CN102594556A - Identity authentication method based on synchronization of spatiotemporal chaos - Google Patents

Identity authentication method based on synchronization of spatiotemporal chaos Download PDF

Info

Publication number
CN102594556A
CN102594556A CN2011104094979A CN201110409497A CN102594556A CN 102594556 A CN102594556 A CN 102594556A CN 2011104094979 A CN2011104094979 A CN 2011104094979A CN 201110409497 A CN201110409497 A CN 201110409497A CN 102594556 A CN102594556 A CN 102594556A
Authority
CN
China
Prior art keywords
synchronization
authentication
usbkey
server
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104094979A
Other languages
Chinese (zh)
Inventor
易小琳
刘旭辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Technology
Original Assignee
Beijing University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Technology filed Critical Beijing University of Technology
Priority to CN2011104094979A priority Critical patent/CN102594556A/en
Publication of CN102594556A publication Critical patent/CN102594556A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Disclosed is an identity authentication method based on synchronization of spatiotemporal chaos. The identity authentication method based on the synchronization of the spatiotemporal chaos includes that every other state are extracted from a state sequence of a spatiotemporal chaos system as basic data to generate a key; initialization of system parameters at a server and a USBKey and information exchange of root keys are finished during an initialization phase; after a login phase and a synchronization phase, the USBKey responds to a random number in the information through verification, extracts synchronizing semaphore to generate new temporary public-private key pair, verifies a signature to confirm the identity of a sever, sends back the information containing a password and the signature of a user to the server, and the server confirms the identity of the user through signature verification in an authentication phase. According to the identity authentication method based on the synchronization of the spatiotemporal chaos, not only the authentication can be accomplished correctly, but also various known attacks can be resisted; and the public-private key pair in a dynamic change is used for accomplishing signing and authenticating processes of a protocol in a low network cost and without any exchange of secret information. Dynamic update of the key not only improves the security of the authentication method, but also prolongs service life of the relevant USBKey.

Description

Identity identifying method based on synchronization of spatiotemporal chaos
Technical field
The present invention relates to the long-distance identity-certifying method under a kind of complex network environment, be specially a kind of identity identifying method based on synchronization of spatiotemporal chaos.
Background technology
Nineteen ninety, the Pecora of US Naval Research Laboratory and Carroll propose a kind of driving that is called first---the chaos method for synchronous of response, and successfully observed the synchronous phenomenon of chaos in the laboratory.Their initiative work greatly promoted chaos theoretical synchronously with the research of using, especially in the application in secure communication field.The technology that is usually used in the chaotic secret communication field has technology such as chaos is covered, chaos shift keying, Chaos Modulation.A common feature of these technology is: they all are the chaotic synchronizing systems that adopts low dimension, from the confidentiality of the technical realization communication of the coding and decoding of signal.The chaos system of in this type technology, relatively using always has based on the chaotic synchronizing system of cai's circuit and Lorenz chaos system etc.But these technology are not directly applied for the secure communication of network environment.People such as Hu Guang utilize unidirectional coupling map circling point (OCRML) space-time chaos model and unidirectional coupling map lattice point (OCOML) space-time chaos model to realize that the driving response of space-time chaos system is synchronous.This synchronization of spatiotemporal chaos model is that the data encryption communication under the computer network environment provides new thinking.
Because the space-time chaos system had both kept the pseudo-randomness and the ergodic of chaos system, therefore designed a kind of synchronisation key generating algorithm based on synchronization of spatiotemporal chaos.In identity identifying method, make the both sides that carry out authentication can the identical key of synchronized generation algorithm application based on synchronization of spatiotemporal chaos.The key that the synchronisation key algorithm is produced upgrades the public private key pair that Digital Signature Algorithm uses in the authentication method as the key updating factor, produces dynamic digital signature.Utilize the non-repudiation of digital signature and the authentication property of data source carried out the authentication of identity.Have only validated user could generate effective digital signature, and also have only validated user to pass through by certifying signature.
Along with the appearance of smart card, various authentication methods based on smart card also occur in succession, like the remote authentication method based on smart card of Hwang in 2000 and Li proposition.The appearance of USBKey has subsequently caused a research boom of identity identifying technology again, and various identity identifying methods based on USBKey also occur in succession.Current USBKey product all is to be theoretical foundation with digital certificate and RSA public key algorithm, and all is to adopt fixing key.Fact proved that the long-term use of same key will reduce its fail safe in any cryptographic methods.Therefore in the authentication method based on certificate, digital certificate has clear and definite useful life, yet its key is changed the process complicacy.But not having the replacing of clear and definite key in the authentication method based on certificate, this will inevitably make Related product fail safe in long-term use reduce.
Current widely used identity identifying technology mainly contains three types: the one, and the password authentication mode of user name encrypted code, two are based on the authentication techniques of challenge/answer method, and three are based on the authentication techniques of public-key cryptosystem and digital certificate.Except that these three types of widely used authentication techniques, also have the authentication techniques based on biological characteristics such as fingerprint, irises, because latter's technology is immature relatively, characteristics such as cost height are not by extensive employing.
In three types of authentication techniques that are widely used, the not competent current security requirement of password authentication mode.And, the authentication service of higher level of security can be provided based on the identity identifying technology of public-key cryptographic keys system, but this authentication service based on digital certificate, design of protocol is complicated, and offered load is bigger, and needs a believable third party to support.X.509 authentication protocol is exactly the normalized version of this type authentication techniques.Because the development of present domestic CA (Certificate Authentication) service industry is also lack of standardization, the authentication method based on digital certificate of various no third sides is suggested in succession.Identity identifying technology offered load based on challenging/replying is little, and higher high other authentication service of peace level can be provided.But it exists key to share and a distribution difficult problem.
For guaranteeing the fail safe of key, various authentication methods based on smart card and USBKey are suggested in succession.Like Hwang-Li smart card authentication method.This method is difficult to avoid Shen-Lin-Hwang to attack and Chan-Cheng attacks.Various improvement versions to the Hwang-Li method occur in succession subsequently; Improvement to the time stamp T of using in the Hwang-Li method is arranged; The improvement of adopting the ECC algorithm that this method is carried out in addition becomes the modulus-power algorithm in the big number field in the method into the dot product arithmetic of rational point among the ECC.
More than various authentication techniques and method a common characteristic is all arranged, that is: the whole bag of tricks all adopts a changeless key.The three parts who in the authentication techniques based on digital certificate, relates to must adopt a fixing public private key pair to carry out authentication, and based on appointing in advance also in the authentication method of challenge/answer techniques that identical key carries out authentication.
Like this, the long-term use of same key all will make the fail safe of method reduce.This authentication method produces dynamic digital signature and carries out dynamic authentication with the public private key pair that the synchronization of spatiotemporal chaos system dynamically updates the authentication both sides.Characteristics such as method is the basis with the ECDSA algorithm, adopts the authentication techniques based on challenge/response mode to design, and it is little to have load capacity, safe, and life cycle is long.
Summary of the invention
The objective of the invention is to; Through a kind of identity identifying method based on synchronization of spatiotemporal chaos is provided; A kind of synchronisation key generating algorithm based on synchronization of spatiotemporal chaos is applied to based in the USBKey identity identifying method; Dynamically update the authentication both sides and be used for the key of authentication, use the key of dynamic change to solve the safety problem that in the existing authentication method fixed key is faced.Method is divided into server end, client and USBKey and holds three parts based on the B/S pattern.The present invention can be applicable to authentication and the authentication under the various Secure Transaction under the network environment.
A kind of identity identifying method based on synchronization of spatiotemporal chaos of the present invention is to adopt following technological means to realize:
A kind of identity verification scheme based on synchronization of spatiotemporal chaos is got state from the status switch interval of space-time chaos system, as the master data that generates key; Get the low X position of space-time chaos system mode and put into one three byte arrays variable, and, form the part of final key with certain X+1 position of filling this three byte arrays variable in the low X position of another shape; May further comprise the steps:
1.1. accomplish the initialization of system parameters at initial phase server end and USBKey end, and accomplish the exchange of root key information;
1.2. landing phase, the file layout of USBKey conversion user password, and send authentication application to server;
1.3. synchronous phase generates the synchronizing signal amount by server, and generates new interim public private key pair and public words key according to this synchronizing signal amount, the synchronizing signal amount is signed message is beamed back USBKey;
1.4. authentication phase; USBKey is through the random number in the authentication response information; And extracting the new interim public private key pair of synchronizing signal amount generation, certifying signature is confirmed server identity; And beam back the information that comprises user password and signature and give server, server is confirmed user identity through certifying signature.
Aforesaid X position is 23.
Aforesaid X+1 position is 24.
Aforesaid authentication phase adopts the key schedule based on synchronization of spatiotemporal chaos in its authentication protocol, make the authentication both sides synchronously generate the identical key updating factor.
Aforesaid interim public private key pair generates through using the public private key pair and the key updating factor.
The validation both sides' of aforesaid certifying signature identity.
A kind of identity identifying method based on synchronization of spatiotemporal chaos of the present invention compared with prior art, has following remarkable advantages and beneficial effect:
This authentication method not only can correctly be accomplished authentication, and can resist various known attacks, also with less network overhead, under the situation that does not exchange any close secret information, accomplishes the signature and the verification process of agreement with the public and private key of dynamic change.Key dynamically update the fail safe that not only can improve authentication method, also prolonged the useful life of relevant USBKey simultaneously.
Description of drawings
Fig. 1 is the overall architecture sketch map of authentication method;
Fig. 2 is a protocol initializing process sketch map;
Fig. 3 lands and the verification process sketch map.
Embodiment
Below in conjunction with Figure of description, specific embodiment of the present invention is explained.
Authentication method is divided into server end based on C/S model, client and USBKey three parts structure as shown in Figure 1.The practical implementation step of method is following:
According to structure shown in Figure 1, affix one's name to corresponding assembly in server end, client and USBKey end respectively.Dispose corresponding safety database and authentication protocol program at server end; At client deployment Client Agent assembly; Affix one's name to corresponding firmware program in the USBKey end.
The registration of user profile and the initialization of USBKey.The user is delivered to server end with oneself user name and encrypted message through secured channels.Server deposits user profile in safety database and each parameter of generation system through initialization procedure, and the parameter information transmission is write USBKey, and with the USBKey interchange key, accomplish initialization procedure.USBKey is paid the user to be used.
The use of Client Agent assembly.Can be in the Flash memory of USBKey when the USBKey firmware is disposed with the Client Agent component stores.When USBKey was inserted client computer, client software is operation (client computer must allow automatic playing function) automatically.
The identification of user identity.When server need be discerned user identity, the user inserted client computer with USBKey, the operation automatically of client software this moment, and require the user to import encrypted message from USBKey input user with simple keyboard.After finishing, the information input confirms that USBKey can accomplish authentication by protocol procedures and server.
This authentication method separated into two parts is synchronisation key generating algorithm and authentication agreement two parts.The synchronisation key generating algorithm is described below at present.
The synchronisation key generating algorithm is divided into initial phase, synchronous phase and key and produces the stage.The synchronization of spatiotemporal chaos system that it adopted is suc as formula shown in (1) formula (2) and the formula (3).
Formula (1) is the drive system that algorithm adopted, and formula (2) and formula (3) are the responding system that communicating pair adopted.
z n + 1 ( i ) = ( 1 - ϵ ) f ( z n ( i ) ) + ϵf ( z n ( i - 1 ) ) z n ( i + L ) = z n ( i ) - - - ( 1 )
I=1 wherein, 2 ..., i is the space lattice coordinate, and L is a Cycle Length, and n is the time series that disperses, z n(i) be state variable.ε is the coupling constant.F (x) is a nonlinear function, and this paper is employed to be logistic mapping f (x)=ax (1-x).When a ∈ [3.5699456,4] was interval, f (x) will form a chaos state on [0,1] interval.For the OCRML system,, the outer ε of ε ∈ [0.16,0.19] can form a kind of chaos state except getting other value.
Can obtain unidirectional coupling map lattice point (OCOML) model of an open loop by formula (1), its expression formula is suc as formula shown in (2), wherein s nRepresent a status switch.
x n + 1 ( i ) = ( 1 - ϵ ) f ( x n ( i ) ) + ϵf ( x n ( i - 1 ) ) x n ( 1 ) = s n = z n ( i ) - - - ( 2 )
Cycle boundary is opened the replacement of stream condition by one in formula (2).So just can use sequence s nControl the OCOML system.z n(i) be drive sequences from drive system formula (1).Copy type (2) obtains the opposing party's responding system suc as formula shown in (3), with identical z n(i) come (3) two responding systems of drive-type (2) formula can reach synchronous.
y n + 1 ( i ) = ( 1 - ϵ ) f ( y n ( i ) ) + ϵf ( y n ( i - 1 ) ) y n ( 1 ) = s n = z n ( i ) - - - ( 3 )
Various symbols and the implication used in the verification process are as shown in table 1.
Consult the basic parameter of space-time chaos system the initial phase both sides.Produce the parameter group of the legal space-time chaos of safety system at random and pass to the recipient by the communication initiator through safe lane.Produce drive signal amount Drv the synchronous phase communication initiator, and send to the recipient.Produce the stage both sides at key and generate key according to Drv.Its step is following.
Used symbol and implication thereof in table 1 agreement
Figure BDA0000118082150000062
The state variable of getting the synchronization of spatiotemporal chaos system in the algorithm is a single precision floating datum, and generates 192 keys.
After system synchronization,
Both sides begin from the 3rd state of synchronization of spatiotemporal chaos system, get the odd states value.
Generate 192 keys and can get the 3rd, 5,7,9,11,13,15,17,19 states, 5-19 state got its low three byte LowByte3 [5,7,9,11,13,15,17,19] respectively,
Be filled into the 22nd to 15 of the 3rd state respectively on the 23rd of LowByte3 [5,7,9,11,13,15,17,19] again,
Thereby form a new key.So not only guaranteed the randomness of key but also avoided more shifting function, and kept the ergodic characteristics of chaos system that the repetition rate that makes algorithm generate key had dropped to minimum.
Authentication method is based on C/S model; Server end adopts safety database storage administration key; Customer end adopted Client Agent software is accomplished the media of communicating by letter and adopting USBKey to store, manage as key of USBKey and server, and accomplishes main protocol procedures.The overall architecture of authentication method is as shown in Figure 1.Authentication method is divided into four steps: initial phase, landing phase, synchronous phase, Qualify Phase.
The symbol of using in the agreement is as shown in table 1.
1. initial phase
User Ui passes to server with UIDi and password pwdi through safe lane.
Server S generate at random safety elliptic curve (q, FR, a, b, G, n h), writes USBKey with the elliptic curve parameter group, and generates the system parameters { ε of synchronization of spatiotemporal chaos system at random i, also write USBKey.Initial condition { the Statei} of server initialization OCRML system.
USBKey picked at random k1 ∈ [1, n] as user's root private key Uki, calculates user's root public key UPki=k1*G.Server end is chosen random number k 2 ∈ [1, n], as the root private key Ski of server end and telex network, calculates client server root public key SPki.USBkey and server exchange PKI.
Server is with (UIDi, { ε i, statei}, Ski, SPki, UPki, H (pwdi)) deposit safety database in.
USBKey appearance is with (UIDi, { ε i, Uki, UPki SPki) deposits the secure storage areas of USBkey in.
2. landing phase
The user inserts USBKey, and pwdi enters password.
USBkey calculates
Figure BDA0000118082150000071
USBKey produces random number r1, to server S send authentication application Req (UIDi, r1) → S.
3. system synchronization stage
Server S is received authentication application, checking UIDi legitimacy.If not method, then refusal.
Look into database according to UIDi, extract drive system initial condition { statei}, initialization OCRML drive system.And generation drive signal amount Drv.
Adopt drive signal amount Drv to drive the new synchronisation key Val1 of local OCOML system's generation, Val2
Use Val1, Val2 calculates
Staging server private key Ski '=Ski*Val1
Staging server PKI SPki '=Val1*SPki
Casual user's PKI UPki '=Val2*UPki
Calculate Q=Ski ' * UPki ', get the temporary key k=Q.x of the x coordinate of Q as symmetric encipherment algorithm.
Server produces random number r2.Send response message R=(Drv, r1, r2, SigSki ' (Drv, r1, r2)) → USBKey to USBKey.
SigSki ' (Drv, r1, r2): the signature that server generates message with new temporary private Ski '.
4. Qualify Phase
USBKey receives response message R, carries out following calculation procedure
Isolate r1, whether see to equate, if unequal then T resends authentication application after the time with the r1 that preserves.
Isolate Drv, drive USBKey end OCOML chaos system and produce new sequence keys Val 1, Val2 (synchronous) with server end.
Use Val1, Val2 calculates
Casual user's private key Uki '=Uki*Val2
Casual user's PKI UPki '=Val2*UPki
Staging server PKI SPki '=Val1*SPki
Calculate Q=Uk ' * SPki ', get the temporary key k=Q.x of the x coordinate of Q as symmetric encipherment algorithm.
With staging server public key verifications signature SigSki ' (Drv, r1, r2), authentication failed, then T resends the checking application after the time.
The employing symmetric encipherment algorithm calculates.
C1=Ek(Bi,SigUki’(Bi))。
SigUki ' is (i): USBKey sends (C1) → S with casual user's private key Uki ' to the signature
Figure BDA0000118082150000091
that Bi generates.
Server authentication
Server receives that C1 does following calculating
Deciphering C1: (Bi, SigUki ' are (Bi))=Dk (C1).
Obtain SigUki ' (Bi), with the interim public key verifications signature of user, checking is not landed through refusal.
Calculation
Figure BDA0000118082150000092
Check
Figure BDA0000118082150000093
equation is established.
Verify successfully authentication success.Send C2=Ek (ack, SigSki ' are (ack)) → USBKey.
USBKey receives C2
Decipher (ack, SigSki ' are (ack))=Dk (C2).
Certifying signature SigSki ' (ack) fails with the interim public key verifications of server, and waiting for server resends C2.
Verify successfully initiation session.
The detailed process of agreement as shown in Figures 2 and 3.

Claims (6)

1. the identity identifying method based on synchronization of spatiotemporal chaos is characterized in that, gets state from the status switch interval of space-time chaos system, as the master data that generates key; Get the low X position of space-time chaos system mode and put into one three byte arrays variable, and, form the part of final key with certain X+1 position of filling this three byte arrays variable in the low X position of another shape; May further comprise the steps:
1.1. accomplish the initialization of system parameters at initial phase server end and USBKey end, and accomplish the exchange of root key information;
1.2. landing phase, the file layout of USBKey conversion user password, and send authentication application to server;
1.3. synchronous phase generates the synchronizing signal amount by server, and generates new interim public private key pair and public words key according to this synchronizing signal amount, the synchronizing signal amount is signed message is beamed back USBKey;
1.4. authentication phase; USBKey is through the random number in the authentication response information; And extracting the new interim public private key pair of synchronizing signal amount generation, certifying signature is confirmed server identity; And beam back the information that comprises user password and signature and give server, server is confirmed user identity through certifying signature.
2. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, described X position is 23.
3. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, described X+1 position is 24.
4. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1; It is characterized in that; Described authentication phase adopts the key schedule based on synchronization of spatiotemporal chaos in its authentication protocol, make the authentication both sides synchronously generate the identical key updating factor.
5. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, described interim public private key pair generates through using the public private key pair and the key updating factor.
6. the identity identifying method based on synchronization of spatiotemporal chaos according to claim 1 is characterized in that, the validation both sides' of described certifying signature identity.
CN2011104094979A 2011-12-09 2011-12-09 Identity authentication method based on synchronization of spatiotemporal chaos Pending CN102594556A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104094979A CN102594556A (en) 2011-12-09 2011-12-09 Identity authentication method based on synchronization of spatiotemporal chaos

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104094979A CN102594556A (en) 2011-12-09 2011-12-09 Identity authentication method based on synchronization of spatiotemporal chaos

Publications (1)

Publication Number Publication Date
CN102594556A true CN102594556A (en) 2012-07-18

Family

ID=46482781

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104094979A Pending CN102594556A (en) 2011-12-09 2011-12-09 Identity authentication method based on synchronization of spatiotemporal chaos

Country Status (1)

Country Link
CN (1) CN102594556A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103199984A (en) * 2013-03-17 2013-07-10 王少夫 Coupled-map-lattice spatiotemporal chaos synchronization and cascading failure analysis method
CN104980410A (en) * 2014-04-14 2015-10-14 领步科技集团有限公司 Encryption method for remote upgrading of software of on-line power quality monitoring equipment
CN105846989A (en) * 2015-01-14 2016-08-10 深圳市伦琴科技有限公司 Firmware dynamic encryption and decryption method based on fragment chaotic iteration
CN112685336A (en) * 2021-01-12 2021-04-20 张立旭 Method and system for safely realizing quick addressing of data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994017478A1 (en) * 1993-01-19 1994-08-04 City Of Hope Method for control of chaotic systems
WO2006019822A2 (en) * 2004-07-14 2006-02-23 Arizona Technology Enterprises Pacemaker for treating physiological system dysfunction

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1994017478A1 (en) * 1993-01-19 1994-08-04 City Of Hope Method for control of chaotic systems
WO2006019822A2 (en) * 2004-07-14 2006-02-23 Arizona Technology Enterprises Pacemaker for treating physiological system dysfunction

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
匡锦瑜: "利用时空混沌同步进行数字加密通信", 《物理学报》, vol. 50, no. 10, 31 October 2001 (2001-10-31), pages 3 - 1 *
谢志强: "新型S/KEY认证方案的分析与设计", 《计算机工程》, vol. 35, no. 5, 31 March 2009 (2009-03-31), pages 4 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103199984A (en) * 2013-03-17 2013-07-10 王少夫 Coupled-map-lattice spatiotemporal chaos synchronization and cascading failure analysis method
CN104980410A (en) * 2014-04-14 2015-10-14 领步科技集团有限公司 Encryption method for remote upgrading of software of on-line power quality monitoring equipment
CN105846989A (en) * 2015-01-14 2016-08-10 深圳市伦琴科技有限公司 Firmware dynamic encryption and decryption method based on fragment chaotic iteration
CN112685336A (en) * 2021-01-12 2021-04-20 张立旭 Method and system for safely realizing quick addressing of data
CN112685336B (en) * 2021-01-12 2023-10-10 张立旭 Method and system for safely realizing quick addressing of data

Similar Documents

Publication Publication Date Title
CN103699851B (en) A kind of teledata integrity verification method of facing cloud storage
CN110740033B (en) Block chain multi-party data sharing method based on secret sharing technology
CN109672537B (en) Anti-quantum certificate acquisition system and method based on public key pool
CN112055025B (en) Privacy data protection method based on block chain
CN108551392B (en) Blind signature generation method and system based on SM9 digital signature
CN106603246B (en) A kind of SM2 digital signature segmentation generation method and system
CN1922816B (en) One way authentication
CN106850198B (en) SM2 digital signature generation method and system based on the collaboration of more devices
CN111211910B (en) Anti-quantum computation CA (certificate Authority) and certificate issuing system based on secret shared public key pool and issuing and verifying method thereof
CN109583893B (en) Traceable block chain-based digital currency transaction system
EP2302834A2 (en) System and method for providing credentials
CN110959163A (en) Computer-implemented system and method for enabling secure storage of large blockchains on multiple storage nodes
CN106850229B (en) SM2 digital signature generation method and system based on product secret division
CN106936566A (en) It is a kind of based on block chain technology can outsourcing document signature method
CN100542091C (en) A kind of key generation method and system based on identity
CN101873307A (en) Digital signature method, device and system based on identity forward secrecy
CN109861829B (en) Cloud data justice auditing system supporting dynamic updating and auditing method thereof
CN101626364A (en) Method for authentication for resisting secrete data disclosure and key exchange based on passwords
CN107104793B (en) A kind of digital signature generation method and system
CN103634788A (en) Certificateless multi-proxy signcryption method with forward secrecy
CN109981565A (en) Block platform chain and implementation method based on Meta-BFT common recognition mechanism
CN106254372A (en) A kind of Multi Digital Signature method of ID-based cryptosystem mechanism
CN102594556A (en) Identity authentication method based on synchronization of spatiotemporal chaos
CN111211905A (en) Identity management method for Fabric alliance chain members based on certificate-free authentication
CN106936584A (en) A kind of building method without CertPubKey cryptographic system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120718