Login verification method based on zero knowledge proof

A zero-knowledge proof, login verification technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve the problem of low security of account login verification, and achieve the effect of improving account security

Pending Publication Date: 2022-04-26
浙江数秦科技有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is: the technical problem that the security of account login verification is not high at present

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login verification method based on zero knowledge proof
  • Login verification method based on zero knowledge proof
  • Login verification method based on zero knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] A login verification method based on zero-knowledge proof, please refer to the attached figure 1 , including the following steps: step A01) the user end generates and saves the N-ary polynomial; step A02) the user end reduces the dimension of the N-ary polynomial to obtain the dimensionality reduction polynomial, stores the dimensionality reduction vector in association with the application server ID, records the dimensionality reduction vector The value of the dimension variable; Step A03) The client provides the dimensionality reduction polynomial to the application server through encrypted communication, and the application server stores the dimensionality reduction polynomial in association with the client ID; Step A04) When the client requests to log in to the application server, the application server generates a number of The value of the group variable, the client restores the dimensionality reduction polynomial according to the dimensionality reduction vector an...

Embodiment 2

[0026] A login verification method based on zero-knowledge proof, including: the client generates and saves an N-ary polynomial, f(x,y,z,s)=3*x^3*y*z^2*s^3+5 *x^2*y^2*z^3*s+13*x*y^3*z^2*s^2, which is a 4-element polynomial, and the monomial with the highest degree is 3*x^3*y* z^2*s^3, the degree of polynomial is 9 degrees.

[0027] The client reduces the dimensionality of the N-ary polynomial to obtain the dimensionality reduction polynomial, associates and stores the dimensionality reduction vector with the application server ID, and the dimensionality reduction vector records the value of the dimensionality reduction variable. Specifying s=2, substitute f(x,y,z,s). Obtain the dimensionality reduction polynomial f(x,y,z)=24*x^3*y*z^2+10*x^2*y^2*z^3+52*x*y^3*z^2 . The dimensionality reduction vector is (0,0,0,3), and the corresponding value of x, y, and z in the dimensionality reduction vector is 0, which means that the values ​​of variables x, y, and z are not limited, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information, in particular to a login verification method based on zero-knowledge proof, which comprises the following steps: a user side generates and stores an N-element polynomial; the user side carries out dimensionality reduction on the N-element polynomial to obtain a dimensionality-reduced polynomial, associatively stores a dimensionality-reduced vector and the application server identifier, and records a value of a dimensionality-reduced variable by the dimensionality-reduced vector; the user side provides the dimension reduction polynomial for the application server for storage through encryption communication; when the user side requests to log in the application server, the application server generates a plurality of groups of variable values, and the user side calculates the value of the dimension reduction polynomial corresponding to the variable values and provides the value to the application server; and the application server verifies whether the plurality of groups of variable values are matched with the received values of the dimensionality reduction polynomial, if so, the login verification is passed, and if not, the login verification is not passed. The method has the substantive effects that when the user side logs in the application server every time, the provided passwords are different, and the account security of the user is effectively improved.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a login verification method based on zero-knowledge proof. Background technique [0002] When a user logs in to the application server, the user needs to provide the user name and password to the application server, which may lead to the risk of the user's password being stolen. Affect the user's rights and interests on the application server. For this reason, research on account and password security in this field has never been interrupted. At present, the latest account verification adopts the secondary verification scheme combined with the mobile phone number, which is used to ensure that the disposal is the user's true intention when dealing with important rights and interests. However, the verification using the mobile phone number can only guarantee the security of important operations, and the user's password is still at risk. Therefore, it is necessary to continu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/40
CPCH04L63/083H04L63/0428H04L9/3218H04L63/0838Y02D10/00
Inventor 张金琳高航
Owner 浙江数秦科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products