Identity method based on public key certificate

A technology of identity authentication and public key certificate, applied in user identity/authority verification, digital transmission system, electrical components, etc., can solve problems such as resource shortage, time-consuming, and unsatisfactory algorithms, and achieve the effect of fast computing speed

Inactive Publication Date: 2005-03-09
ZHEJIANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for applications with limited computing resources such as smart cards, this algorithm is not ideal
Because the exchange of information with the outside is time-consuming, and the amount of storage required for each authentication makes the limited resources of the card more strained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] When the present invention is used for network communication to carry out identity authentication, suppose user A wants to carry out identity authentication to user B, proves to B that really is the main body that A claims, in this method, user A and user B share a system parameter (Z p , G, q, H), Z Here are examples where P is 512 bits and 1024 bits:

[0020] 512: P=0xED100D4D388990F60C7BD3C800D83355904433FF74E3BE0659D5C4E818239E600BD2D0DB7A5F42D2DAD99DF5DCC1014FD5B3F863D6632578230706C0A4CACCB7;

[0021] 1024:P=0xED8E7692CDA48EE01F012E58AA7F06FD6203393B17C392DF6970B4934D4F613A35EB9A64208D26CA148B12FF28D6B18EF427BEFCAC7780AFD95229E759177137261A6D939FB5465F72D16EB3E7ECE01232081F003A3938555D49328E4860FF4F77FD1BBDB3222E0D0D021619EAA5F81F4C98E92C595801B04C3C9E3A0E4C0A53;

[0022] Z p is a finite group generated modulo primes, G is Z p The subgroup whose order is q (p=2q+1, p, q are large prime numbers), H is G 3 → Anti-collision hash function of G, system parameters (Z ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an identity verification method based on shared key certificates. It is a method of varying identity based on discrete logarithms with collision resist different functions and shared certificate. It is safe with a fast calculation speed, which has been proved. It can be used in identity verification so as to control storage, electric business, bills, certificates and the identity verification of information transmitters in communication

Description

technical field [0001] The invention relates to an identity authentication method for confidential or safe communication, in particular to an identity authentication method based on a public key certificate. Background technique [0002] Identity authentication refers to the confirmation technology of user identity, which is the first and most important line of defense of network security. Various applications and computer systems in the network need to confirm the legitimacy of a user through identity authentication, and then determine the user's personal data and specific permissions. When using a credit card in life, you need to enter a password, and you need to show your ID card when you get on the plane, etc. These are all application examples of identity authentication. The existing identity authentication methods generally include identity authentication methods based on zero-knowledge theory, identity authentication methods based on informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/32
Inventor 朱华飞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products