CN101510875A - Identification authentication method based on N-dimension sphere - Google Patents

Identification authentication method based on N-dimension sphere Download PDF

Info

Publication number
CN101510875A
CN101510875A CNA2009100382490A CN200910038249A CN101510875A CN 101510875 A CN101510875 A CN 101510875A CN A2009100382490 A CNA2009100382490 A CN A2009100382490A CN 200910038249 A CN200910038249 A CN 200910038249A CN 101510875 A CN101510875 A CN 101510875A
Authority
CN
China
Prior art keywords
centerdot
user
mod
certificate server
equiv
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CNA2009100382490A
Other languages
Chinese (zh)
Other versions
CN101510875B (en
Inventor
唐韶华
张华�
卢伯荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN2009100382490A priority Critical patent/CN101510875B/en
Priority to PCT/CN2009/071395 priority patent/WO2010108335A1/en
Publication of CN101510875A publication Critical patent/CN101510875A/en
Application granted granted Critical
Publication of CN101510875B publication Critical patent/CN101510875B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an identity authentication method based on an N-dimensional spherical surface, which comprises: an authentication server receives registration and identity authentication of users after being initialized; when a new user registers, the user calculates a vector by a safe one-way function according to passwords selected and submits the vector to the authentication server; the authentication server specifies an IDg for the user as the identification of the identity of the user; the authentication server combines a self secrete vector with the vector submitted by the user to determine the N-dimensional spherical surface; the authentication server randomly selects a plurality of different points on the N-dimensional spherical surface to form an encrypted file which is sent to the user through a safe channel; when the user requires identity authentication, the passwords and the encrypted file containing identity identification are utilized to calculate; the result of calculation is sent to the authentication server; and the authentication server checks and determines whether to accept the identity of the user after calculation. The method can effectively reduce the stored information and calculation load of the authentication server and prevent imitating the authentication server.

Description

A kind of identity identifying method based on the N n-dimensional sphere n
Technical field
The present invention relates to the identity identifying method in computer system security and the network security, specifically relate to a kind of identity identifying method based on the N n-dimensional sphere n.
Background technology
Along with the development of online transaction and ecommerce, E-Government, the network crime that emerges in an endless stream caused the trust crisis of people to network identity, so authentication becomes more and more important.Identity identifying technology can stop the unauthorized access to valuable source closely in conjunction with the operation flow of enterprise, government.We can say that also authentication is the basis of whole information security system.Identity identifying method relatively more commonly used at present has: password, dynamic password, smart card authentication, Public Key Infrastructure(PKI), biological identification etc.
The basic thought of password authentication is that each user has an identify label (ID) and password, and when the user wanted to enter system, he must provide its ID and password, the legitimacy that system just can inspection user.So password authentication has characteristics such as cheap, easy realization, user interface close friend.But the authentication that is based on password is easy to be stolen, and intensity often also is difficult to resist password conjecture, but also might be subjected to Replay Attack etc.
The dynamic password technology be a kind of allow user cipher according to time or access times constantly change, each password can only expendable technology.It adopts a kind of specialized hardware that is called dynamic token, and built-in power, password generate chip and display screen, and password generates the special cryptographic algorithm of chip operation, generates current password and is presented on the display screen according to current time or access times.Certificate server adopts the identical current valid password of algorithm computation.When using, the user only the current password input client computer that shows on the dynamic token can need be realized authentication.Because each password that uses must be produced by dynamic token, has only validated user just to hold this hardware, as long as just can think that by password authentification this user's identity is reliable.And the each password that uses of user is all inequality, even the hacker has intercepted and captured password one time, also can't utilize this password to come the identity of counterfeit validated user.Though yet dynamic password has solved the problem of fail safe, its cost is higher.
Smart card is a kind of chip of built-in integrated circuit, has the data relevant with user identity in the chip, and smart card by special device fabrication, is not reproducible hardware by special manufacturer.Smart card is carried by validated user, the special-purpose card reader of smart card insertion must be read information wherein during login, with checking user's identity.Smart card authentication can be by not counterfeit by the not reproducible user identity that guarantees of smart card hardware.Yet, still be easy to be truncated to user's authentication information by technology such as internal memory scanning or network monitorings, so still have potential safety hazard because the data that read from smart card are static at every turn.
Public Key Infrastructure(PKI) adopts the digital certificate management PKI, by third-party trust authority authentication authorization and accounting center (CA) user's PKI and user's identification information is bundled.As if as an infrastructure, PKI can solve most network security problems, and begin to take shape a cover total solution and a theory.Yet because PKI system complexity and problem such as cost in the use makes it run into a lot of problems in the application of reality.
Biological identification mainly is meant a kind of technology by biological character for identity authentication such as measurable health or behaviors.Biological characteristic is meant unique physiological characteristic or the behavior that can measure or can discern automatically and verify.Biological characteristic is divided into physical trait and behavioural characteristic two classes.Physical trait comprises: the blood vessel of fingerprint, palm type, retina, iris, human scent, shape of face, hand and DNA etc.; Behavioural characteristic comprises: handwritten signature, voice, walking step state etc.The biological identification technology has traditional incomparable advantage of authentication means.Adopt the biological identification technology, can remember and be provided with password again, use conveniently, but high cost, complicated technology have hindered its promotion and application.
Summary of the invention
The objective of the invention is to overcome the shortcoming and defect of prior art, utilize the mathematical principle of " point on known N+1 the N dimension space that satisfies certain condition; can uniquely determine a N n-dimensional sphere n (N-sphere/hyper sphere/N ties up and justifies) ", a kind of identity identifying method based on the N n-dimensional sphere n is provided, whether can have carried out authentication by the same N n-dimensional sphere n of reconstruct by certain secrets information comparison certificate server and user.The N n-dimensional sphere n be common sphere in the popularization of dimension arbitrarily, special, be called circle at 2 dimension spaces, 3 dimension spaces are called sphere, the above space of 4 dimensions is called hypersphere.This method can reduce server info memory space, server and user's amount of calculation effectively, and this method not to be difficult to resolve problem with certain mathematics be theoretical foundation, thereby effectively avoided the possibility that is broken owing to the proposition that solves mathematics difficult problem new method.
Purpose of the present invention is achieved through the following technical solutions: a kind of identity identifying method based on the N n-dimensional sphere n may further comprise the steps:
(1) certificate server initialization: certificate server is selected finite field gf (p) and safe one-way function f, selects some secret vectors simultaneously; Wherein GF (p) has determined the finite field at group computing place, and promptly all group's calculating processes all carry out in finite field gf (p), and p is a big prime number;
(2) user's registration: the user is according to self selected password PW gCalculate a vector by safety one-way function f and submit to certificate server, certificate server is checked user identity, for the user specifies an ID gAs the sign of user identity, the sign of each user identity has nothing in common with each other; Vectorial unique definite N n-dimensional sphere n that certificate server is submitted in conjunction with self secret vector sum user, if can not construct such N n-dimensional sphere n, then the certificate server sign of reselecting this user identity is calculated again; The point some inequality that certificate server will be selected at this N n-dimensional sphere n at random by safe lane, and and user ID g, big prime number p and safe one-way function f form encrypt file and pass to the user;
(3) user generates authentication information: the encrypt file that when the user needs certificate server to discern its identity, can utilize certificate server to pass back, and in conjunction with self selected password PW g, re-construct a N n-dimensional sphere n, select geometric properties on this N n-dimensional sphere n to pass to certificate server simultaneously and verify as authentication information;
(4) certificate server checking user authentication information: the authentication information that certificate server is accepted the user utilizes the secret vector of self to re-construct a N n-dimensional sphere n simultaneously, and calculate the geometric properties of the N n-dimensional sphere n that the user arranges to use, authentication information with result of calculation and user's submission compares at last, if identical then accept user identity, otherwise refusing user's identity.
For realizing the present invention better, described step (1) certificate server initialization specifically may further comprise the steps:
(1.1) certificate server is selected safe one-way function f, and certain big prime number p is open with it behind selected f of certificate server and the p;
(1.2) secret selected N the N dimensional vector (being linear independence between each vector) of certificate server: (S 11, S 12... S 1N) ..., (S N1, S N2... S NN), S wherein KlIn finite field gf (p), select at random, k=1 ..., N, l=1 ..., N; Certificate server can disclose the N value, but this N N dimensional vector can only preserve by certificate server is secret, and in case selectedly just no longer change.
Preferably: described big prime number satisfies p=8n+3, and n is a certain positive integer, step 2.3 is sought in finite field gf (p) removed A G0And A GiThe quadratic residue of any N point in addition is to easier, and computing is more convenient.
Described step (2) user registration specifically may further comprise the steps:
(2.1) user U gSelected password PW g, U wherein gBe the user who is designated as g down, PW gBe the user U that is designated as g down gSelected password, this password can be made up of letter and number, because of character string can be converted to numeral, the PW of the following stated gBe meant the later integer of conversion, below all calculating of each step all in finite field gf (p), carry out;
User's compute vector A G0=(f (PW g), f (2 * PW g) ..., f (N * PW g)) and pass to certificate server;
(2.2) certificate server is specified a unique ID for this user g, and calculate N n-dimensional sphere n equation:
(a) certificate server calculates N vector according to self secret N N dimensional vector of preserving:
A g 1 = ( f ( ID g × S 11 ) , f ( ID g × S 12 ) , . . . , f ( ID g × S 1 N ) ) · · · · A gn = ( f ( ID g × S N 1 ) , f ( ID g × S N 2 ) , . . . , f ( ID g × S NN ) )
(b) A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N; A G0Coordinate is designated as (a 01, a 02..., a 0N).This N+1 vectorial A G0, A G1...,, A GNStructure N n-dimensional sphere n equation
(x 1-c 1) 2+(x 2-c 2) 2+...+(x N-c N) 2=R 2 (1)
(c wherein 1, c 2..., c N) be the center of N n-dimensional sphere n, R is the radius of this N n-dimensional sphere n, (x 1, x 2..., x N) be arbitrfary point on the sphere;
(c) certificate server gets equation group (2) with N+1 the vectorial substitution equation (1) of trying to achieve
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 + . . . + ( a 0 N - c N ) 2 ≡ R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 ≡ R 2 mod p · · · · · · · · · · · · ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 ≡ R 2 mod p - - - ( 2 )
Respectively the same form before them is subtracted the back same form, can obtain about c 1, c 2..., c NSystem of linear equations (3):
2 ( a 11 - a 01 ) c 1 + . . . + 2 ( a 1 N - a 0 N ) c N ≡ ( Σ j = 1 N a 1 j 2 - Σ j = 1 N a 0 j 2 ) mod p · · · · · · · · · · · · 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N ≡ ( Σ j = 1 N a Nj 2 - Σ j = 1 N a ( N - 1 ) j 2 ) mod p - - - ( 3 )
If in computational process, the coefficient matrix determinant of equation group (3) is zero, then reselects ID gCalculate, guarantee the unique center C (c that determines this sphere of equation like this 1, c 2..., c N); Again any one formula of this centre coordinate substitution equation group (2) is calculated, can be obtained R 2Then c 1, c 2..., c NAnd R 2Substitution equation (1) is so the equation of this sphere just can determine that this equation is exactly to be designated as the user of g and the secret sphere UC that certificate server is shared down g, establish this equation and be:
(x 1-c 1) 2+(x 2-c 2) 2+...+(x N-c N) 2≡R 2?mod?p
(2.3) certificate server is selected secret sphere UC at random gGo up and remove A G0And A GiN in addition some B Gi, B Gi=(b I1, b I2..., b IN), wherein i=1 ..., N; B GiEach coordinate components all in finite field gf (p), look for B GiEach coordinate specifically find the solution as follows:
(A) find the N-2 number to being that quadratic residue is to (e Iq, d Iq), make e Iq≡ d Iq 2Mod p, wherein q=1 ..., N-2, e Iq, d IqBe to satisfy e in the finite field gf (p) Iq≡ d Iq 2Any two integers of mod p condition, and satisfy
b i1≡(d i1+c 1)mod?p
b i2≡(d i2+c 2)mod?p
......
b i(N-2)≡(d i(N-2)+c N-2)mod?p
(B) select two pairs of quadratic residues to (e again Iz, d Iz), make e Iz≡ d Iz 2Mod p, wherein z=N-1, N, e Iz, d IzBe to satisfy e in the finite field gf (p) Iz≡ d Iz 2Any two integers of mod p condition, and satisfy
e i ( N - 1 ) + e iN ≡ ( R 2 - Σ y = 1 N - 2 e iy ) mod p
Order
b i(N-1)≡(d i(N-1)+c N-1)mod?p
b iN≡(d iN+c N)mod?p
Above-mentioned steps (A) and (B) be the situations that N 〉=3 o'clock are suitable for is then directly used step (B) when N=2; Repeat N time and calculate, can obtain N B GiPoint is verified after each the calculating, guarantees that N the point that obtains is mutually different;
(2.4) certificate server is p, f, ID g, and B G1, B G2...,, B GNPreserve hereof and send to the user with the form of encrypting, cryptographic algorithm can be used existing secure cryptographic algorithm, and as AES etc., the user preserves the file after the encryption, but the user imports the PIN code declassified document and obtains information needed, and below we claim this encrypt file for " userInfo ".
Described step (3) user generates authentication information, specifically may further comprise the steps:
(3.1) be designated as the user U of g under gThe encrypt file that contains the information of succeeding in registration " userInfo " of input PIN code decrypted authentication server transmission obtains p, f, ID g, and B G1, B G2...,, B GN
(3.2) user is at client input self password PW g, can calculate B G0=(f (PW g), f (2 * PW g) ..., f (N * PW g));
(3.3) user is according to B G0Add the N point B of storage in the file " userInfo " G1, B G2..., B GN, N+1 point utilizes this N+1 vector structure N n-dimensional sphere n equation altogether, can reconstruct original secret sphere UC gBe about to B G0And B G1, B G2...,, B GNSubstitution N n-dimensional sphere n equation gets equation group:
( b 01 - c 1 ) 2 + ( b 02 - c 2 ) 2 + . . . + ( b 0 N - c N ) 2 ≡ R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 N - c N ) 2 ≡ R 2 mod p · · · · · · · · · · · · ( b N 1 - c 1 ) 2 + ( b N 2 - c 2 ) 2 + . . . + ( b NN - c N ) 2 ≡ R 2 mod p
Respectively the same form before them is subtracted the back same form, can obtain about c 1, c 2..., c NSystem of linear equations:
2 ( b 11 - b 01 ) c 1 + . . . + 2 ( b 1 N - b 0 N ) c N ≡ ( Σ j = 1 N b 1 j 2 - Σ j = 1 N b 0 j 2 ) mod p · · · · · · · · · · · · 2 ( b N 1 - b ( N - 1 ) 1 ) c 1 + . . . + 2 ( b NN - b ( N - 1 ) N ) c N ≡ ( Σ j = 1 N b Nj 2 - Σ j = 1 N b ( N - 1 ) j 2 ) mod p
So can find the solution system of linear equations, can get centre coordinate C (c 1, c 2..., c N);
(3.4) user calculates w 1=f (c 1* t), w2=f (c 2* t) ..., w N=f (c N* t), wherein t is a timestamp, makes W g=(w 1, w 2..., w N);
(3.5) cross W gBe straight line L with C, under the situation of seldom seeing, if W gIdentical with C, reselect timestamp t, calculate W again g(after recomputating, because timestamp is different, one guarantees that surely these two vectors are inequality); The parametric equation of straight line L is as follows
y 1 ≡ ( w 1 + ( c 1 - w 1 ) × k ) mod p y 2 ≡ ( w 2 + ( c 2 - w 2 ) × k ) mod p · · · · · · · · · · · · y N ≡ ( w N + ( c N - w N ) × k ) mod p
Wherein k is the independent variable parameter, y 1..., y NBe dependent variable;
Getting L goes up except that W gWith any 1 M outside the C g(m 1..., m N), (y of correspondence when promptly k gets any several in the finite field gf (p) except that 0 and 1 1..., y N) value;
(3.6) user is with authentication message Meg={t, ID g, B G1, M gSend to certificate server, wherein, t is a timestamp, ID gBe the sign that representative is designated as the user identity of g down, B G1Be be stored in the file " userInfo " at sphere UC gOn a point, M gBe on the straight line L that generates more arbitrarily, in the each authentication message that generates of same user, t and M gBe different, ID gAnd B G1Always identical.
Described step (4) certificate server checking user authentication information specifically may further comprise the steps:
(4.1) certificate server is received user U gAuthentication message Meg, whether elder generation's review time stabs effective, invalid then authentification failure effectively then enters next step;
(4.2) certificate server is according to ID gReach self secret vector set compute vector
A gi=(f(ID g×S i1),f(ID g×S i2),...,f(ID g×S iN)),(i=1,...,N)
A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N, N vector added the some B in the authentication message like this G1, altogether N+1 vectorial, so certificate server can reconstruct and the sphere UC that shares of user g, utilize this N+1 vector structure N n-dimensional sphere n equation, be about to B G1, and A G1, A G2..., A GNSubstitution N n-dimensional sphere n equation:
( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 - c N ) 2 ≡ R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 ≡ R 2 mod p · · · · · · · · · · · · ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 ≡ R 2 mod p
The preceding same form with them subtracts the back same form respectively, can obtain about c 1, c 2..., c NSystem of linear equations:
2 ( a 11 - b 11 ) c 1 + . . . + 2 ( a 1 N - b 1 N ) c N ≡ ( Σ j = 1 N a 1 j 2 - Σ j = 1 N b 1 j 2 ) mod p · · · · · · · · · · · · 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N ≡ ( Σ j = 1 N a Nj 2 - Σ j = 1 N a ( N - 1 ) j 2 ) mod p
So can find the solution the centre coordinate C (c of system of linear equations 1, c 2..., c N);
(4.3) authentication server computes W g=(f (c 1* t), f (c 2* t) ..., f (c N* t), a W is crossed in reconstruct gAnd the straight line L of center C:
y 1 ≡ ( w 1 + ( c 1 - w 1 ) × k ) mod p y 2 ≡ ( w 2 + ( c 2 - w 2 ) × k ) mod p · · · · · · · · · · · · y N ≡ ( w N + ( c N - w N ) × k ) mod p ;
(4.4) certificate server check post M g(m 1..., m N) whether on straight line L, if then by authentication, otherwise authentification failure, the process of checking is as follows:
M 1..., m NEach minor of substitution linear equation is calculated respectively, obtains:
m 1 ≡ ( w 1 + ( c 1 - w 1 ) × k 1 ) mod p m 2 ≡ ( w 2 + ( c 2 - w 2 ) × k 2 ) mod p · · · · · · · · · · · · m N ≡ ( w N + ( c N - w N ) × k N ) mod p
Then have:
k 1 ≡ ( m 1 - w 1 ) × ( c 1 - w 1 ) - 1 mod p k 2 ≡ ( m 2 - w 2 ) × ( c 2 - w 2 ) - 1 mod p · · · · · · · · · · · · k N ≡ ( m N - w N ) × ( c N - w N ) - 1 mod p
If k 1=k 2=...=k N, some M then is described gOn straight line L, certificate server is accepted user identity; Otherwise some M gNot on straight line L, the subscriber authentication failure.
Action principle of the present invention is: the mathematical principle that utilizes " point on known N+1 the N dimension space that satisfies certain condition; can uniquely determine a N n-dimensional sphere n (N-sphere/hyper sphere/N ties up and justifies) ", designed a kind of identity identifying method, the respective identity authentication method that whether can the same N n-dimensional sphere n of reconstruct designs by certain secrets information comparison certificate server and user based on the N n-dimensional sphere n.
The present invention compared with prior art has following advantage and beneficial effect:
The first, the main computing that authentication method is used is to On Solving System of Linear Equations, so the step required time that three need of authentication method calculate is all very short, can apply to practical application well.
The second, certificate server does not need for each user preserves user data, the required preservation of certificate server only be N to all general secret vector of N dimension of all users: (S 11, S 12... S 1N) ..., (S N1, S N2... S NN).The certificate server end only needs to preserve seldom data and just can realize checking to a large number of users identity like this, has saved memory space greatly.
The 3rd, can effectively resist Replay Attack, because certificate server can stab the review time, thereby authentication message Meg can not reuse.
The 4th, can effectively resist and forge the authentication message attack, if the disabled user intercepts and captures authentication message Meg, also can only know point on the sphere, can't reconstruct sphere UC g, also can't know centre coordinate.If disabled user's modification time stabs, but can't construct legal some M g, also just can't forge authentication message, even intercepted and captured many authentication messages, also can't therefrom recover enough effective information reconstruct spheres, so the disabled user can't forge legal authentication message.
The 5th, can effectively resist off-line password conjecture (dictionary attack), the secret information f (PW of user self password in this authentication method g) do not expose to the open air in network, thereby it is difficult to do dictionary attack.The assailant has intercepted and captured authentication message Me simultaneously g, also can only know M gAnd B G1, can't the reconstruct sphere.Even by dictionary attack conjecture user password PW g, and then conjecture B G0, also can only know two some B on the sphere G0And B G1, still can't the reconstruct sphere.The possible value space of other point is just very big on the N n-dimensional sphere n, thus dictionary attack to the attack dynamics of the inventive method very a little less than.In each authentication message that generates, B G1Point all is identical, so even the assailant has intercepted and captured many authentication messages, can not obtain more information about sphere.
The 6th, can effectively resist the personation certificate server and attack, the process that certificate server is constructed secret sphere will be used the N dimensional vector of the linear independence of N own secret.Validated user can only be known N+1 point on the secret sphere of own institute reconstruct, and this secret sphere of authentication server computes is to utilize other N point on the sphere, adds the B that is generated by user password G0Point, the user does not know N some A of certificate server Gi(wherein i=1 ..., N), do not know that more certificate server generates N of these points secret vector, so validated user is difficult to palm off certificate server.
The 7th, can effectively resist fake user and attack, if validated user wants to pretend to be other user, can revise the user ID in the authentication message g, but can't know that the secret that other user and certificate server are shared (is other ID gThereby can't generate legal some M the center of corresponding secret sphere), g, also just can't forge authentication message, so can't pretend to be other validated user.
Description of drawings
Fig. 1 is the identity authorization system configuration diagram of the preferred embodiment of the present invention;
Fig. 2 is a view after the authentication server initialization of the preferred embodiment of the present invention;
Fig. 3 is user's 1 registration process schematic diagram of the preferred embodiment of the present invention;
Fig. 4 is user's 1 registration process authentication server calculating process schematic diagram of the preferred embodiment of the present invention;
Fig. 5 is user's 2 registration process schematic diagrames of the preferred embodiment of the present invention;
Fig. 6 is user's 2 registration process authentication server calculating process schematic diagrames of the preferred embodiment of the present invention;
Fig. 7 is the registration process authentication server operation result two-dimensional representation of the preferred embodiment of the present invention;
Fig. 8 is the user authentication process schematic diagram of the preferred embodiment of the present invention;
Fig. 9 is user authentication process user's computing schematic diagram of the preferred embodiment of the present invention;
Figure 10 is the user authentication process authentication server computing schematic diagram of the preferred embodiment of the present invention;
Figure 11 is the verification process operation result two-dimensional representation of the preferred embodiment of the present invention.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is described in further detail, but embodiments of the present invention are not limited thereto.
Embodiment
Typical identity authorization system framework as shown in Figure 1, this system comprises certificate server (CA), and user 1, user 2.Certificate server (CA), each user connect by world-wide web.
As shown in Figure 2, certificate server (CA) is set relevant parameter after initialization, wherein is the secret parameter of preserving in the solid box, and frame of broken lines is open parameter.The situation that present embodiment is chosen N=2 specifies, because in 2 dimension spaces, " 2 n-dimensional sphere n " is actual to be " circle ", so in the following description, adopts " 2 dimension circle " this term to substitute " N n-dimensional sphere n ".As 2 dimensional vector S among the figure 1And S 2Be that the secret secret vector of preserving is (so only select 2 dimensional vectors for simple declaration here, can select higher dimension vector in actual applications as secret vector), safe one-way function f and big prime number p are disclosed, and the whole process of embodiment is all carried out under finite field gf (p).
As shown in Figure 3, user U 1(CA) registers to certificate server.
PW wherein 1Be user U 1The password of self is preserved by user self is secret, and this password can be made up of letter and number, and character string can be converted to numeral.The user sends register requirement to certificate server (CA), and self password is carried out safe one-way function f computing obtains A as a result 10=(f (PW 1), f (2*PW 1)) send to certificate server (CA) as identity information.Certificate server (CA) utilizes self secret vectorial S 1, S 2And be encrypted to the encrypt file of " userInfo " by name behind the corresponding User Identity of information calculations submitted to of user, again it is sent to user U 1:
Fig. 4 shows the calculating relative users identify label calculating process that certificate server (CA) is carried out when user 1 registers:
Certificate server (CA) is user U 1Specify a unique ID 1, the representative of consumer identity.Certificate server (CA) calculates 2 vectors according to 2 that preserve secret vectors:
A 11=(f(ID 1×S 11),f(ID 1×S 12))
A 12=(f(ID 1×S 21),f(ID 1×S 22))
A 11Coordinate be designated as (a 11, a 12), A 12Coordinate be designated as (a 21, a 22), add the A that the user sends 10(be designated as (a 01, a 02)), these three vectors are formed the equation group of one 2 dimension circle, and the substitution relevant parameter gets:
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 ≡ R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 ≡ R 2 mod p ( a 21 - c 1 ) 2 + ( a 22 - c 2 ) 2 ≡ R 2 mod p
Subtract preceding Shi Kede by the back formula:
2 ( a 11 - a 01 ) c 1 + 2 ( a 12 - a 02 ) c 2 ≡ ( Σ v = 1 2 a 1 v 2 - Σ v = 1 2 a 0 v 2 ) mod p
2 ( a 21 - a 11 ) c 1 + 2 ( a 22 - a 12 ) c 2 ≡ ( Σ v = 1 2 a 2 v 2 - Σ v = 1 2 a 1 v 2 ) mod p
By finding the solution this linear equation in two unknowns group, can obtain center C (c 1, c 2), and then radius squared R 2If, can't find the solution this equation group in the computational process, then reselect user U 1ID 1, recomputate again up to can solving equation.Choose two other different some B from this 2 dimension circle at last 11, B 12(these two points are different from A 10, A 11, A 12), detailed process is as follows:
Select two pairs of quadratic residues to (e 11, d 11), (e 12, d 12) make e 11≡ d 11 2Mod p and e 12≡ d 12 2Mod p, and satisfy
e 11+e 12≡R 2?mod?p
Order
b 11≡(d 11+c 1)mod?p
b 12≡(d 12+c 2)mod?p
B 11=(b 11,b 12);
Select two pairs of quadratic residues to (e equally again 21, d 21), (e 22, d 22) make e 21≡ d 21 2Mod p and e 22≡ d 22 2Mod p, and satisfy
e 21+e 22≡R 2?mod?p
Order
b 21≡(d 21+c 1)mod?p
b 22≡(d 22+c 2)mod?p
B 12=(b 21,b 22);
At last with B 11, B 12And big prime number p, safe one-way function f all encrypt in the file, is called " userInfo ", and " userInfo " is returned to user U 1
As shown in Figure 5, user U 2(CA) registers to certificate server.This process and user U 1Registration process is the same.Be that present certificate server (CA) has used ID 1This ID must reselect other ID and compose the U to the user 2
As shown in Figure 6, certificate server (CA) is at user U 2The calculating process that is carried out when registering.This process is consistent with Fig. 4 calculating process, is user U this moment 2The ID that uses is ID 2
As shown in Figure 7, certificate server (CA) is at user U 1, user U 2Registration back operation result 2 dimension schematic diagrames.Wherein 2 tie up circle UC 1Be user U 1Utilizing self provides password information A 10And the secret vectorial S of certificate server (CA) 1, S 2(utilize ID 1Carry out computing and obtain A 11, A 12) structure, B 11, B 12Be two other different point that certificate server (CA) is selected, deposit in the encrypt file " userInfo ", self take care of by user 1; 2 dimension circle UC 2Be user U 2Utilizing self provides password information A 20And the secret vectorial S of certificate server (CA) 1, S 2(utilize ID 2Carry out computing and obtain A 21, A 22) structure, B 21, B 22Two other the different point that is certificate server (CA) selection is as user U 2The identity sign.Because user U 1, user U 2The ID difference, certificate server (CA) construct 2 the dimension fenestras be not the same, can increase the fail safe of whole identity authorization system thus.
Fig. 8 is user U 1Process schematic diagram to certificate server (CA) request authentication.User U wherein 1Calculate earlier, utilize the identify label that self password and encrypt file " userInfo " contain to re-construct 2 dimension circles, again with information B 11, M 1, timestamp t and self ID 1Send to certificate server (CA).Certificate server (CA) at first the review time stab t whether in tolerance interval, if exceed the time qualified authentication failure of just thinking, as t effectively then certificate server (CA) utilize B 11Also re-construct sphere with self secret vector, and check M 1Whether correct, whether the checking that determines one's identity thus is successful.
As shown in Figure 9, user U 1Process schematic diagram to certificate server (CA) request authentication user self computing.User U 1Utilize self password PW 1Calculate A 10, note A 10=(f (PW 1), f (2*PW 1))=(a 01, a 02) and " userInfo " in B 1(b 11, b 12), B 12(b 21, b 22) three points are formed the equation group of 2 dimension circles, and the substitution relevant parameter gets:
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 ≡ R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 ≡ R 2 mod p ( b 21 - c 1 ) 2 + ( b 22 - c 2 ) 2 ≡ R 2 mod p
Subtract preceding Shi Kede by the back formula:
2 ( b 11 - a 01 ) c 1 + 2 ( b 12 - a 02 ) c 2 ≡ ( Σ v = 1 2 b 1 v 2 - Σ v = 1 2 a 0 v 2 ) mod p
2 ( b 21 - b 11 ) c 1 + 2 ( b 22 - b 12 ) c 2 ≡ ( Σ v = 1 2 b 2 v 2 - Σ v = 1 2 b 1 v 2 ) mod p
By finding the solution this linear equation in two unknowns group, can obtain center C (c 1, c 2), and then obtain radius squared R 2User U 1Select a timestamp t again, and calculate W 1, W wherein 1(w 1, w 2)=(f (c 1* f (c t), 2* t)).The user crosses W then 1, C makes straight line L, detailed process is as follows:
y 1 ≡ ( w 1 + ( c 1 - w 1 ) × k ) mod p y 2 ≡ ( w 2 + ( c 2 - w 2 ) × k ) mod p
Wherein k is an independent variable, y 1, y 2Be dependent variable, and on straight line L, select wherein to be different from C, W 1A bit be designated as M 1(m 1, m 2).End user is Meg={t, ID 1, B 11, M 1Send to certificate server (CA) as authentication information, accept the checking of certificate server (CA), and etc. result to be verified.
As shown in figure 10, the process schematic diagram of user 1 certificate server (CA) self computing when certificate server request authentication.Certificate server (CA) checks that at first the user sends the timestamp t of authentication information, if overtime then authentication failed, otherwise would continue down checking.Certificate server (CA) utilizes self secret vectorial S 1, S 2And ID 1Computing obtains A 11, A 12:
A 11(a 11,a 12)=(f(S 11*ID 1),f(S 12*ID 1))
A 12(a 21,a 22)=(f(S 21*ID 1),f(S 22*ID 1))
Add the B that the user sends 11, these three points can be formed one 2 dimension equation of a circle group again, and with the parameter substitution wherein
( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 ≡ R 2 mod p ( a 21 - c 1 ) 2 + ( a 22 - c 2 ) 2 ≡ R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 ≡ R 2 mod p
Subtract preceding formula by the back formula and can obtain a linear equation in two unknowns group
2 ( a 21 - a 11 ) c 1 + 2 ( a 22 - a 12 ) c 2 ≡ ( Σ v = 1 2 a 2 v 2 - Σ v = 1 2 a 1 v 2 ) mod p
2 ( b 11 - a 21 ) c 1 + 2 ( b 12 - a 22 ) c 2 ≡ ( Σ v = 1 2 b 1 v 2 - Σ v = 1 2 a 2 v 2 ) mod p
Can obtain center C (c by finding the solution this linear equation in two unknowns group 1, c 2), and then obtain radius squared R 2Certificate server (CA) is obtained W again 1, W 1(w 1, w 2)=(f (c 1* f (c t), 2* t)), wherein t is the timestamp in the user authentication information, crosses C, W then 1Make straight line L, and checking user U 1The M that sends 1On straight line, verification method is as follows for point:
k 1 ≡ ( ( m 1 - w 1 ) × ( c 1 - w 1 ) - 1 ) mod p k 2 ≡ ( ( m 2 - w 2 ) × ( c 2 - w 2 ) - 1 ) mod p
If K 1Equal K 2, M then 1On straight line L, thus the authentication success; If K 1Be not equal to K 2, M then 1Not on straight line L, thus the authentication failure.
As shown in figure 11, user 1 is to certificate server request authentication operation result two-dimensional representation.User U 1Utilize self information structure 2 dimension circles, obtained center C and W 1Straight line, and on this straight line, select arbitrarily a some M 1If certificate server (CA) utilizes corresponding information also can construct same 2 dimension circles, and utilizes user U 1The correct information that provides just can be verified M 1With sphere centre C and W 1Cross same straight line L, can judge user U thus 1Identity.Simultaneously because W 1Be to change in time, so in the t ' time, the user will construct other straight line L ', promptly the straight line of constructing in the each authentication process itself of user all can be inequality, so just more can improve security of system.
The foregoing description is a preferred implementation of the present invention; but embodiments of the present invention are not limited by the examples; other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; all should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (6)

1, a kind of identity identifying method based on the N n-dimensional sphere n may further comprise the steps:
(1) certificate server initialization: certificate server is selected finite field gf (p) and safe one-way function f, selects some secret vectors simultaneously; Wherein GF (p) has determined the finite field at group computing place, and promptly all group's calculating processes all carry out in finite field gf (p), and p is a big prime number;
(2) user's registration: the user is according to self selected password PW gCalculate a vector by safety one-way function f and submit to certificate server, certificate server is checked user identity, for the user specifies an ID gAs the sign of user identity, the sign of each user identity has nothing in common with each other; Vectorial unique definite N n-dimensional sphere n that certificate server is submitted in conjunction with self secret vector sum user, if can not construct such N n-dimensional sphere n, then the certificate server sign of reselecting this user identity is calculated again; The point some inequality that last certificate server will be selected at this N n-dimensional sphere n at random by safe lane, and with the sign ID of user identity g, big prime number p and safe one-way function f form encrypt file and pass to the user;
(3) user generates authentication information: the encrypt file that when the user needs certificate server to discern its identity, utilizes certificate server to pass back, and in conjunction with self selected password PW g, re-construct a N n-dimensional sphere n, select geometric properties on this N n-dimensional sphere n to pass to certificate server simultaneously and verify as authentication information;
(4) certificate server checking user authentication information: the authentication information that certificate server is accepted the user utilizes the secret vector of self to re-construct a N n-dimensional sphere n simultaneously, and calculate geometric properties on the N n-dimensional sphere n that the user arranges to use, authentication information with result of calculation and user's submission compares at last, if identical then accept user identity, otherwise refusing user's identity.
2, a kind of identity identifying method based on the N n-dimensional sphere n according to claim 1 is characterized in that: described step (1) certificate server initialization specifically may further comprise the steps:
(1.1) certificate server is selected safe one-way function f, and certain big prime number p is open with it behind selected f of certificate server and the p;
(1.2) the N dimensional vector of secret selected N the linear independence of certificate server: (S 11, S 12... S 1N) ..., (S N1, S N2... S NN), S wherein KlIn finite field gf (p), select at random, k=1 ..., N, l=1 ..., N; The open N value of certificate server, but this N N dimensional vector can only preserve by certificate server is secret, and in case selected with regard to no longer change.
3, a kind of identity identifying method according to claim 2 based on the N n-dimensional sphere n, it is characterized in that: described big prime number satisfies p=8n+3, and n is a certain positive integer.
4, a kind of identity identifying method based on the N n-dimensional sphere n according to claim 1 is characterized in that: described step (2) user registration specifically may further comprise the steps:
(2.1) user U gSelected password PW g, U wherein gBe the user who is designated as g down, PW gBe the user U that is designated as g down gSelected password, this password is made up of letter and number, because of character string can be converted to numeral, the PW of the following stated gBe meant the later integer of conversion, below all calculating of each step all in finite field gf (p), carry out;
User's compute vector A G0=(f (PW g), f (2 * PW g) ..., f (N * PW g)) and pass to certificate server;
(2.2) certificate server is specified a unique IDg for this user, and calculates N n-dimensional sphere n equation:
(a) certificate server calculates N vector according to self secret N N dimensional vector of preserving:
A g 1 = ( f ( ID g × S 11 ) , f ( ID g × S 12 ) , . . . , f ( ID g × S 1 N ) ) · · · · A gN = ( f ( ID g × S N 1 ) , f ( ID g × S N 2 ) , . . . , f ( ID g × S NN ) )
(b) A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N, add the A that the user transmits G0, A G0Coordinate is designated as (a 01, a 02..., a 0N), utilize N+1 vectorial A G0, A G1..., A GNStructure N n-dimensional sphere n equation, the substitution spherical equation:
(x 1-c 1) 2+(x 2-c 2) 2+...+(x N-c N) 2=R 2
(c wherein 1, c 2..., c N) be the center of N n-dimensional sphere n, R is the radius of this N n-dimensional sphere n, (x 1, x 2..., x N) be arbitrfary point on the sphere;
:
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 + . . . + ( a 0 N - c N ) 2 ≡ R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 ≡ R 2 mod p · · · · · · · · · · · · ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 ≡ R 2 mod p
Respectively the same form before them is subtracted the back same form then, obtain about c 1, c 2..., c NSystem of linear equations:
2 ( a 11 - a 01 ) c 1 + . . . + 2 ( a 1 N - a 0 N ) c N ≡ ( Σ j = 1 N a 1 j 2 - Σ j = 1 N a 0 j 2 ) mod p · · · · · · · · · · · · 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N ≡ ( Σ j = 1 N a Nj 2 - Σ j = 1 N a ( N - 1 ) j 2 ) mod p
If in computational process, the coefficient matrix determinant of equation group is zero, then reselects ID gCalculate, guarantee the unique center C (c that determines this sphere of equation group like this 1, c 2..., c N); Then obtain R 2Then just according to c 1, c 2..., c NAnd R 2Determine spherical equation, definite spherical equation is exactly to be designated as the user of g and the secret sphere UC that certificate server is shared down g, establish this equation and be:
(x 1-c 1) 2+(x 2-c 2) 2+...+(x n-c n) 2≡R 2mod?p
(2.3) certificate server is selected secret sphere UC at random gGo up and remove A G0And A GiN in addition some B Gi, B Gi=(b I1, b I2..., b IN); B GiEach coordinate components all in finite field gf (p), look for B GiEach coordinate specifically find the solution as follows:
(A) find the N-2 number to being that quadratic residue is to (e Iq, d Iq), make e Iq≡ d Iq 2Mod p, wherein q=1 ..., N-2, e Iq, d IqBe to satisfy e in the finite field gf (p) Iq≡ d Iq 2Any two integers of mod p condition, and satisfy
b i1≡(d i1+c 1)mod?p
b i2≡(d i2+c 2)mod?p
b i(N-2)≡(d i(N-2)+c N-2)mod?p
(B) select two pairs of quadratic residues to (e again Iz, d Iz), make e Iz≡ d Iz 2Mod p, wherein z=N-1, N, e Iz, d IzBe to satisfy e in the finite field gf (p) Iz≡ d Iz 2Any two integers of mod p condition, and satisfy
e i ( N - 1 ) + e iN ≡ ( R 2 - Σ y = 1 N - 2 e iy ) mod p
Order
b i(N-1)≡(d i(N-1)+c N-1)mod?p
b iN≡(d iN+c N)mod?p
Above-mentioned steps (A) and step (B) are N 〉=3 o'clock suitable situations, then directly use step (B) when N=2;
Repeat N time and calculate, obtain N B GiPoint is verified after each the calculating, guarantees that N the point that obtains is mutually different;
(2.4) certificate server is p, f, ID g, and B G1, B G2..., B GNPreserve hereof and send to the user with the form of encrypting, cryptographic algorithm is to use existing secure cryptographic algorithm, and the user preserves the file after the encryption, and the user imports the PIN code declassified document and obtains information needed, and we claim this encrypt file to be " userInfo ".
5, a kind of identity identifying method according to claim 1 based on the N n-dimensional sphere n, it is characterized in that: described step (3) user generates authentication information, specifically may further comprise the steps:
(3.1) be designated as the encrypt file that contains the information of succeeding in registration " userInfo " of the user Ug input PIN code decrypted authentication server transmission of g under, obtain p, f, ID g, and B G1, B G2..., B GN
(3.2) user is at client input self password PW g, calculate B G0=(f (PW g), f (2 * PW g) ..., f (N * PW g));
(3.3) user is according to B G0Add the N point B of storage in the file " userInfo " G1, B G2..., B GN, N+1 point utilizes this N+1 vector structure N n-dimensional sphere n equation altogether, reconstructs original secret sphere UC gBe about to B G0And B G1, B G2..., B GNSubstitution N n-dimensional sphere n equation gets equation group:
( b 01 - c 1 ) 2 + ( b 02 - c 2 ) 2 + . . . + ( b 0 N - c N ) 2 ≡ R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 N - c N ) 2 ≡ R 2 mod p · · · · · · · · · · · · ( b N 1 - c 1 ) 2 + ( b N 2 - c 2 ) 2 + . . . + ( b NN - c N ) 2 ≡ R 2 mod p
Respectively the same form before them is subtracted the back same form, obtain about c 1, c 2..., c NSystem of linear equations:
2 ( b 11 - b 01 ) c 1 + . . . + 2 ( b 1 N - b 0 N ) c N ≡ ( Σ j = 1 N b 1 j 2 - Σ j = 1 N b 0 j 2 ) mod p · · · · · · · · · · · · 2 ( b N 1 - b ( N - 1 ) 1 ) c 1 + . . . + 2 ( b NN - b ( N - 1 ) N ) c N ≡ ( Σ j = 1 N b Nj 2 - Σ j = 1 N b ( N - 1 ) j 2 ) mod p
Promptly get centre coordinate C (c so find the solution system of linear equations 1, c 2..., c N);
(3.4) user calculates w 1=f (c 1* t), w2=f (c 2* t) ..., w N=f (c N* t), wherein t is a timestamp, makes W g=(w 1, w 2..., w N);
(3.5) cross W gBe straight line L with C, under the situation of seldom seeing, if W gIdentical with C, reselect timestamp t, calculate W again gThe parametric equation of straight line L is as follows:
y 1 ≡ ( w 1 + ( c 1 - w 1 ) × k ) mod p y 2 ≡ ( w 2 + ( c 2 - w 2 ) × k ) mod p · · · · · · · · · · · · y N ≡ ( w N + ( c N - w N ) × k ) mod p
Wherein k is the independent variable parameter, y 1..., y NBe dependent variable;
Get upward any 1 M except that Wg and C of L g(m 1..., m N), (y of correspondence when promptly k gets any several in the finite field gf (p) except that 0 and 1 1..., y N) value;
(3.6) user is with authentication message Meg={t, ID g, B G1, M gSend to certificate server, wherein, t is a timestamp, ID gBe the sign that representative is designated as the user identity of g down, B G1Be be stored in the file " userInfo " at N n-dimensional sphere n UC gOn a point, M gBe on the straight line L that generates more arbitrarily, in the each authentication message that generates of same user, t and M gBe different, ID gAnd B G1Always identical.
6, a kind of identity identifying method based on the N n-dimensional sphere n according to claim 1 is characterized in that: described step (4) certificate server checking user authentication information specifically may further comprise the steps:
(4.1) certificate server is received user U gAuthentication message Meg, whether elder generation's review time stabs effective, invalid then authentification failure effectively then enters next step;
(4.2) certificate server is according to ID gReach self secret vector set compute vector
A gi=(f(ID g×S i1),f(ID g×S i2),...,f(ID g×S in))
A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N, N vector added the some B in the authentication message like this G1, altogether N+1 vectorial, so certificate server can reconstruct and the sphere UC that shares of user g, utilize this N+1 vector structure N n-dimensional sphere n equation, be about to B G1, A G1, A G2..., A GNSubstitution N n-dimensional sphere n equation:
( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 N - c N ) 2 ≡ R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 ≡ R 2 mod p · · · · · · · · · · · · ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 ≡ R 2 mod p
The preceding same form with them subtracts the back same form respectively, obtains about c 1, c 2..., c NSystem of linear equations:
2 ( a 11 - b 11 ) c 1 + . . . + 2 ( a 1 N - b 1 N ) c N ≡ ( Σ j = 1 N a 1 j 2 - Σ j = 1 N b 1 j 2 ) mod p · · · · · · · · · · · · 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N ≡ ( Σ j = 1 N a Nj 2 - Σ j = 1 N a ( N - 1 ) j 2 ) mod p
So find the solution the centre coordinate C (c of system of linear equations 1, c 2..., c N);
(4.3) authentication server computes W g=(f (c 1* t), f (c 2* t) ..., f (c N* t), a W is crossed in reconstruct gAnd the straight line L of center C:
y 1 ≡ ( w 1 + ( c 1 - w 1 ) × k ) mod p y 2 ≡ ( w 2 + ( c 2 - w 2 ) × k ) mod p · · · · · · · · · · · · y N ≡ ( w N + ( c N - w N ) × k ) mod p ;
(4.4) certificate server check post M g(m 1..., m N) whether on straight line L, if then by authentication, otherwise authentification failure, the process of checking is as follows:
M 1..., m NEach minor of substitution linear equation is calculated respectively, obtains:
m 1 ≡ ( w 1 + ( c 1 - w 1 ) × k 1 ) mod p m 2 ≡ ( w 2 + ( c 2 - w 2 ) × k 2 ) mod p · · · · · · · · · · · · m N ≡ ( w N + ( c N - w N ) × k N ) mod p
Then have:
k 1 ≡ ( m 1 - w 1 ) × ( c 1 - w 1 ) - 1 mod p k 2 ≡ ( m 2 - w 2 ) × ( c 2 - w 2 ) - 1 mod p · · · · · · · · · · · · k N ≡ ( m N - w N ) × ( c N - w N ) - 1 mod p
If k 1=k 2=...=k N, some M then is described gOn straight line L, certificate server is accepted user identity; Otherwise some M gNot on straight line L, the subscriber authentication failure.
CN2009100382490A 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere Expired - Fee Related CN101510875B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2009100382490A CN101510875B (en) 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere
PCT/CN2009/071395 WO2010108335A1 (en) 2009-03-27 2009-04-22 Identity authentication method based on n-dimensional sphere

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100382490A CN101510875B (en) 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere

Publications (2)

Publication Number Publication Date
CN101510875A true CN101510875A (en) 2009-08-19
CN101510875B CN101510875B (en) 2012-02-22

Family

ID=41003139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100382490A Expired - Fee Related CN101510875B (en) 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere

Country Status (2)

Country Link
CN (1) CN101510875B (en)
WO (1) WO2010108335A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753295B (en) * 2009-12-24 2011-09-14 华南理工大学 Group key management method based on linear geometry
CN104639321A (en) * 2013-11-12 2015-05-20 中国移动通信集团公司 Authentication method, device and system
CN114978537A (en) * 2022-05-16 2022-08-30 中国人民解放军国防科技大学 Identity recognition method, device, equipment and computer readable storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9069932B2 (en) 2012-07-06 2015-06-30 Blackberry Limited User-rotatable three-dimensionally rendered object for unlocking a computing device
US10505924B1 (en) 2016-12-09 2019-12-10 Wells Fargo Bank, N.A. Defined zone of authentication

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6978036B2 (en) * 1998-07-31 2005-12-20 Digimarc Corporation Tamper-resistant authentication techniques for identification documents
FR2809556B1 (en) * 2000-05-24 2002-07-12 Jean Luc Berthelot METHOD FOR GENERATING AN ELECTRONIC SIGNATURE LINKED TO AN AUTHENTIC ACT AND AUTHENTICATION METHOD
JP3525104B2 (en) * 2000-09-01 2004-05-10 日本電信電話株式会社 Authentication method, apparatus and program recording medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753295B (en) * 2009-12-24 2011-09-14 华南理工大学 Group key management method based on linear geometry
CN104639321A (en) * 2013-11-12 2015-05-20 中国移动通信集团公司 Authentication method, device and system
CN104639321B (en) * 2013-11-12 2018-03-23 中国移动通信集团公司 A kind of identity identifying method, equipment and system
CN114978537A (en) * 2022-05-16 2022-08-30 中国人民解放军国防科技大学 Identity recognition method, device, equipment and computer readable storage medium
CN114978537B (en) * 2022-05-16 2024-02-13 中国人民解放军国防科技大学 Identity recognition method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
WO2010108335A1 (en) 2010-09-30
CN101510875B (en) 2012-02-22

Similar Documents

Publication Publication Date Title
Jiang et al. Three-factor authentication protocol using physical unclonable function for IoV
EP3069249B1 (en) Authenticatable device
US11824991B2 (en) Securing transactions with a blockchain network
Gunasinghe et al. PrivBioMTAuth: Privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones
Tams et al. Security considerations in minutiae-based fuzzy vaults
Kim et al. Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
EP3374913A1 (en) Public/private key biometric authentication system
JPWO2003069489A1 (en) Identification method
Zhu et al. Efficient and privacy-preserving online fingerprint authentication scheme over outsourced data
Qureshi et al. SeVEP: Secure and verifiable electronic polling system
Sarier Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management
CN109981290A (en) The communication system and method close based on no certificate label under a kind of intelligent medical environment
CN101510875B (en) Identification authentication method based on N-dimension sphere
Nguyen et al. Privacy preserving biometric‐based remote authentication with secure processing unit on untrusted server
Gope et al. A comparative study of design paradigms for PUF-based security protocols for IoT devices: Current progress, challenges, and future expectation
Gupta et al. User anonymity-based secure authentication protocol for telemedical server systems
Wu et al. A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
Meshram et al. An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
Han et al. A novel hybrid crypto-biometric authentication scheme for ATM based banking applications
Zahednejad et al. A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics
Itakura et al. Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures
Kardaş et al. k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions
Narasimhan et al. Bio‐PUF‐MAC authenticated encryption for iris biometrics
Wang et al. Privacy‐Preserving Fingerprint Authentication Using D‐H Key Exchange and Secret Sharing
Xu et al. An efficient double-offloading biometric authentication scheme based on blockchain for cross domain environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120222

Termination date: 20180327