CN112822018B - Mobile equipment security authentication method and system based on bilinear pairings - Google Patents

Mobile equipment security authentication method and system based on bilinear pairings Download PDF

Info

Publication number
CN112822018B
CN112822018B CN202110427217.0A CN202110427217A CN112822018B CN 112822018 B CN112822018 B CN 112822018B CN 202110427217 A CN202110427217 A CN 202110427217A CN 112822018 B CN112822018 B CN 112822018B
Authority
CN
China
Prior art keywords
user equipment
message
signature
timestamp
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110427217.0A
Other languages
Chinese (zh)
Other versions
CN112822018A (en
Inventor
沈玉勤
杨涛
周鹏兵
王帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Telecom Easiness Information Technology Co Ltd
Original Assignee
Beijing Telecom Easiness Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Telecom Easiness Information Technology Co Ltd filed Critical Beijing Telecom Easiness Information Technology Co Ltd
Priority to CN202110427217.0A priority Critical patent/CN112822018B/en
Publication of CN112822018A publication Critical patent/CN112822018A/en
Application granted granted Critical
Publication of CN112822018B publication Critical patent/CN112822018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/40Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a mobile equipment safety certification method and a system based on bilinear pairings, aiming at one-to-one mobile equipment communication, user equipment carries out user identity certification through 5G certification and a key agreement protocol in a 5G network, a safety channel is established between the user equipment and the 5G network through certification, and the user equipment is initialized through the safety channel. When the user equipment prepares for communication, the user equipment verifies the identity between the equipment through a signature, and performs key negotiation by using a bilinear pairing algorithm, so that the equipment can establish connection and perform communication through the negotiated key. The method effectively resists common attacks such as eavesdropping, counterfeiting and the like, and improves the forward and backward security of the secret key. By using the invention, the mobile devices can communicate with each other safely and efficiently.

Description

Mobile equipment security authentication method and system based on bilinear pairings
Technical Field
The invention relates to the technical field of information security, in particular to a mobile equipment security authentication method and system based on bilinear pairings.
Background
The next generation mobile communication, i.e. the 5G wireless mobile network, not only brings a solution to the ever-increasing large-scale connection devices such as the large data traffic demand and the internet of things, but also brings new services. One of the very promising solutions is that Device-to-Device (D2D) communication, i.e. communication between mobile devices, is expected to play a key role with the advantages of increased efficiency and low latency. Communication between mobile devices is a point-to-point communication mechanism between devices without intermediate nodes. Communication between mobile devices has many advantages in mobile networks. First, it can extend the coverage area of each cell in a cellular network, acting as a communication bridge to transmit data to nodes outside the coverage area. Second, communication between mobile devices helps to reduce power consumption of the base station by transferring data directly between the devices. Finally, the recycling efficiency of the same radio frequency is improved. In communication between mobile devices, the distance between the devices is much shorter than the distance between the devices and the base station. This means that radio frequency interference is reduced in the communication scenario between mobile devices, facilitating the transmission of multiple data using the same radio frequency. In addition, the communication between the mobile devices is a core technology of 5G vehicle network communication, and is a key technology of automatic driving. Therefore, it is of great significance to study the communication between mobile devices in the 5G network. However, in the prior art, the communication of the D2D is easy to attack, and the security performance is not high.
Disclosure of Invention
The invention aims to provide a mobile equipment security authentication method and system based on bilinear pairings so as to improve the security performance of communication between mobile equipment.
In order to achieve the purpose, the invention provides the following scheme:
a mobile device security authentication method based on bilinear pairings comprises the following steps:
the access and mobile management function module of the 5G network generates a temporary identity ID for the user equipment after successful authentication and sends the temporary identity ID to the corresponding user equipment through a secure channel;
the first user equipment generates a first public key of the first user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the first user equipment according to the temporary identity ID of the first user equipment, and sends a first message
Figure 100002_DEST_PATH_IMAGE001
Broadcasting; wherein the content of the first and second substances,
Figure 222640DEST_PATH_IMAGE002
is the temporary identity ID of the first user equipment,
Figure 100002_DEST_PATH_IMAGE003
is a first signature of the first user equipment,
Figure 94650DEST_PATH_IMAGE004
is the first public key of the first user equipment,
Figure 100002_DEST_PATH_IMAGE005
a timestamp for the first message;
the second user equipment verifies the first user equipment through the timestamp of the first message and the first signature of the first user equipment; after the verification is passed, the second user equipment generates a first public key of the second user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the second user equipment according to the temporary identity ID of the second user equipment, and sends a second message
Figure 773893DEST_PATH_IMAGE006
Sending the information to the access and mobile management function module; wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE007
is the temporary identity ID of the second user equipment,
Figure 923114DEST_PATH_IMAGE008
is the first signature of the second user equipment,
Figure 100002_DEST_PATH_IMAGE009
is the first public key of the second user equipment,
Figure 396821DEST_PATH_IMAGE010
a timestamp for the second message;
the access and mobile management function module verifies the first user equipment and the second user equipment through the timestamp of the second message, the first signature of the first user equipment and the first signature of the second user equipment; after the verification is passed, the access and mobile management functional module generates a first public key of the AMF and a first signature of the AMF, and sends a third message
Figure 100002_DEST_PATH_IMAGE011
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure 759057DEST_PATH_IMAGE012
is the first public key of the AMF,
Figure 100002_DEST_PATH_IMAGE013
is the first signature of the AMF,
Figure 241991DEST_PATH_IMAGE014
a timestamp for the third message;
the first user equipment verifies the access and mobile management function module through the timestamp of the third message and the first signature of the AMF; after the verification is passed, the first user equipment generates a hash value of the first user equipment, a second public key of the first user equipment and a second signature of the first user equipment, and sends a fourth message
Figure 100002_DEST_PATH_IMAGE015
Sending the information to the second user equipment; wherein the content of the first and second substances,
Figure 245719DEST_PATH_IMAGE016
is the hash value of the first user equipment,
Figure 100002_DEST_PATH_IMAGE017
is the second public key of the first user equipment,
Figure 14961DEST_PATH_IMAGE018
is the second signature of the first user equipment,
Figure 100002_DEST_PATH_IMAGE019
a timestamp for the fourth message;
the second user equipment verifies the first user equipment through the timestamp of the fourth message and the second signature of the first user equipment; after the verification is passed, the second user equipment generates a hash value of the second user equipment and a second public key of the second user equipmentAnd a second signature of the second user equipment, generating a first shared key by adopting a bilinear mapping algorithm, and generating a fifth message
Figure 736929DEST_PATH_IMAGE020
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE021
is the hash value of the second user equipment,
Figure 757975DEST_PATH_IMAGE022
is the second public key of the second user equipment,
Figure 100002_DEST_PATH_IMAGE023
is a second signature of the second user equipment,
Figure 732054DEST_PATH_IMAGE024
a timestamp of the fifth message;
the first user equipment verifies the second user equipment through the timestamp of the fifth message and a second signature of the second user equipment; after the verification is passed, generating a second shared secret key through a bilinear mapping algorithm; encrypting the session message by using the second shared key to generate a sixth message, and sending the sixth message to the second user equipment; the conversation message is
Figure 100002_DEST_PATH_IMAGE025
The sixth message is
Figure 813142DEST_PATH_IMAGE026
Figure 100002_DEST_PATH_IMAGE027
The message is the message obtained by encrypting the session message by adopting the second shared secret key;
the second user equipment decrypts the sixth message through the first shared key and verifies the decrypted message and the first shared key
Figure 756828DEST_PATH_IMAGE025
Whether they are equal; if the first user equipment and the second user equipment are equal, the second user generates a message which is successfully encrypted, encrypts the message which is successfully encrypted by adopting a second shared secret key, generates a seventh message and sends the seventh message to the first user equipment, and the authentication of the first user equipment and the second user equipment is completed; after the first user equipment and the second user equipment are authenticated, the message sent to the second user equipment by the first user equipment is encrypted by the first shared secret key, and the message sent to the first user equipment by the second user equipment is encrypted by the second shared secret key.
Optionally, the access and mobility management function module of the 5G network generates a temporary identity ID for the user equipment after the authentication is successful, and before that, the method further includes:
the user equipment is authenticated through a 5G-AKA protocol of the 5G network, and the 5G network establishes a security channel after the authentication is successful.
Optionally, the verifying, by the second user equipment, the first user equipment through the timestamp of the first message and the first signature of the first user equipment specifically includes:
the second user equipment verifies the timestamp of the first message; after the verification is passed, the judgment is passed
Figure 112723DEST_PATH_IMAGE028
Whether a first signature of first user equipment is verified or not is established, and if yes, the first user equipment is verified to pass; wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE029
to represent
Figure 91043DEST_PATH_IMAGE030
And
Figure 100002_DEST_PATH_IMAGE031
the bilinear mapping values of (a) the image,
Figure 202087DEST_PATH_IMAGE032
to represent
Figure 570752DEST_PATH_IMAGE004
And
Figure 100002_DEST_PATH_IMAGE033
the bilinear mapping values of (a) the image,
Figure 936530DEST_PATH_IMAGE030
is a base point in the elliptic curve cryptography algorithm,
Figure 300515DEST_PATH_IMAGE034
to generate a private key corresponding to the first public key of the first user device,
Figure 520144DEST_PATH_IMAGE033
a hash value of the first user equipment temporary identity ID.
Optionally, the verifying, by the access and mobility management functional module, the first user equipment and the second user equipment according to the timestamp of the second message, the first signature of the first user equipment, and the first signature of the second user equipment specifically includes:
the access and mobile management function module verifies the timestamp of the second message; after the verification is passed, the judgment is passed
Figure 100002_DEST_PATH_IMAGE035
And
Figure 172842DEST_PATH_IMAGE036
whether the first signature of the first user equipment and the first signature of the second user equipment are verified or not is established; if it is
Figure 136119DEST_PATH_IMAGE035
If yes, the first user equipment is verified to be passed; if it is
Figure 100002_DEST_PATH_IMAGE037
If it is true, then it is right forThe user equipment passes the verification; wherein the content of the first and second substances,
Figure 823452DEST_PATH_IMAGE038
to represent
Figure 213982DEST_PATH_IMAGE030
And
Figure 100002_DEST_PATH_IMAGE039
the bilinear mapping values of (a) the image,
Figure 619556DEST_PATH_IMAGE040
to represent
Figure 858294DEST_PATH_IMAGE004
And
Figure 100002_DEST_PATH_IMAGE041
the bilinear mapping values of (a) the image,
Figure 665713DEST_PATH_IMAGE030
is a base point in the elliptic curve cryptography algorithm,
Figure 102511DEST_PATH_IMAGE034
to generate a private key corresponding to the first public key of the first user device,
Figure 526539DEST_PATH_IMAGE041
a hash value of the first user equipment temporary identity ID;
Figure 566039DEST_PATH_IMAGE042
to represent
Figure 165648DEST_PATH_IMAGE030
And
Figure 100002_DEST_PATH_IMAGE043
the bilinear mapping values of (a) the image,
Figure 225877DEST_PATH_IMAGE044
to represent
Figure 746988DEST_PATH_IMAGE009
And
Figure 100002_DEST_PATH_IMAGE045
the bilinear mapping values of (a) the image,
Figure 183654DEST_PATH_IMAGE046
to generate a private key corresponding to the first public key of the second user device,
Figure 637769DEST_PATH_IMAGE045
a hash value of the second user equipment temporary identity ID.
Optionally, the verifying, by the first user equipment, the access and mobility management function module by using the timestamp of the third message and the first signature of the AMF specifically includes:
the first user equipment verifies the timestamp of the third message; after the verification is passed, the judgment is passed
Figure 100002_DEST_PATH_IMAGE047
Whether the first signature of the AMF is verified or not is established, if so, the access and mobile management function module is verified to be passed; wherein the content of the first and second substances,
Figure 606250DEST_PATH_IMAGE048
to represent
Figure 880236DEST_PATH_IMAGE030
And
Figure 100002_DEST_PATH_IMAGE049
the bilinear mapping values of (a) the image,
Figure 730381DEST_PATH_IMAGE050
to represent
Figure 898057DEST_PATH_IMAGE012
And
Figure 100002_DEST_PATH_IMAGE051
the bilinear mapping values of (a) the image,
Figure 175454DEST_PATH_IMAGE030
is a base point in the elliptic curve cryptography algorithm,
Figure 61371DEST_PATH_IMAGE052
to generate the private key corresponding to the first public key of the AMF,
Figure 100002_DEST_PATH_IMAGE053
a connection symbol is represented and,
Figure 449627DEST_PATH_IMAGE051
is composed of
Figure 737389DEST_PATH_IMAGE002
And
Figure 997074DEST_PATH_IMAGE007
the hash value after the concatenation of the hash values,
Figure 980073DEST_PATH_IMAGE012
is the first public key of the AMF.
Optionally, the verifying, by the second user equipment, the first user equipment through the timestamp of the fourth message and the second signature of the first user equipment specifically includes:
the second user equipment verifies the timestamp of the fourth message; after the verification is passed, the judgment is passed
Figure 968758DEST_PATH_IMAGE054
Whether the first user equipment is verified or not is established, and if the first user equipment is verified, the first user equipment is verified to pass; wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE055
to represent
Figure 579868DEST_PATH_IMAGE056
And
Figure 100002_DEST_PATH_IMAGE057
the bilinear mapping values of (a) the image,
Figure 58123DEST_PATH_IMAGE058
to represent
Figure 793997DEST_PATH_IMAGE056
And
Figure 100002_DEST_PATH_IMAGE059
the bilinear mapping values of (a) the image,
Figure 648690DEST_PATH_IMAGE060
to represent
Figure 100002_DEST_PATH_IMAGE061
And
Figure 114306DEST_PATH_IMAGE062
the bilinear mapping values of (a) the image,
Figure 576512DEST_PATH_IMAGE056
is a hash value of the first user equipment temporary identity ID,
Figure 100002_DEST_PATH_IMAGE063
to generate the private value of the second signature of the first user device,
Figure 255142DEST_PATH_IMAGE064
a connection symbol is represented and,
Figure 726575DEST_PATH_IMAGE062
is composed of
Figure 100002_DEST_PATH_IMAGE065
And
Figure 46698DEST_PATH_IMAGE066
the hash value after the concatenation of the hash values,
Figure 538859DEST_PATH_IMAGE065
=
Figure 100002_DEST_PATH_IMAGE067
optionally, after the verification is passed, the second user equipment generates the first shared key by using a bilinear mapping algorithm, which specifically includes:
using formulas
Figure 842801DEST_PATH_IMAGE068
Generating a first shared key; wherein the content of the first and second substances,
Figure 711400DEST_PATH_IMAGE069
in order to be the first shared secret key,
Figure 100002_DEST_PATH_IMAGE070
to represent
Figure 620450DEST_PATH_IMAGE071
And
Figure 549092DEST_PATH_IMAGE072
the bilinear mapping values of (a) the image,
Figure 343260DEST_PATH_IMAGE056
is a hash value of the first user equipment temporary identity ID,
Figure 156495DEST_PATH_IMAGE073
a hash value of the second user equipment temporary identity ID,
Figure 716790DEST_PATH_IMAGE063
to generate the private value of the second signature of the first user device,
Figure 81912DEST_PATH_IMAGE074
to generate a secret value of the second signature of the second user device,
Figure 235813DEST_PATH_IMAGE075
is the master key of the system.
Optionally, the verifying, by the first user equipment, the second user equipment through the timestamp of the fifth message and a second signature of the second user equipment specifically includes:
the first user equipment verifies the timestamp of the fifth message; after the verification is passed, the judgment is passed
Figure 446214DEST_PATH_IMAGE076
Whether the signature of the second user equipment is verified or not is established, and if the signature of the second user equipment is established, the second user equipment is verified to pass; wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE077
to represent
Figure 595436DEST_PATH_IMAGE045
And
Figure 865880DEST_PATH_IMAGE023
the bilinear mapping values of (a) the image,
Figure 897290DEST_PATH_IMAGE078
a bilinear map value of the and is represented,
Figure 100002_DEST_PATH_IMAGE079
a bilinear map value of the and is represented,
Figure 380224DEST_PATH_IMAGE045
a hash value of the second user equipment temporary identity ID,
Figure 918040DEST_PATH_IMAGE080
to generate a secret value of the second signature of the second user device,
Figure 234752DEST_PATH_IMAGE053
a connection symbol is represented and,
Figure 100002_DEST_PATH_IMAGE081
is composed of
Figure 81354DEST_PATH_IMAGE022
And
Figure 774504DEST_PATH_IMAGE021
the hash value after the concatenation of the hash values,
Figure 695055DEST_PATH_IMAGE021
=
Figure 917089DEST_PATH_IMAGE045
optionally, after the verification passes, generating a second shared key through a bilinear mapping algorithm includes:
using formulas
Figure 923091DEST_PATH_IMAGE082
Generating a second shared key;
Figure 100002_DEST_PATH_IMAGE083
is the second shared key.
The invention also provides a mobile equipment safety authentication system based on bilinear pairing, which comprises:
the temporary identity ID generation module is used for generating a temporary identity ID for the user equipment after the authentication is successful by adopting an access and mobile management function module of the 5G network and sending the temporary identity ID to the corresponding user equipment through a secure channel;
a first user equipment broadcasting module, configured to generate, by the first user equipment, a first public key of the first user equipment by using an elliptic curve cryptography algorithm, generate a first signature of the first user equipment according to the temporary identity ID of the first user equipment, and send a first message to the first user equipment
Figure 747828DEST_PATH_IMAGE084
Broadcasting; wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE085
being a temporary identity of the first user equipmentID,
Figure 726148DEST_PATH_IMAGE003
Is a first signature of the first user equipment,
Figure 774876DEST_PATH_IMAGE004
is the first public key of the first user equipment,
Figure 877961DEST_PATH_IMAGE005
a timestamp for the first message;
the second user equipment request communication module is used for verifying the first user equipment by the second user equipment through the timestamp of the first message and the first signature of the first user equipment; after the verification is passed, the second user equipment generates a first public key of the second user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the second user equipment according to the temporary identity ID of the second user equipment, and sends a second message
Figure 763178DEST_PATH_IMAGE006
Sending the information to the access and mobile management function module; wherein the content of the first and second substances,
Figure 658322DEST_PATH_IMAGE007
is the temporary identity ID of the second user equipment,
Figure 487738DEST_PATH_IMAGE008
is the first signature of the second user equipment,
Figure 202753DEST_PATH_IMAGE009
is the first public key of the second user equipment,
Figure 900450DEST_PATH_IMAGE010
a timestamp for the second message;
the access and mobile management function module verification module is used for passing the time stamp of the second message, the first signature of the first user equipment and the second user equipment through the access and mobile management function moduleThe first signature of (a) verifies the first user equipment and the second user equipment; after the verification is passed, the access and mobile management functional module generates a first public key of the AMF and a first signature of the AMF, and sends a third message
Figure 525467DEST_PATH_IMAGE086
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure 915997DEST_PATH_IMAGE012
is the first public key of the AMF,
Figure 993674DEST_PATH_IMAGE013
is the first signature of the AMF,
Figure 229484DEST_PATH_IMAGE014
a timestamp for the third message;
the AMF verification module is used for verifying the access and mobile management function module by the first user equipment through the timestamp of the third message and the first signature of the AMF; after the verification is passed, the first user equipment generates a hash value of the first user equipment, a second public key of the first user equipment and a second signature of the first user equipment, and sends a fourth message
Figure 568061DEST_PATH_IMAGE015
Sending the information to the second user equipment; wherein the content of the first and second substances,
Figure 100002_DEST_PATH_IMAGE087
is the hash value of the first user equipment,
Figure 598334DEST_PATH_IMAGE017
is the second public key of the first user equipment,
Figure 897728DEST_PATH_IMAGE018
is the second signature of the first user equipment,
Figure 205737DEST_PATH_IMAGE019
a timestamp for the fourth message;
the first shared key generation module is used for the second user equipment to verify the first user equipment through the timestamp of the fourth message and the second signature of the first user equipment; after the verification is passed, the second user equipment generates a hash value of the second user equipment, a second public key of the second user equipment and a second signature of the second user equipment, a first shared key is generated by adopting a bilinear mapping algorithm, and a fifth message is sent
Figure 398821DEST_PATH_IMAGE020
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure 740941DEST_PATH_IMAGE088
is the hash value of the second user equipment,
Figure 917844DEST_PATH_IMAGE022
is the second public key of the second user equipment,
Figure 761035DEST_PATH_IMAGE023
is a second signature of the second user equipment,
Figure 683992DEST_PATH_IMAGE024
a timestamp of the fifth message;
a second shared key generation module, configured to verify, by the first user equipment, the second user equipment through a timestamp of the fifth message and a second signature of the second user equipment; after the verification is passed, generating a second shared secret key through a bilinear mapping algorithm; encrypting the session message by using the second shared key to generate a sixth message, and sending the sixth message to the second user equipment; the conversation message is
Figure 100002_DEST_PATH_IMAGE089
The sixth message is
Figure 383964DEST_PATH_IMAGE090
Figure 48163DEST_PATH_IMAGE027
The message is the message obtained by encrypting the session message by adopting the second shared secret key;
a shared key verification module, configured to decrypt the sixth message with the first shared key by the second user equipment, and verify the decrypted message with
Figure 304832DEST_PATH_IMAGE051
Whether they are equal; if the first user equipment and the second user equipment are equal, the second user generates a message which is successfully encrypted, encrypts the message which is successfully encrypted by adopting a second shared secret key, generates a seventh message and sends the seventh message to the first user equipment, and the authentication of the first user equipment and the second user equipment is completed; after the first user equipment and the second user equipment are authenticated, the message sent to the second user equipment by the first user equipment is encrypted by the first shared secret key, and the message sent to the first user equipment by the second user equipment is encrypted by the second shared secret key.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects:
the communication entities in the method provided by the invention carry out mutual authentication, thereby avoiding impersonation attack and ensuring the safety of communication; the user equipment guarantees the freshness of the message through the timestamp, so that replay attack is avoided; the private key value of the user equipment is randomly generated every session in the authentication process. Therefore, the backward security of the key is ensured; the session key is generated by a bilinear pairwise algorithm, so that the actual session key can never be transmitted through an insecure free channel, and the security of the key is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a schematic authentication diagram of a security authentication method for a mobile device based on bilinear pairing according to the present invention;
fig. 2 is a schematic diagram of an authentication process according to embodiment 1 of the present invention;
FIG. 3 is a schematic diagram of an authentication process in embodiment 2 of the present invention;
fig. 4 is a schematic structural diagram of a mobile device security authentication system based on bilinear pairing according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
FIG. 1 is a schematic diagram illustrating a security authentication method for a mobile device based on bilinear pairing according to the present invention, as shown in FIG. 1, according to the present invention, an Access and Mobility Function (AMF) module generates a common system parameter(s) ((AMF))
Figure 100002_DEST_PATH_IMAGE091
). Wherein
Figure 206929DEST_PATH_IMAGE092
Are two groups of order q; h is a one-way hash function; f is a function map; randomly selecting s as the master key of the system, and calculating
Figure 100002_DEST_PATH_IMAGE093
User Equipment (UE) is initialized, then the UE is authenticated with a 5G network through a Key Agreement protocol (5G-Authentication and Key Agreement, 5G-AKA), and a security channel is established after the Authentication is successful. At this time, the AMF generates a temporary identity ID of the user equipment UE, calculates S = h (ID), and M = sS, and then sends M, ID to the user equipment UE through the secure channel.
Then, a communication connection between the two user equipments is established, and the process is as follows:
(1) user equipment
Figure 611890DEST_PATH_IMAGE094
Firstly, a random number a is selected and calculated
Figure 638752DEST_PATH_IMAGE095
= aP, for user equipment
Figure 823746DEST_PATH_IMAGE094
Temporary identity of
Figure 100002_DEST_PATH_IMAGE096
Calculating the signature to obtain
Figure 314770DEST_PATH_IMAGE097
Then the user equipment
Figure 559806DEST_PATH_IMAGE094
Message sending
Figure 100002_DEST_PATH_IMAGE098
Is broadcast out, wherein
Figure 401861DEST_PATH_IMAGE099
Representing user equipment
Figure 265911DEST_PATH_IMAGE094
The current timestamp of.
(2) When the user equipment
Figure 877021DEST_PATH_IMAGE101
Want to with user equipment
Figure 27380DEST_PATH_IMAGE094
When establishing communication, the user equipment
Figure 625239DEST_PATH_IMAGE101
Receive to
Figure 292981DEST_PATH_IMAGE094
After broadcasting the information, the user equipment
Figure 289756DEST_PATH_IMAGE101
First checking the timestamp
Figure 876595DEST_PATH_IMAGE099
Whether or not, if so, the user equipment
Figure 834186DEST_PATH_IMAGE101
Firstly, for user equipment
Figure 899094DEST_PATH_IMAGE094
Is signed
Figure DEST_PATH_IMAGE102
Performing verification by calculating
Figure 484796DEST_PATH_IMAGE103
Whether or not equal, and if equal, the user equipment is verified
Figure 508116DEST_PATH_IMAGE094
Then the user equipment
Figure 953004DEST_PATH_IMAGE101
Selecting a random number b, calculating
Figure DEST_PATH_IMAGE104
= bP, for user equipment
Figure 149499DEST_PATH_IMAGE101
Temporary identity of
Figure 261811DEST_PATH_IMAGE105
Calculating the signature to obtain
Figure DEST_PATH_IMAGE106
Then the user equipment
Figure 408364DEST_PATH_IMAGE101
Message sending
Figure 730761DEST_PATH_IMAGE107
Is sent to AMF, wherein
Figure DEST_PATH_IMAGE108
Representing user equipment
Figure 606313DEST_PATH_IMAGE109
The current timestamp of.
(3) When AMF receives user equipment
Figure 432187DEST_PATH_IMAGE101
After the message is sent, the time stamp of the message is firstly verified
Figure DEST_PATH_IMAGE110
If the requirements are met, and if so, the AMF verifies the signature
Figure 571DEST_PATH_IMAGE111
First, based on the temporary identity information
Figure DEST_PATH_IMAGE112
Computing
Figure 13526DEST_PATH_IMAGE113
Calculating
Figure 223928DEST_PATH_IMAGE103
Figure DEST_PATH_IMAGE114
Whether they are equal, if so, the user is authenticatedDevice
Figure 638729DEST_PATH_IMAGE094
Figure 912103DEST_PATH_IMAGE101
Then AMF selects random number c and calculates
Figure 818879DEST_PATH_IMAGE115
= cP, for AMF
Figure 567392DEST_PATH_IMAGE115
Calculating the signature to obtain
Figure DEST_PATH_IMAGE116
Then AMF sends the message
Figure 102279DEST_PATH_IMAGE117
Is sent to
Figure 543624DEST_PATH_IMAGE094
Wherein
Figure DEST_PATH_IMAGE118
Representing the current timestamp of the AMF.
(4) When the user equipment
Figure 531172DEST_PATH_IMAGE094
After receiving the message sent by the AMF,
Figure 958742DEST_PATH_IMAGE094
first verifying the timestamp of the message
Figure 613714DEST_PATH_IMAGE118
Whether the requirements are met, and if so, the user equipment
Figure 366907DEST_PATH_IMAGE094
Verifying signatures
Figure 107330DEST_PATH_IMAGE119
First, based on the temporary identity information
Figure 728804DEST_PATH_IMAGE112
Computing
Figure DEST_PATH_IMAGE120
Calculating
Figure 710054DEST_PATH_IMAGE121
Is equal, if equal, the AMF is verified, at which time the AMF notifies
Figure 368568DEST_PATH_IMAGE094
Discover devices
Figure 861867DEST_PATH_IMAGE109
Figure 755873DEST_PATH_IMAGE101
Thinking and equipment
Figure 526383DEST_PATH_IMAGE094
Establishing a connection for communication, at which time the user equipment
Figure 480433DEST_PATH_IMAGE094
Randomly selecting a secret value
Figure DEST_PATH_IMAGE122
Calculating
Figure 664289DEST_PATH_IMAGE123
Calculating a signature value
Figure DEST_PATH_IMAGE124
Then the message is sent
Figure 830828DEST_PATH_IMAGE125
Is sent to
Figure 314899DEST_PATH_IMAGE109
Wherein
Figure 580796DEST_PATH_IMAGE099
Represents
Figure 783107DEST_PATH_IMAGE094
The current timestamp of.
(5) When the user equipment
Figure 159862DEST_PATH_IMAGE101
Receive from
Figure 766948DEST_PATH_IMAGE094
After the message has been sent, the user may,
Figure 203745DEST_PATH_IMAGE101
first verifying the timestamp of the message
Figure 893353DEST_PATH_IMAGE099
Whether the requirements are met, and if so, the user equipment
Figure 932853DEST_PATH_IMAGE101
Verifying signatures
Figure 266882DEST_PATH_IMAGE126
Calculating
Figure DEST_PATH_IMAGE127
Whether or not equal, and if equal, the user equipment is verified
Figure 202477DEST_PATH_IMAGE094
. At this time, the user equipment
Figure 379381DEST_PATH_IMAGE101
Randomly selecting a secret value
Figure 956993DEST_PATH_IMAGE128
Calculating
Figure DEST_PATH_IMAGE129
User equipment
Figure 4583DEST_PATH_IMAGE101
Computing and user equipment
Figure 517604DEST_PATH_IMAGE094
Is shared with the key
Figure 181804DEST_PATH_IMAGE130
Calculating a signature value
Figure DEST_PATH_IMAGE131
Then the message is sent
Figure 23159DEST_PATH_IMAGE132
Is sent to
Figure 456414DEST_PATH_IMAGE094
Wherein
Figure 140336DEST_PATH_IMAGE110
Represents
Figure 26253DEST_PATH_IMAGE101
The current timestamp of.
(6) When the user equipment
Figure 211246DEST_PATH_IMAGE094
Receive from
Figure 374375DEST_PATH_IMAGE101
After the message has been sent, the user may,
Figure 619411DEST_PATH_IMAGE094
first verifying the timestamp of the message
Figure 133569DEST_PATH_IMAGE108
Whether the requirements are met, and if so, the user equipment
Figure 856674DEST_PATH_IMAGE094
Verifying signatures
Figure DEST_PATH_IMAGE133
Calculating
Figure 202205DEST_PATH_IMAGE134
Whether or not equal, and if equal, the user equipment is verified
Figure 883722DEST_PATH_IMAGE101
. At this time, the user equipment
Figure 354018DEST_PATH_IMAGE094
Computing and user equipment
Figure 149323DEST_PATH_IMAGE101
Is shared with the key
Figure DEST_PATH_IMAGE135
User equipment
Figure 349360DEST_PATH_IMAGE094
Encrypted using shared key MK
Figure 201779DEST_PATH_IMAGE136
And to the user equipment
Figure 159370DEST_PATH_IMAGE101
Sending
Figure DEST_PATH_IMAGE137
A message.
(7) When the user equipment
Figure 958699DEST_PATH_IMAGE101
Receive from
Figure 75560DEST_PATH_IMAGE094
After the message is sent, first calculate U =
Figure 974245DEST_PATH_IMAGE138
Then decrypted using the session key MK
Figure DEST_PATH_IMAGE139
To obtain
Figure 12609DEST_PATH_IMAGE140
And verifies whether U is equal, if so, verifies
Figure DEST_PATH_IMAGE141
Equal session keys are generated, and finally
Figure 615628DEST_PATH_IMAGE101
Sending an encrypted success message to
Figure 852575DEST_PATH_IMAGE094
And finally the user equipment
Figure 656582DEST_PATH_IMAGE094
And user equipment
Figure 981909DEST_PATH_IMAGE101
By session key
Figure 529565DEST_PATH_IMAGE142
Communication is performed.
Two specific embodiments are provided below to further illustrate the security authentication process between mobile devices of the present invention.
Example 1
Fig. 2 is a schematic diagram of an authentication flow in embodiment 1 of the present invention, and as shown in fig. 2, a security authentication process between mobile devices disclosed in this embodiment is as follows:
step 100: and the access and mobile management function module of the 5G network generates a temporary Identity (ID) for the user equipment after the successful authentication and sends the ID to the corresponding user equipment through a secure channel.
Step 200: the first user equipment generates a first public key of the first user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the first user equipment according to the temporary identity ID of the first user equipment, and sends a first message
Figure DEST_PATH_IMAGE143
And broadcasting. Wherein the content of the first and second substances,
Figure 89859DEST_PATH_IMAGE002
is the temporary identity ID of the first user equipment,
Figure 189402DEST_PATH_IMAGE003
is a first signature of the first user equipment,
Figure 874462DEST_PATH_IMAGE004
is the first public key of the first user equipment,
Figure 350442DEST_PATH_IMAGE005
is the timestamp of the first message. In this step, different methods may be used to generate the first public key of the first user equipment and the first signature of the first user equipment according to actual requirements.
Step 300: the second user equipment verifies the first user equipment through the timestamp of the first message and the first signature of the first user equipment; after the verification is passed, the second user equipment generates a first public key of the second user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the second user equipment according to the temporary identity ID of the second user equipment, and sends a second message
Figure 171768DEST_PATH_IMAGE144
And sending the information to an access and mobile management function module. Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE145
is the temporary identity ID of the second user equipment,
Figure 176633DEST_PATH_IMAGE008
is the first signature of the second user equipment,
Figure 208043DEST_PATH_IMAGE009
is the first public key of the second user equipment,
Figure 97502DEST_PATH_IMAGE010
is the timestamp of the second message. In this step, different methods may be used to verify the first user equipment according to actual requirements, and a first public key of the second user equipment and a first signature of the second user equipment are generated.
Step 400: the access and mobile management function module verifies the first user equipment and the second user equipment through the timestamp of the second message, the first signature of the first user equipment and the first signature of the second user equipment; after the verification is passed, the access and mobile management functional module generates a first public key of the AMF and a first signature of the AMF, and sends a third message
Figure 163547DEST_PATH_IMAGE011
And sending the data to the first user equipment. Wherein the content of the first and second substances,
Figure 480258DEST_PATH_IMAGE012
is the first public key of the AMF,
Figure 998964DEST_PATH_IMAGE013
is the first signature of the AMF,
Figure 692114DEST_PATH_IMAGE014
is the timestamp of the third message. In this step, different methods may be adopted to verify the first user equipment and the second user equipment according to actual requirements, and generate the first public key of the AMF and the first signature of the AMF.
Step 500: the first user equipment verifies the access and mobile management function module through the timestamp of the third message and the first signature of the AMF; after the verification is passed, the first user equipment generates a hash value of the first user equipment, a second public key of the first user equipment and a second signature of the first user equipment, and sends a fourth message
Figure 615595DEST_PATH_IMAGE015
And sending the data to the second user equipment. Wherein the content of the first and second substances,
Figure 368787DEST_PATH_IMAGE087
is the hash value of the first user equipment,
Figure 374790DEST_PATH_IMAGE017
is the second public key of the first user equipment,
Figure 871630DEST_PATH_IMAGE018
is the second signature of the first user equipment,
Figure 646688DEST_PATH_IMAGE019
is the timestamp of the fourth message. In this step, different methods may be used to verify an Access and Mobility Management Function (AMF) module according to actual requirements, and generate a hash value of the first user equipment, a second public key of the first user equipment, and a second signature of the first user equipment.
Step 600: the second user equipment verifies the first user equipment through the timestamp of the fourth message and the second signature of the first user equipment; after the verification is passed, the second user equipment generates a hash value of the second user equipment, a second public key of the second user equipment and a second signature of the second user equipment, a first shared key is generated by adopting a bilinear mapping algorithm, and a fifth message is sent
Figure 570782DEST_PATH_IMAGE020
And sending the data to the first user equipment. Wherein the content of the first and second substances,
Figure 798501DEST_PATH_IMAGE021
is the hash value of the second user equipment,
Figure 833453DEST_PATH_IMAGE022
is the second public key of the second user equipment,
Figure 463017DEST_PATH_IMAGE023
is a second signature of the second user equipment,
Figure 823591DEST_PATH_IMAGE024
is the timestamp of the fifth message. In this step, different methods may be adopted to verify the first user equipment according to actual requirements, and a hash value of the second user equipment, a second public key of the second user equipment, and a second signature of the second user equipment are generated.
Step 700: the first user equipment verifies the second user equipment through the timestamp of the fifth message and the second signature of the second user equipment; after the verification is passed, generating a second shared secret key through a bilinear mapping algorithm; and the second shared key is adopted to encrypt the session message to generate a sixth message which is sent to the second user equipment. The conversation message is
Figure 804186DEST_PATH_IMAGE051
The sixth message is
Figure 111670DEST_PATH_IMAGE146
Figure 861320DEST_PATH_IMAGE027
Is a message in which the session message is encrypted using the second shared key. In this step, different methods can be adopted to verify the second user equipment according to actual requirements.
Step 800: the second user equipment decrypts the sixth message through the first shared key and verifies the decrypted message and the first shared key
Figure 127217DEST_PATH_IMAGE051
Whether they are equal; and if the first user equipment and the second user equipment are equal, the second user generates a message which is successfully encrypted, encrypts the message which is successfully encrypted by adopting the second shared secret key, generates a seventh message and sends the seventh message to the first user equipment, and the authentication of the first user equipment and the second user equipment is completed.
After the first user equipment and the second user equipment are authenticated, the message sent to the second user equipment by the first user equipment is encrypted by adopting a first shared key, and the message sent to the first user equipment by the second user equipment is encrypted by adopting a second shared key.
Example 2
This embodiment discloses a specific manner of each public key, signature, and authentication as compared with embodiment 1. Fig. 3 is a schematic diagram of an authentication flow in embodiment 2 of the present invention, and as shown in fig. 3, a security authentication process between mobile devices disclosed in this embodiment is as follows:
the method comprises the following steps: initializing User Equipment (UE), authenticating the UE through a protocol 5G-AKA protocol and a 5G network, and establishing a security channel after the authentication is successful. At this time, the AMF module generates a temporary identity ID of the UE, calculates S = h (ID), and M = sS, and then sends M, ID to the UE through the secure channel.
Step two: user equipment
Figure 329528DEST_PATH_IMAGE094
Firstly, a random number a is selected, and a public key is calculated
Figure 971862DEST_PATH_IMAGE095
= aP, for user equipment
Figure 590667DEST_PATH_IMAGE094
Temporary identity of
Figure 27465DEST_PATH_IMAGE096
Calculating the signature to obtain the signature
Figure DEST_PATH_IMAGE147
Then the user equipment
Figure 185913DEST_PATH_IMAGE094
Message sending
Figure 225414DEST_PATH_IMAGE148
And broadcasting. Wherein
Figure 825022DEST_PATH_IMAGE099
Representing user equipment
Figure 557355DEST_PATH_IMAGE094
The current timestamp of.
Step (ii) ofThirdly, the method comprises the following steps: when the user equipment
Figure 609624DEST_PATH_IMAGE101
Want to with user equipment
Figure 452816DEST_PATH_IMAGE094
When establishing communication, the user equipment
Figure 906931DEST_PATH_IMAGE101
Receive to
Figure 810165DEST_PATH_IMAGE094
After broadcasting the information, the user equipment
Figure 349730DEST_PATH_IMAGE101
First checking the timestamp
Figure 996612DEST_PATH_IMAGE099
If true, determining the timestamp
Figure DEST_PATH_IMAGE149
Whether the time is within the preset time range or not, if so, the user equipment
Figure 698377DEST_PATH_IMAGE101
First by calculating
Figure 772512DEST_PATH_IMAGE103
Whether to equal user equipment
Figure 533794DEST_PATH_IMAGE150
Is signed
Figure DEST_PATH_IMAGE151
Verifying, if equal, the user equipment is verified
Figure 453209DEST_PATH_IMAGE094
Then the user equipment
Figure 740971DEST_PATH_IMAGE101
Selecting random number b, calculating public key
Figure 861374DEST_PATH_IMAGE104
= bP, for user equipment
Figure 500165DEST_PATH_IMAGE101
Temporary identity of
Figure 629795DEST_PATH_IMAGE105
Calculating the signature to obtain the signature
Figure 647430DEST_PATH_IMAGE106
Then the user equipment
Figure 328947DEST_PATH_IMAGE101
Message sending
Figure 64822DEST_PATH_IMAGE107
Is sent to AMF, wherein
Figure 591618DEST_PATH_IMAGE108
Representing user equipment
Figure 729338DEST_PATH_IMAGE109
The current timestamp of.
Step four: when AMF receives user equipment
Figure 581757DEST_PATH_IMAGE101
After the message is sent, the time stamp of the message is firstly verified
Figure 539348DEST_PATH_IMAGE108
Whether the requirements are met. If the requirements are met, then AMF verifies the signature
Figure 138345DEST_PATH_IMAGE111
In particular, based on temporary identity information
Figure 130571DEST_PATH_IMAGE112
Computing
Figure 888312DEST_PATH_IMAGE113
Calculating
Figure 598779DEST_PATH_IMAGE103
Figure 732957DEST_PATH_IMAGE114
Whether or not equal, and if equal, the user equipment is verified
Figure 579690DEST_PATH_IMAGE094
And
Figure 773911DEST_PATH_IMAGE101
then AMF selects random number c and calculates public key
Figure 706095DEST_PATH_IMAGE115
= cP, for AMF
Figure 643964DEST_PATH_IMAGE115
Calculating the signature to obtain the signature
Figure 610783DEST_PATH_IMAGE116
Then AMF sends the message
Figure 710326DEST_PATH_IMAGE117
Is sent to
Figure 395385DEST_PATH_IMAGE094
Wherein
Figure 871366DEST_PATH_IMAGE118
Representing the current timestamp of the AMF.
Step five: when the user equipment
Figure 692692DEST_PATH_IMAGE094
After receiving the message sent by the AMF,
Figure 963136DEST_PATH_IMAGE094
first, verifyTime stamping of messages
Figure 869912DEST_PATH_IMAGE118
Whether the requirements are met, and if so, the user equipment
Figure 152513DEST_PATH_IMAGE094
Firstly, according to temporary identity information
Figure 828345DEST_PATH_IMAGE112
Computing
Figure 535270DEST_PATH_IMAGE120
Then by calculating
Figure 929342DEST_PATH_IMAGE152
Verifying signatures equally
Figure DEST_PATH_IMAGE153
If equal, the AMF is verified, at which point the AMF notifies
Figure 215967DEST_PATH_IMAGE094
Discover devices
Figure 136519DEST_PATH_IMAGE109
Figure 889711DEST_PATH_IMAGE101
Thinking and equipment
Figure 630134DEST_PATH_IMAGE094
Establishing a connection for communication, at which time the user equipment
Figure 126974DEST_PATH_IMAGE094
Randomly selecting a secret value
Figure 902032DEST_PATH_IMAGE122
Computing public keys
Figure 826126DEST_PATH_IMAGE123
Meter for measuringComputing signature value signatures
Figure 319424DEST_PATH_IMAGE124
Then the message is sent
Figure 354376DEST_PATH_IMAGE125
Is sent to
Figure 983941DEST_PATH_IMAGE101
Wherein
Figure 78936DEST_PATH_IMAGE099
Represents
Figure 785162DEST_PATH_IMAGE094
The current timestamp of.
Step six: when the user equipment
Figure 623805DEST_PATH_IMAGE101
Receive from
Figure 373455DEST_PATH_IMAGE094
After the message has been sent, the user may,
Figure 639351DEST_PATH_IMAGE101
first verifying the timestamp of the message
Figure 841662DEST_PATH_IMAGE099
Whether the requirements are met. If the requirements are met, the user equipment
Figure 218417DEST_PATH_IMAGE109
By calculation of
Figure 822574DEST_PATH_IMAGE127
Verifying signatures equally
Figure 259371DEST_PATH_IMAGE154
And if equal, the user equipment is verified
Figure 948979DEST_PATH_IMAGE094
. At this time, the user equipment
Figure 129424DEST_PATH_IMAGE109
Randomly selecting a secret value
Figure 853667DEST_PATH_IMAGE128
Computing public keys
Figure 461366DEST_PATH_IMAGE129
User equipment
Figure 372690DEST_PATH_IMAGE101
Computing and user equipment
Figure 356826DEST_PATH_IMAGE094
Is shared with the key
Figure 935575DEST_PATH_IMAGE130
Calculating a signature value
Figure 714175DEST_PATH_IMAGE131
Then the message is sent
Figure 115725DEST_PATH_IMAGE132
Is sent to
Figure 637974DEST_PATH_IMAGE094
Wherein
Figure 71229DEST_PATH_IMAGE110
Represents
Figure 20730DEST_PATH_IMAGE101
The current timestamp of.
Step seven: when the user equipment
Figure 968964DEST_PATH_IMAGE094
Receive from
Figure 153957DEST_PATH_IMAGE101
After the message has been sent, the user may,
Figure 582665DEST_PATH_IMAGE094
first verifying the timestamp of the message
Figure 968647DEST_PATH_IMAGE108
Whether the requirements are met, and if so, the user equipment
Figure 810701DEST_PATH_IMAGE094
Verifying signatures
Figure 799385DEST_PATH_IMAGE133
Calculating
Figure 82599DEST_PATH_IMAGE134
Whether or not equal, and if equal, the user equipment is verified
Figure 498537DEST_PATH_IMAGE101
. At this time, the user equipment
Figure 234412DEST_PATH_IMAGE094
Computing and user equipment
Figure 29717DEST_PATH_IMAGE101
Is shared with the key
Figure 167437DEST_PATH_IMAGE135
User equipment
Figure 754276DEST_PATH_IMAGE094
Encrypted using shared key MK
Figure DEST_PATH_IMAGE155
And to the user equipment
Figure 570923DEST_PATH_IMAGE101
Sending
Figure 42355DEST_PATH_IMAGE137
A message.
Step eight: when the user isDevice
Figure 159216DEST_PATH_IMAGE101
Receive from
Figure 792323DEST_PATH_IMAGE094
After the message is sent, first calculate U =
Figure 627423DEST_PATH_IMAGE138
Then decrypted using the session key MK
Figure 636968DEST_PATH_IMAGE139
To obtain
Figure 608335DEST_PATH_IMAGE140
And verifies whether U is equal, if so, verifies
Figure 271397DEST_PATH_IMAGE141
Equal session keys are generated, and finally
Figure 797056DEST_PATH_IMAGE101
Sending an encrypted success message to
Figure 206697DEST_PATH_IMAGE094
And finally the user equipment
Figure 907937DEST_PATH_IMAGE094
And user equipment
Figure 7480DEST_PATH_IMAGE101
By separately calculated session keys
Figure 551593DEST_PATH_IMAGE142
Communication is performed.
The invention has the following beneficial effects:
1. the communication entities in the method provided by the invention carry out mutual authentication, thereby avoiding impersonation attack and ensuring the security of communication.
2. The method provided by the invention ensures the message freshness through the time stamp by the user equipment. Thereby avoiding replay attacks.
3. Method session key provided by the invention
Figure 637361DEST_PATH_IMAGE142
Is established in dependence on
Figure 52162DEST_PATH_IMAGE094
Figure 57027DEST_PATH_IMAGE109
Selected random number
Figure 88437DEST_PATH_IMAGE122
And
Figure 243475DEST_PATH_IMAGE128
and
Figure 778361DEST_PATH_IMAGE156
. Thus, the forward security of the key is guaranteed.
4. In the method provided by the invention, the private key value of the user equipment is randomly generated in each session in the authentication process. Thus, backward security of the key is guaranteed.
5. The method provided by the invention is a session key
Figure 485286DEST_PATH_IMAGE142
Is generated by a bilinear pairwise algorithm, so the actual session key is never transmitted over an unsecured free channel. Thus, the security of the key is guaranteed.
Based on the above scheme, the present invention further provides a mobile device security authentication system based on bilinear pairings, and fig. 4 is a schematic structural diagram of the mobile device security authentication system based on bilinear pairings according to the present invention. As shown in fig. 4, the mobile device security authentication system based on bilinear pairing of the present invention includes:
and the temporary identity ID generation module 401 is configured to generate a temporary identity ID for the user equipment after the authentication is successful by using the access and mobility management function module of the 5G network, and send the temporary identity ID to the corresponding user equipment through the secure channel.
A first user equipment broadcasting module 402, configured to generate, by the first user equipment, a first public key of the first user equipment by using an elliptic curve cryptography algorithm, generate a first signature of the first user equipment according to the temporary identity ID of the first user equipment, and send a first message to the first user equipment
Figure 613779DEST_PATH_IMAGE084
Broadcasting; wherein the content of the first and second substances,
Figure 446211DEST_PATH_IMAGE085
is the temporary identity ID of the first user equipment,
Figure 101183DEST_PATH_IMAGE003
is a first signature of the first user equipment,
Figure 182272DEST_PATH_IMAGE004
is the first public key of the first user equipment,
Figure 63640DEST_PATH_IMAGE005
is the timestamp of the first message.
A second user equipment request communication module 403, configured to verify, by the second user equipment, the first user equipment through the timestamp of the first message and the first signature of the first user equipment; after the verification is passed, the second user equipment generates a first public key of the second user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the second user equipment according to the temporary identity ID of the second user equipment, and sends a second message
Figure 419535DEST_PATH_IMAGE006
Sending the information to the access and mobile management function module; wherein the content of the first and second substances,
Figure 69959DEST_PATH_IMAGE007
is the temporary identity ID of the second user equipment,
Figure 853107DEST_PATH_IMAGE008
is the first signature of the second user equipment,
Figure 80826DEST_PATH_IMAGE009
is the first public key of the second user equipment,
Figure 850199DEST_PATH_IMAGE010
is the timestamp of the second message.
An access and mobility management function module verification module 404, configured to verify, by the access and mobility management function module, the first user equipment and the second user equipment through the timestamp of the second message, the first signature of the first user equipment, and the first signature of the second user equipment; after the verification is passed, the access and mobile management functional module generates a first public key of the AMF and a first signature of the AMF, and sends a third message
Figure 745343DEST_PATH_IMAGE086
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure 699392DEST_PATH_IMAGE012
is the first public key of the AMF,
Figure 289774DEST_PATH_IMAGE013
is the first signature of the AMF,
Figure 255980DEST_PATH_IMAGE014
is the timestamp of the third message.
A first ue-to-AMF verification module 405, configured to verify, by the first ue, the access and mobility management function module through a timestamp of the third message and a first signature of the AMF; after the verification is passed, the first user equipment generates a hash value of the first user equipment, a second public key of the first user equipment and a second signature of the first user equipment, and sends a fourth message
Figure 880997DEST_PATH_IMAGE015
Sending the information to the second user equipment; wherein the content of the first and second substances,
Figure 271527DEST_PATH_IMAGE087
is the hash value of the first user equipment,
Figure 349204DEST_PATH_IMAGE017
is the second public key of the first user equipment,
Figure 850593DEST_PATH_IMAGE018
is the second signature of the first user equipment,
Figure 330115DEST_PATH_IMAGE019
is the timestamp of the fourth message.
A first shared key generating module 406, configured to verify, by the second user equipment, the first user equipment through the timestamp of the fourth message and a second signature of the first user equipment; after the verification is passed, the second user equipment generates a hash value of the second user equipment, a second public key of the second user equipment and a second signature of the second user equipment, a first shared key is generated by adopting a bilinear mapping algorithm, and a fifth message is sent
Figure 891547DEST_PATH_IMAGE020
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure 456520DEST_PATH_IMAGE088
is the hash value of the second user equipment,
Figure 761600DEST_PATH_IMAGE022
is the second public key of the second user equipment,
Figure 95629DEST_PATH_IMAGE023
is a second signature of the second user equipment,
Figure 827962DEST_PATH_IMAGE024
is the timestamp of the fifth message.
A second shared key generating module 407, configured to verify, by the first user equipment, the second user equipment through a timestamp of the fifth message and a second signature of the second user equipment; after the verification is passed, generating a second shared secret key through a bilinear mapping algorithm; encrypting the session message by using the second shared key to generate a sixth message, and sending the sixth message to the second user equipment; the conversation message is
Figure 880231DEST_PATH_IMAGE089
The sixth message is
Figure 989002DEST_PATH_IMAGE090
Figure 177538DEST_PATH_IMAGE027
The message is a message obtained by encrypting a session message by using the second shared key.
A shared key verification module 408, configured to decrypt the sixth message with the first shared key by the second user equipment, and verify the decrypted message with
Figure 80772DEST_PATH_IMAGE051
Whether they are equal; if the first user equipment and the second user equipment are equal, the second user generates a message which is successfully encrypted, encrypts the message which is successfully encrypted by adopting a second shared secret key, generates a seventh message and sends the seventh message to the first user equipment, and the authentication of the first user equipment and the second user equipment is completed; after the first user equipment and the second user equipment are authenticated, the message sent to the second user equipment by the first user equipment is encrypted by the first shared secret key, and the message sent to the first user equipment by the second user equipment is encrypted by the second shared secret key.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. For the system disclosed by the embodiment, the description is relatively simple because the system corresponds to the method disclosed by the embodiment, and the relevant points can be referred to the method part for description.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.

Claims (10)

1. A mobile device security authentication method based on bilinear pairings is characterized by comprising the following steps:
the access and mobile management function module of the 5G network generates a temporary identity ID for the user equipment after successful authentication and sends the temporary identity ID to the corresponding user equipment through a secure channel;
the first user equipment generates a first public key of the first user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the first user equipment according to the temporary identity ID of the first user equipment, and sends a first message
Figure DEST_PATH_IMAGE001
Broadcasting; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE002
is the temporary identity ID of the first user equipment,
Figure DEST_PATH_IMAGE003
is a first signature of the first user equipment,
Figure DEST_PATH_IMAGE004
is the first public key of the first user equipment,
Figure DEST_PATH_IMAGE005
is the time of the first messageStamping;
the second user equipment verifies the first user equipment through the timestamp of the first message and the first signature of the first user equipment; after the verification is passed, the second user equipment generates a first public key of the second user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the second user equipment according to the temporary identity ID of the second user equipment, and sends a second message
Figure DEST_PATH_IMAGE006
Sending the information to the access and mobile management function module; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE007
is the temporary identity ID of the second user equipment,
Figure DEST_PATH_IMAGE008
is the first signature of the second user equipment,
Figure DEST_PATH_IMAGE009
is the first public key of the second user equipment,
Figure DEST_PATH_IMAGE010
a timestamp for the second message;
the access and mobile management function module verifies the first user equipment and the second user equipment through the timestamp of the second message, the first signature of the first user equipment and the first signature of the second user equipment; after the verification is passed, the access and mobile management functional module generates a first public key of the AMF and a first signature of the AMF, and sends a third message
Figure DEST_PATH_IMAGE011
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE012
is the first public key of the AMF,
Figure DEST_PATH_IMAGE013
is the first signature of the AMF,
Figure DEST_PATH_IMAGE014
a timestamp for the third message;
the first user equipment verifies the access and mobile management function module through the timestamp of the third message and the first signature of the AMF; after the verification is passed, the first user equipment generates a hash value of the first user equipment, a second public key of the first user equipment and a second signature of the first user equipment, and sends a fourth message
Figure DEST_PATH_IMAGE015
Sending the information to the second user equipment; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE016
is the hash value of the first user equipment,
Figure DEST_PATH_IMAGE017
is the second public key of the first user equipment,
Figure DEST_PATH_IMAGE018
is the second signature of the first user equipment,
Figure DEST_PATH_IMAGE019
a timestamp for the fourth message;
the second user equipment verifies the first user equipment through the timestamp of the fourth message and the second signature of the first user equipment; after the verification is passed, the second user equipment generates a hash value of the second user equipment, a second public key of the second user equipment and a second signature of the second user equipment, a first shared key is generated by adopting a bilinear mapping algorithm, and a fifth message is sent
Figure DEST_PATH_IMAGE020
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE021
is the hash value of the second user equipment,
Figure DEST_PATH_IMAGE022
is the second public key of the second user equipment,
Figure DEST_PATH_IMAGE023
is a second signature of the second user equipment,
Figure DEST_PATH_IMAGE024
a timestamp of the fifth message;
the first user equipment verifies the second user equipment through the timestamp of the fifth message and a second signature of the second user equipment; after the verification is passed, generating a second shared secret key through a bilinear mapping algorithm; encrypting the session message by using the second shared key to generate a sixth message, and sending the sixth message to the second user equipment; the conversation message is
Figure DEST_PATH_IMAGE025
Figure DEST_PATH_IMAGE026
A connection symbol is represented and,
Figure 81435DEST_PATH_IMAGE025
is composed of
Figure 717866DEST_PATH_IMAGE002
And
Figure 789727DEST_PATH_IMAGE007
the concatenated hash value; the sixth message is
Figure DEST_PATH_IMAGE027
Figure DEST_PATH_IMAGE028
The message is the message obtained by encrypting the session message by adopting the second shared secret key;
the second user equipment decrypts the sixth message through the first shared key and verifies the decrypted message and the first shared key
Figure 715089DEST_PATH_IMAGE025
Whether they are equal; if the first user equipment and the second user equipment are equal, the second user generates a message which is successfully encrypted, encrypts the message which is successfully encrypted by adopting a second shared secret key, generates a seventh message and sends the seventh message to the first user equipment, and the authentication of the first user equipment and the second user equipment is completed; after the first user equipment and the second user equipment are authenticated, the message sent to the second user equipment by the first user equipment is encrypted by the first shared secret key, and the message sent to the first user equipment by the second user equipment is encrypted by the second shared secret key.
2. The bilinear pairing-based mobile device security authentication method of claim 1, wherein the access and mobility management function module of the 5G network generates a temporary identity ID for the user equipment after the authentication is successful, and the method further comprises:
the user equipment is authenticated through a 5G-AKA protocol of the 5G network, and the 5G network establishes a security channel after the authentication is successful.
3. The bilinear pairing-based mobile device security authentication method of claim 1, wherein the second user device verifies the first user device through a timestamp of the first message and a first signature of the first user device, and specifically comprises:
the second user equipment verifies the timestamp of the first message; after the verification is passed, the judgment is passed
Figure DEST_PATH_IMAGE029
Whether a first signature of first user equipment is verified or not is established, and if yes, the first user equipment is verified to pass; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE030
to represent
Figure DEST_PATH_IMAGE031
And
Figure DEST_PATH_IMAGE032
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE033
to represent
Figure 958245DEST_PATH_IMAGE004
And
Figure DEST_PATH_IMAGE034
the bilinear mapping values of (a) the image,
Figure 156008DEST_PATH_IMAGE031
is a base point in the elliptic curve cryptography algorithm,
Figure DEST_PATH_IMAGE035
to generate a private key corresponding to the first public key of the first user device,
Figure 579030DEST_PATH_IMAGE034
a hash value of the first user equipment temporary identity ID.
4. The bilinear pairing-based mobile device security authentication method of claim 1, wherein the access and mobility management function module verifies the first user equipment and the second user equipment through a timestamp of the second message, a first signature of the first user equipment, and a first signature of the second user equipment, and specifically includes:
the access and mobile management function module verifies the timestamp of the second message; after the verification is passed, the judgment is passed
Figure 890057DEST_PATH_IMAGE029
And
Figure DEST_PATH_IMAGE036
whether the first signature of the first user equipment and the first signature of the second user equipment are verified or not is established; if it is
Figure 130545DEST_PATH_IMAGE029
If yes, the first user equipment is verified to be passed; if it is
Figure 628654DEST_PATH_IMAGE036
If yes, the second user equipment is verified to pass; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE037
to represent
Figure DEST_PATH_IMAGE038
And
Figure DEST_PATH_IMAGE039
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE040
to represent
Figure DEST_PATH_IMAGE041
And
Figure DEST_PATH_IMAGE042
the bilinear mapping values of (a) the image,
Figure 481466DEST_PATH_IMAGE038
is a base point in the elliptic curve cryptography algorithm,
Figure DEST_PATH_IMAGE043
to generate a private key corresponding to the first public key of the first user device,
Figure 580089DEST_PATH_IMAGE042
a hash value of the first user equipment temporary identity ID;
Figure DEST_PATH_IMAGE044
to represent
Figure 132424DEST_PATH_IMAGE038
And
Figure DEST_PATH_IMAGE045
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE046
to represent
Figure DEST_PATH_IMAGE047
And
Figure DEST_PATH_IMAGE048
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE049
to generate a private key corresponding to the first public key of the second user device,
Figure 9507DEST_PATH_IMAGE048
a hash value of the second user equipment temporary identity ID.
5. The bilinear pairing-based mobile device security authentication method of claim 1, wherein the first user equipment verifies the access and mobility management function module according to a timestamp of the third message and a first signature of the AMF, and specifically comprises:
the first user equipment verifies the timestamp of the third message; after the verification is passed, the judgment is passed
Figure DEST_PATH_IMAGE050
Whether the first signature of the AMF is verified or not is established, if so, the access and mobile management function module is verified to be passed; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE051
to represent
Figure 102228DEST_PATH_IMAGE031
And
Figure DEST_PATH_IMAGE052
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE053
to represent
Figure 591109DEST_PATH_IMAGE012
And
Figure 252029DEST_PATH_IMAGE025
the bilinear mapping values of (a) the image,
Figure 973997DEST_PATH_IMAGE031
is a base point in the elliptic curve cryptography algorithm,
Figure DEST_PATH_IMAGE054
to generate the private key corresponding to the first public key of the AMF,
Figure 683458DEST_PATH_IMAGE026
a connection symbol is represented and,
Figure 541693DEST_PATH_IMAGE025
is composed of
Figure 373514DEST_PATH_IMAGE002
And
Figure 848357DEST_PATH_IMAGE007
the hash value after the concatenation of the hash values,
Figure 423826DEST_PATH_IMAGE012
is the first public key of the AMF.
6. The bilinear pairing-based mobile device security authentication method of claim 1, wherein the second user device verifies the first user device through a timestamp of the fourth message and a second signature of the first user device, and specifically comprises:
the second user equipment verifies the timestamp of the fourth message; after the verification is passed, the judgment is passed
Figure DEST_PATH_IMAGE055
Whether the first user equipment is verified or not is established, and if the first user equipment is verified, the first user equipment is verified to pass; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE056
to represent
Figure DEST_PATH_IMAGE057
And
Figure DEST_PATH_IMAGE058
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE059
to represent
Figure 282106DEST_PATH_IMAGE057
And
Figure DEST_PATH_IMAGE060
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE061
to represent
Figure DEST_PATH_IMAGE062
And
Figure DEST_PATH_IMAGE063
the bilinear mapping values of (a) the image,
Figure 363457DEST_PATH_IMAGE057
is a hash value of the first user equipment temporary identity ID,
Figure DEST_PATH_IMAGE064
to generate the private value of the second signature of the first user device,
Figure DEST_PATH_IMAGE065
a connection symbol is represented and,
Figure 545170DEST_PATH_IMAGE063
is composed of
Figure 924330DEST_PATH_IMAGE016
And
Figure 22736DEST_PATH_IMAGE017
the hash value after the concatenation of the hash values,
Figure 930781DEST_PATH_IMAGE016
=
Figure DEST_PATH_IMAGE066
7. the bilinear pairing-based mobile device security authentication method of claim 1, wherein after the verification is passed, the second user equipment generates the first shared key by using a bilinear mapping algorithm, and specifically includes:
using formulas
Figure DEST_PATH_IMAGE067
Generating a first shared key; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE068
in order to be the first shared secret key,
Figure DEST_PATH_IMAGE069
to represent
Figure DEST_PATH_IMAGE070
And
Figure DEST_PATH_IMAGE071
the bilinear mapping values of (a) the image,
Figure 819364DEST_PATH_IMAGE066
is a hash value of the first user equipment temporary identity ID,
Figure DEST_PATH_IMAGE072
a hash value of the second user equipment temporary identity ID,
Figure 798953DEST_PATH_IMAGE064
to generate the private value of the second signature of the first user device,
Figure DEST_PATH_IMAGE073
to generate a secret value of the second signature of the second user device,
Figure DEST_PATH_IMAGE074
is the master key of the system.
8. The bilinear pairing-based mobile device security authentication method of claim 1, wherein the first user equipment verifies the second user equipment through a timestamp of the fifth message and a second signature of the second user equipment, and specifically comprises:
the first user equipment verifies the timestamp of the fifth message; after the verification is passed, the judgment is passed
Figure DEST_PATH_IMAGE075
Whether the signature of the second user equipment is verified or not is established, and if the signature of the second user equipment is established, the second user equipment is verified to pass; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE076
to represent
Figure 581226DEST_PATH_IMAGE048
And
Figure 175019DEST_PATH_IMAGE023
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE077
to represent
Figure 280726DEST_PATH_IMAGE048
And
Figure DEST_PATH_IMAGE078
the bilinear mapping values of (a) the image,
Figure DEST_PATH_IMAGE079
to represent
Figure DEST_PATH_IMAGE080
And
Figure DEST_PATH_IMAGE081
bilinear ofThe values of the map are mapped to,
Figure 470531DEST_PATH_IMAGE048
a hash value of the second user equipment temporary identity ID,
Figure DEST_PATH_IMAGE082
to generate a secret value of the second signature of the second user device,
Figure 966365DEST_PATH_IMAGE026
a connection symbol is represented and,
Figure 731059DEST_PATH_IMAGE081
is composed of
Figure 640240DEST_PATH_IMAGE022
And
Figure 148582DEST_PATH_IMAGE021
the hash value after the concatenation of the hash values,
Figure 826819DEST_PATH_IMAGE021
=
Figure 762414DEST_PATH_IMAGE048
9. the bilinear pairing-based mobile device security authentication method of claim 7, wherein after the verification is passed, a second shared key is generated through a bilinear mapping algorithm, and specifically includes:
using formulas
Figure DEST_PATH_IMAGE083
Generating a second shared key;
Figure DEST_PATH_IMAGE084
is the second shared key.
10. A mobile device security authentication system based on bilinear pairings, comprising:
the temporary identity ID generation module is used for generating a temporary identity ID for the user equipment after the authentication is successful by adopting an access and mobile management function module of the 5G network and sending the temporary identity ID to the corresponding user equipment through a secure channel;
a first user equipment broadcasting module, configured to generate, by the first user equipment, a first public key of the first user equipment by using an elliptic curve cryptography algorithm, generate a first signature of the first user equipment according to the temporary identity ID of the first user equipment, and send a first message to the first user equipment
Figure DEST_PATH_IMAGE085
Broadcasting; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE086
is the temporary identity ID of the first user equipment,
Figure DEST_PATH_IMAGE087
is a first signature of the first user equipment,
Figure 784990DEST_PATH_IMAGE041
is the first public key of the first user equipment,
Figure DEST_PATH_IMAGE088
a timestamp for the first message;
the second user equipment request communication module is used for verifying the first user equipment by the second user equipment through the timestamp of the first message and the first signature of the first user equipment; after the verification is passed, the second user equipment generates a first public key of the second user equipment by adopting an elliptic curve cryptography algorithm, generates a first signature of the second user equipment according to the temporary identity ID of the second user equipment, and sends a second message
Figure DEST_PATH_IMAGE089
Sending the information to the access and mobile management function module; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE090
is the temporary identity ID of the second user equipment,
Figure DEST_PATH_IMAGE091
is the first signature of the second user equipment,
Figure 926383DEST_PATH_IMAGE047
is the first public key of the second user equipment,
Figure DEST_PATH_IMAGE092
a timestamp for the second message;
the access and mobility management function module verification module is used for verifying the first user equipment and the second user equipment through the timestamp of the second message, the first signature of the first user equipment and the first signature of the second user equipment by the access and mobility management function module; after the verification is passed, the access and mobile management functional module generates a first public key of the AMF and a first signature of the AMF, and sends a third message
Figure DEST_PATH_IMAGE093
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE094
is the first public key of the AMF,
Figure DEST_PATH_IMAGE095
is the first signature of the AMF,
Figure DEST_PATH_IMAGE096
a timestamp for the third message;
a module for verifying AMF by the first user equipment, which is used for the first user equipment to pass the third messageThe access and mobility management function module is verified with the timestamp of AMF and the first signature of AMF; after the verification is passed, the first user equipment generates a hash value of the first user equipment, a second public key of the first user equipment and a second signature of the first user equipment, and sends a fourth message
Figure DEST_PATH_IMAGE097
Sending the information to the second user equipment; wherein the content of the first and second substances,
Figure 401403DEST_PATH_IMAGE016
is the hash value of the first user equipment,
Figure 773479DEST_PATH_IMAGE017
is the second public key of the first user equipment,
Figure 391673DEST_PATH_IMAGE018
is the second signature of the first user equipment,
Figure 507396DEST_PATH_IMAGE019
a timestamp for the fourth message;
the first shared key generation module is used for the second user equipment to verify the first user equipment through the timestamp of the fourth message and the second signature of the first user equipment; after the verification is passed, the second user equipment generates a hash value of the second user equipment, a second public key of the second user equipment and a second signature of the second user equipment, a first shared key is generated by adopting a bilinear mapping algorithm, and a fifth message is sent
Figure DEST_PATH_IMAGE098
Sending the information to the first user equipment; wherein the content of the first and second substances,
Figure 566750DEST_PATH_IMAGE021
is the hash value of the second user equipment,
Figure 844148DEST_PATH_IMAGE022
is the second public key of the second user equipment,
Figure 949638DEST_PATH_IMAGE023
is a second signature of the second user equipment,
Figure 603474DEST_PATH_IMAGE024
a timestamp of the fifth message;
a second shared key generation module, configured to verify, by the first user equipment, the second user equipment through a timestamp of the fifth message and a second signature of the second user equipment; after the verification is passed, generating a second shared secret key through a bilinear mapping algorithm; encrypting the session message by using the second shared key to generate a sixth message, and sending the sixth message to the second user equipment; the conversation message is
Figure DEST_PATH_IMAGE099
Figure 782913DEST_PATH_IMAGE026
A connection symbol is represented and,
Figure 231212DEST_PATH_IMAGE025
is composed of
Figure 89578DEST_PATH_IMAGE002
And
Figure 281525DEST_PATH_IMAGE007
the concatenated hash value; the sixth message is
Figure DEST_PATH_IMAGE100
Figure DEST_PATH_IMAGE101
The message is the message obtained by encrypting the session message by adopting the second shared secret key;
a shared key verification module, configured to decrypt the sixth message with the first shared key by the second user equipment, and verify the decrypted message with
Figure 112209DEST_PATH_IMAGE099
Whether they are equal; if the first user equipment and the second user equipment are equal, the second user generates a message which is successfully encrypted, encrypts the message which is successfully encrypted by adopting a second shared secret key, generates a seventh message and sends the seventh message to the first user equipment, and the authentication of the first user equipment and the second user equipment is completed; after the first user equipment and the second user equipment are authenticated, the message sent to the second user equipment by the first user equipment is encrypted by the first shared secret key, and the message sent to the first user equipment by the second user equipment is encrypted by the second shared secret key.
CN202110427217.0A 2021-04-21 2021-04-21 Mobile equipment security authentication method and system based on bilinear pairings Active CN112822018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110427217.0A CN112822018B (en) 2021-04-21 2021-04-21 Mobile equipment security authentication method and system based on bilinear pairings

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110427217.0A CN112822018B (en) 2021-04-21 2021-04-21 Mobile equipment security authentication method and system based on bilinear pairings

Publications (2)

Publication Number Publication Date
CN112822018A CN112822018A (en) 2021-05-18
CN112822018B true CN112822018B (en) 2021-07-02

Family

ID=75862516

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110427217.0A Active CN112822018B (en) 2021-04-21 2021-04-21 Mobile equipment security authentication method and system based on bilinear pairings

Country Status (1)

Country Link
CN (1) CN112822018B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115085945B (en) * 2022-08-22 2022-11-29 北京科技大学 Authentication method and device for intelligent lamp pole equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355745A (en) * 2020-03-12 2020-06-30 西安电子科技大学 Cross-domain identity authentication method based on edge computing network architecture
CN112399407A (en) * 2021-01-20 2021-02-23 北京电信易通信息技术股份有限公司 5G network authentication method and system based on DH ratchet algorithm

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101516114B1 (en) * 2014-02-13 2015-05-04 부경대학교 산학협력단 Certificate-based proxy re-encryption method and its system
CN105163309B (en) * 2015-09-10 2019-02-15 电子科技大学 A method of the wireless sensor network security communication based on combination pin
CN106027519B (en) * 2016-05-18 2019-03-29 安徽大学 High efficiency condition secret protection and safety certifying method in car networking
CN111327620B (en) * 2020-02-27 2021-04-27 福州大学 Data security traceability and access control system under cloud computing framework

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111355745A (en) * 2020-03-12 2020-06-30 西安电子科技大学 Cross-domain identity authentication method based on edge computing network architecture
CN112399407A (en) * 2021-01-20 2021-02-23 北京电信易通信息技术股份有限公司 5G network authentication method and system based on DH ratchet algorithm

Also Published As

Publication number Publication date
CN112822018A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
CN108650227B (en) Handshaking method and system based on datagram secure transmission protocol
EP2272271B1 (en) Method and system for mutual authentication of nodes in a wireless communication network
CN102036238B (en) Method for realizing user and network authentication and key distribution based on public key
US20110320802A1 (en) Authentication method, key distribution method and authentication and key distribution method
US8578164B2 (en) Method of one-way access authentication
CN104754581A (en) Public key password system based LTE wireless network security certification system
Sun et al. Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet
CN110087240B (en) Wireless network security data transmission method and system based on WPA2-PSK mode
WO2010020186A1 (en) Multicast key distribution method, update method, and base station based on unicast conversation key
CN112039660B (en) Internet of things node group identity security authentication method
WO2019001169A1 (en) Pmipv6 authentication system and method for identity-based proxy group signature
CN1770681A (en) Conversation key safety distributing method under wireless environment
WO2010121462A1 (en) Method for establishing safe association among wapi stations in ad-hoc network
CN112399407B (en) 5G network authentication method and system based on DH ratchet algorithm
CN112333705B (en) Identity authentication method and system for 5G communication network
CN112822018B (en) Mobile equipment security authentication method and system based on bilinear pairings
CN113411801A (en) Mobile terminal authentication method based on identity signcryption
Singh et al. Elliptic curve cryptography based mechanism for secure Wi-Fi connectivity
Zhu et al. Research on authentication mechanism of cognitive radio networks based on certification authority
KR100456624B1 (en) Authentication and key agreement scheme for mobile network
CN213938340U (en) 5G application access authentication network architecture
CN114070570A (en) Safe communication method of power Internet of things
Dao et al. Prefetched asymmetric authentication for infrastructureless D2D communications: feasibility study and analysis
CN112822025B (en) Mobile terminal equipment security authentication method and system based on elliptic curve algorithm
CN117729056B (en) Equipment identity authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant