Cryptographic key generation method and system based on identity

A key generation and key generator technology, applied in the direction of user identity/authority verification, etc., can solve the problems of key escrow and loss of identity authentication, and achieve the effect of preventing impersonation attacks, removing dependencies, and being easy to accept.

Inactive Publication Date: 2006-12-13
SHANGHAI JIAO TONG UNIV +1
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This creates two corresponding problems: one is the key escrow problem
Since PKG has the user's private key, PKG can not only decrypt any user's file, but also impersonate any user to sign, so that the identity authentication in this system is not guaranteed.
Second, the issue of secure channels
So the key escrow problem remains

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cryptographic key generation method and system based on identity
  • Cryptographic key generation method and system based on identity
  • Cryptographic key generation method and system based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below with reference to the drawings and embodiments, but it is not intended to limit the present invention.

[0043] The present invention integrates three technologies: blinding technology, multi-party authorization mechanism and password-based authentication mechanism. The function of blinding is to remove the dependence on the secure channel, and the function of multi-party authorization mechanism is to overcome the impact of a separate key generator on users. The escrow of the private key, based on the password authentication mechanism, is to prevent an attacker from imitating the user or a certain key generator.

[0044] The scheme of the present invention is specifically as follows:

[0045] See figure 1 The present invention provides an identity-based key generation method, the method steps are as follows:

[0046] Step A: Set system parameters; the specific implementation steps are as follows:

[0047]Step 101: Set t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key generating method and system based on identity in the computer communication and electronic business applying domain, which comprises the following steps: setting system parameter; generating user information; producing original key; detecting original key; generating reinforced key; producing user key. The system comprises the following parts: system parameter generating mode, user information generating mode, original key generating mode, original key detecting mode, reinforced key generating mode and user key generating mode. The invention solves the problem of reliability for safe channel and key trust, which prevents kinds of jactitation attack.

Description

Technical field [0001] The invention relates to the field of computer communication and e-commerce applications, in particular to an identity-based key generation method and system. Background technique [0002] In 1984, Shamir proposed an identity-based cryptosystem. Theoretically, identity-based cryptosystems and digital signature systems do not require a certification center, and can use any character string as a user’s public key. This capability also enables identity-based cryptosystems to have a wide range of applications (for example, ideal electronic Mailboxes, various smart card applications), as well as the headaches of time limit restrictions, authority restrictions, and permission recovery in the common cryptosystem can all be solved. [0003] Although Shamir gave an identity-based signature scheme in 1984, the first practical identity-based encryption system was not given by Boneh and Franklin until 2001. Their scheme is referred to as IBE (Identity-based encryption,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 曹珍富董晓蕾王励成郑志彬位继伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products