithm E, and encrypts a certificate vector u provided by the server by using a server public key P to generate a second encryption vector EP (u); performing matrix vector product operation of a ciphertext space with an encryption matrix EP (A) provided by a server side to obtain a first encryption vector Q; and decrypting the first encryption vector Q by using a server private key d and adopting a fully homomorphic decryption algorithm E-1 to obtain a decryption value E-1d (Q), and determining whether the authentication of the registered client is passed or not according to the decryption value E-1d (Q). The registration client obtains the EP (A) from the server, and the authentication matrix A cannot be obtained due to the fact that the registration client does not know the private key d of the server; a fully homomorphic encryption algorithm is utilized to perform matrix vector product operation of a ciphertext space to obtain a first encryption vector Q, so that the calculation security of the two parties is ensured.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular to an anonymous authentication method, device, system, medium and equipment. Background technique [0002] This section is intended to provide a background or context for implementations of the disclosure that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] Identity authentication plays a very important role in the field of information security and is the basis of other security mechanisms. Among various identity authentication technologies, anonymous authentication has become an important research direction. The so-called anonymous authentication refers to the ability to authenticate users or terminals while protecting the privacy of user identities. Anonymous authentication has very important applications in mobile communications, e-commerce, Internet of Vehicles, remote login, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/60
Inventor 王学进刘雪梅蒋红宇
Owner BEIJING HAITAI FANGYUAN HIGH TECH