Supercharge Your Innovation With Domain-Expert AI Agents!

Multi-party authentication method based on time division and space division and computer readable storage medium

An authentication method and multi-party technology, applied to key distribution, can solve the problems of large leak risk, space, time limitation, low reliability, etc., and achieve the effect of reducing the risk of leak and ensuring reliability

Active Publication Date: 2022-05-13
SHENZHEN Y& D ELECTRONICS CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the existing threshold secret contribution mechanism does not limit the space and time
Therefore, as long as malicious participants illegally obtain the access path, they can access the secret, so the reliability is not high, and there is a greater risk of leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-party authentication method based on time division and space division and computer readable storage medium
  • Multi-party authentication method based on time division and space division and computer readable storage medium
  • Multi-party authentication method based on time division and space division and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] The invention relates to a multi-party authentication method based on time division and space division, which comprises the steps of selecting an access path from the visited node to the access node and generating an encrypted access path to send to the access node; share, and encrypt different values ​​according to different time periods; the access node decrypts the encrypted access path to obtain the access path; the nodes passed by the access path share decryption to obtain the secret. In the present invention, on the premise that each node is connected with each other and issues certifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multi-party authentication method based on time division and space division and a computer readable storage medium. The method comprises the following steps: an accessed node selects an access path to an access node, generates an encrypted access path and sends the encrypted access path to the access node; dividing a secret into a plurality of parts according to the number of nodes passed by the access path, and performing different value encryption according to different time periods; the access node decrypts the encrypted access path to obtain the access path; and sharing and decrypting nodes passed by the access path to obtain the secret. According to the method, the accessed node can be finally accessed only when the space condition and the time condition are met and each node on the path is credible. Therefore, the reliability of secret access can be effectively ensured, and the leakage risk is reduced.

Description

technical field [0001] The invention relates to the field of secret storage, and more specifically, relates to a multi-party authentication method based on time division and space division and a computer-readable storage medium. Background technique [0002] The idea of ​​secret sharing is to split the secret in an appropriate way. Each split share is managed by different participants. A single participant cannot recover the secret information, and only several participants can cooperate to recover the secret information. That is, for the (n, n) secret sharing scheme, only when n parties participate can the secret be mastered, and any n-1 parties cannot obtain the secret. [0003] However, the existing threshold secret contribution mechanism does not limit space and time. Therefore, as long as malicious participants illegally obtain the access path, they can access the secret, so the reliability is not high, and there is a greater risk of leakage. Contents of the inventio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/085H04L9/0869
Inventor 戚建淮周杰杜玲禧宋晶
Owner SHENZHEN Y& D ELECTRONICS CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More