Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity authentication method based on public key certificate on ellipse curve

An elliptic curve and public key certificate technology, which is applied in the field of identity authentication based on public key certificates on elliptic curves, can solve problems such as resource constraints, time-consuming, and unsatisfactory algorithms, and achieve the effect of fast computing speed

Inactive Publication Date: 2003-09-24
ZHEJIANG UNIV
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for applications with limited computing resources such as smart cards, this algorithm is not ideal
Because the exchange of information with the outside is time-consuming, and the amount of storage required for each authentication makes the limited resources of the card more strained

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] When the present invention is used for identity authentication, it is assumed that user A wants to conduct confidential communication with user B, and needs to transmit the secret session key on an insecure channel. In the present invention, user A and user B share an elliptic curve, and an elliptic curve is provided here as follows:

[0019] E: y 2 =x 3 +ax+b mod n

[0020] in

[0021] p=6277101735386680763835789423207666416083908700390324961279;

[0022] seedE = 0x3045ae6fc8422f64ed579528d38120eae12196d5;

[0023] r = 0x3099d2bbbfcb2538542dcd5fb078b6ed5f3d6fe2c745de65;

[0024] a=-3;

[0025] b=0x64210519e59c80e70fa7e9ab72243049feb8deecc146b9b1;

[0026] h=1

[0027] The order of the elliptic curve is:

[0028] n=6277101735386680763835789423176059013767194773182842284081;

[0029] It is a prime number.

[0030] The selection of the base point P with order n is:

[0031] P = (xG, yG) where

[0032] xG=0x188da80eb03090f67cbf20eb43a18800f4ff0afd82ff1012;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an identity identification method based on public key certification on the elliptic curve. It is an identify identification method by proceeding from discrete logarithm problem on the elliptic curve and utilizing anti-collision miscellaneous function and public key certificate to make identity identification. It has provable safety and rapid operation speed. It canbe extensively used in the fields of identity identification of network communication, electronic business, bill, certificate and identify identification, etc.

Description

technical field [0001] The invention relates to an identity authentication method for confidential or safe communication, in particular to an identity authentication method based on a public key certificate on an elliptic curve. Background technique [0002] Identity authentication refers to the confirmation technology of user identity, which is the first and most important line of defense of network security. Various applications and computer systems in the network need to confirm the legitimacy of a user through identity authentication, and then determine the user's personal data and specific permissions. When using a credit card in life, you need to enter a password, and you need to show your ID card when you get on the plane, etc. These are all application examples of identity authentication. The existing identity authentication methods generally include identity authentication methods based on zero-knowledge theory, identity authentication met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/00H04L9/32
Inventor 朱华飞
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products