Mutual identifying key consultation method and system based on hidden common key certificate

A public key certificate, two-party authentication technology, applied in the field of two-party authentication key negotiation, can solve the problems of loss of shared key security, no PKG forward security, Smart protocol can not achieve complete forward security, etc. The effect of distribution difficulty, eliminating session key escrow issues, and improving overall efficiency

Inactive Publication Date: 2007-01-03
SHANGHAI JIAO TONG UNIV +1
View PDF0 Cites 44 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In other words, the Smart protocol does not provide PKG forward security
[0062] Finally, if both parties A and B of the agreement have improper operation, their long-term private key d A 、d B Leaked at a certain moment, then by the sh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mutual identifying key consultation method and system based on hidden common key certificate
  • Mutual identifying key consultation method and system based on hidden common key certificate
  • Mutual identifying key consultation method and system based on hidden common key certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0097] The present invention will be further described below in conjunction with the accompanying drawings.

[0098] Based on the public key of the traditional public key infrastructure PKI, the client needs to verify the public key of the client before using it, such as sending an encrypted message to a client or verifying its signature. And such a verification process must include the verification of the CA signature of the certificate authority. However, signature verification is generally a calculation process with a large amount of calculation.

[0099] In the process of the key agreement agreement, the method of the present invention adopts an implicit authentication public key, so that the user terminal does not need to carry out the public key authentication (that is, the verification of the CA signature) displayed before using the public key, which greatly reduces the The calculation burden on the user end improves the calculation efficiency of the user end during ke...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a negotiation method and a system for both party certificated cryptographic keys based on hidden public key certificates, which applies three stages of system initialization, user end registration, generation of hidden public key certificates and distribution and certificated cryptographic key negotiations to utilize the traditional cipher plan of PKI and identity base to eliminate unnecessary trusteeship of the cryptographic keys on one hand and keep the advantages of part of identity base ciphers on the other, besides, this invention also discloses a system for realizing negotiation method of both party certified keys based on hidden public key certificates.

Description

technical field [0001] The invention relates to a two-party authentication key negotiation method and system based on an implicit public key certificate, which can be applied to secure communication in a large-scale distributed network environment (such as the Internet), and belongs to the technical field of network communication. Background technique [0002] With the increasing popularity of network information technology applications, network information security has increasingly become a subject of much concern. On the one hand, network information technology has made worldwide information exchange more convenient and faster, and at the same time brought more opportunities for business and scientific research to people. On the other hand, once the important information transmitted on the network (such as state secrets, commercial secrets or personal privacy, etc.) is intercepted or tampered with, the country, enterprise or individual will suffer huge losses. In addition...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/12H04L9/30H04L29/06
Inventor 曹珍富董晓蕾王圣宝郑志彬位继伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products