CN101510875B - Identification authentication method based on N-dimension sphere - Google Patents

Identification authentication method based on N-dimension sphere Download PDF

Info

Publication number
CN101510875B
CN101510875B CN2009100382490A CN200910038249A CN101510875B CN 101510875 B CN101510875 B CN 101510875B CN 2009100382490 A CN2009100382490 A CN 2009100382490A CN 200910038249 A CN200910038249 A CN 200910038249A CN 101510875 B CN101510875 B CN 101510875B
Authority
CN
China
Prior art keywords
user
mod
certificate server
equiv
sphere
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN2009100382490A
Other languages
Chinese (zh)
Other versions
CN101510875A (en
Inventor
唐韶华
张华�
卢伯荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
South China University of Technology SCUT
Original Assignee
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by South China University of Technology SCUT filed Critical South China University of Technology SCUT
Priority to CN2009100382490A priority Critical patent/CN101510875B/en
Priority to PCT/CN2009/071395 priority patent/WO2010108335A1/en
Publication of CN101510875A publication Critical patent/CN101510875A/en
Application granted granted Critical
Publication of CN101510875B publication Critical patent/CN101510875B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Collating Specific Patterns (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an identity authentication method based on an N-dimensional spherical surface, which comprises: an authentication server receives registration and identity authentication of users after being initialized; when a new user registers, the user calculates a vector by a safe one-way function according to passwords selected and submits the vector to the authentication server; the authentication server specifies an ID<g> for the user as the identification of the identity of the user; the authentication server combines a self secrete vector with the vector submitted by the user to determine the N-dimensional spherical surface; the authentication server randomly selects a plurality of different points on the N-dimensional spherical surface to form an encrypted file which is sent to the user through a safe channel; when the user requires identity authentication, the passwords and the encrypted file containing identity identification are utilized to calculate; the result of calculation is sent to the authentication server; and the authentication server checks and determines whether to accept the identity of the user after calculation. The method can effectively reduce the stored information and calculation load of the authentication server and prevent imitating the authentication server.

Description

A kind of identity identifying method based on the N n-dimensional sphere n
Technical field
The present invention relates to the identity identifying method in computer system security and the network security, specifically relate to a kind of identity identifying method based on the N n-dimensional sphere n.
Background technology
Along with the development of online transaction and ecommerce, E-Government, the network crime that emerges in an endless stream caused the trust crisis of people to network identity, so authentication becomes more and more important.Identity identifying technology can combine the operation flow of enterprise, government closely, stops the unauthorized access to valuable source.We can say that also authentication is the basis of whole information security system.Identity identifying method relatively more commonly used at present has: password, dynamic password, smart card authentication, Public Key Infrastructure(PKI), biological identification etc.
The basic thought of password authentication is that each user has an identify label (ID) and password, and when the user wanted to get into system, he must provide its ID and password, the legitimacy that system just can inspection user.So password authentication has characteristics such as cheap, easy realization, user interface close friend.But the authentication that is based on password is easy to be stolen, and intensity often also is difficult to resist password conjecture, but also might receive Replay Attack etc.
The dynamic password technology be a kind of let user cipher according to time or access times constantly change, each password can only expendable technology.It adopts a kind of specialized hardware that is called dynamic token, and built-in power, password generate chip and display screen, and password generates the special cryptographic algorithm of chip operation, generates current password and is presented on the display screen according to current time or access times.Certificate server adopts the identical current valid password of algorithm computation.When using, the user only need the current password input client computer that show on the dynamic token can be realized authentication.Because each password that uses must be produced by dynamic token, has only validated user just to hold this hardware, as long as just can think that through password authentification this user's identity is reliable.And the each password that uses of user is all inequality, even the hacker has intercepted and captured password one time, also can't utilize this password to come the identity of counterfeit validated user.Though yet dynamic password has solved the problem of fail safe, its cost is higher.
Smart card is a kind of chip of built-in integrated circuit, has the data relevant with user identity in the chip, and smart card through special device fabrication, is not reproducible hardware by special manufacturer.Smart card is carried by validated user, must smart card be inserted special-purpose card reader during login and read information wherein, with checking user's identity.Smart card authentication can be by not counterfeit through the not reproducible user identity that guarantees of smart card hardware.Yet, still be easy to be truncated to user's authentication information through technology such as internal memory scanning or network monitorings, so still have potential safety hazard because the data that from smart card, read are static at every turn.
Public Key Infrastructure(PKI) adopts the digital certificate management PKI, bundles user's PKI and user's identification information through third-party trust authority authentication authorization and accounting center (CA).As if as an infrastructure, PKI can solve most network security problems, and begin to take shape a cover total solution and a theory.Yet because problems such as PKI system complexity and cost in the use make it in the application of reality, run into a lot of problems.
Biological identification mainly is meant a kind of technology through biological character for identity authentication such as measurable health or behaviors.Biological characteristic is meant unique physiological characteristic or the behavior that can measure or can discern automatically and verify.Biological characteristic is divided into two types of physical trait and behavioural characteristics.Physical trait comprises: the blood vessel of fingerprint, palm type, retina, iris, human scent, shape of face, hand and DNA etc.; Behavioural characteristic comprises: handwritten signature, voice, walking step state etc.The biological identification technology has traditional incomparable advantage of authentication means.Password can remembered and be provided with to employing biological identification technology again, uses conveniently, but high cost, complicated technology have hindered its promotion and application.
Summary of the invention
The objective of the invention is to overcome the shortcoming and defect of prior art; Utilize the mathematical principle of " point on known N+1 the N dimension space that satisfies certain condition; can uniquely confirm a N n-dimensional sphere n (N-sphere/hyper sphere/N ties up and justifies) "; A kind of identity identifying method based on the N n-dimensional sphere n is provided, whether can have carried out authentication by the same N n-dimensional sphere n of reconstruct through certain secrets information comparison certificate server and user.The N n-dimensional sphere n be common sphere in the popularization of dimension arbitrarily, special, be called circle at 2 dimension spaces, 3 dimension spaces are called sphere, the above space of 4 dimensions is called hypersphere.This method can reduce server info memory space, server and user's amount of calculation effectively, and this method not to be difficult to resolve problem with certain mathematics be theoretical foundation, thereby effectively avoided the possibility that is broken owing to the proposition that solves mathematics difficult problem new method.
The object of the invention is realized through following technical proposals: a kind of identity identifying method based on the N n-dimensional sphere n may further comprise the steps:
(1) certificate server initialization: certificate server is selected finite field gf (p) and safe one-way function f, selects some secret vectors simultaneously; Wherein GF (p) has confirmed the finite field at group computing place, and promptly all group's calculating processes all carry out in finite field gf (p), and p is a big prime number;
(2) user's registration: the user is according to self selected password PW gCalculate a vector through safety one-way function f and submit to certificate server, certificate server inspection user identity is for the user specifies an ID gAs the sign of user identity, the sign of each user identity has nothing in common with each other; Vectorial unique definite N n-dimensional sphere n that certificate server combines the secret vector sum user of self to submit to, if can not construct such N n-dimensional sphere n, then the certificate server sign of reselecting this user identity is calculated again; The point some inequality that certificate server will be selected at this N n-dimensional sphere n through safe lane at random, and and ID g, big prime number p and safe one-way function f form encrypt file and pass to the user;
(3) user generates authentication information: the encrypt file that when the user needs its identity of certificate server identification, can utilize certificate server to pass back, and combine self selected password PW g, construct a N n-dimensional sphere n again, select geometric properties on this N n-dimensional sphere n to pass to certificate server simultaneously and verify as authentication information;
(4) certificate server checking user authentication information: the authentication information that certificate server is accepted the user utilizes the secret vector of self to construct a N n-dimensional sphere n again simultaneously; And calculate the geometric properties of the N n-dimensional sphere n that the user arranges to use; Authentication information with result of calculation and user's submission compares at last; If identical then accept user identity, otherwise refusing user's identity.
For realizing the present invention better, said step (1) certificate server initialization specifically may further comprise the steps:
(1.1) certificate server is selected safe one-way function f, and certain big prime number p is open with it behind selected f of certificate server and the p;
(1.2) secret selected N the N dimensional vector (being linear independence between each vector) of certificate server: (S 11, S 12... S 1N) ..., (S N1, S N2... S NN), S wherein KlIn finite field gf (p), select at random, k=1 ..., N, l=1 ..., N; Certificate server can disclose the N value, but this N N dimensional vector can only preserve by certificate server is secret, and in case selectedly just no longer change.
Preferably: said big prime number satisfies p=8n+3, and n is a certain positive integer, step 2.3 is sought in finite field gf (p) removed A G0And A GiThe quadratic residue of any N point in addition is to easier, and computing is more convenient.
Said step (2) user registration specifically may further comprise the steps:
(2.1) user U gSelected password PW g, U wherein gBe the user who is designated as g down, PW gBe the user U that is designated as g down gSelected password, this password can be made up of letter and number, because of character string can convert numeral into, the PW of the following stated gBe meant the later integer of conversion, below all calculating of each step all in finite field gf (p), carry out;
User's compute vector A G0=(f (PW g), f (2 * PW g) ..., f (N * PW g)) and pass to certificate server;
(2.2) certificate server is specified a unique ID for this user g, and calculate N n-dimensional sphere n equation:
(a) certificate server calculates N vector according to self secret N N dimensional vector of preserving:
A g 1 = ( f ( ID g &times; S 11 ) , f ( ID g &times; S 12 ) , . . . , f ( ID g &times; S 1 N ) ) &CenterDot; &CenterDot; &CenterDot; &CenterDot; A gn = ( f ( ID g &times; S N 1 ) , f ( ID g &times; S N 2 ) , . . . , f ( ID g &times; S NN ) )
(b) A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N; A G0Coordinate is designated as (a 01, a 02..., a 0N).This N+1 vectorial A G0, A G1..., A GNStructure N n-dimensional sphere n equation
(x 1-c 1) 2+(x 2-c 2) 2+...+(x N-c N) 2=R 2 (1)
(c wherein 1, c 2..., c N) be the center of N n-dimensional sphere n, R is the radius of this N n-dimensional sphere n, (x 1, x 2..., x N) be arbitrfary point on the sphere;
(c) certificate server gets equation group (2) with the N+1 that tries to achieve a vectorial substitution equation (1)
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 + . . . + ( a 0 N - c N ) 2 &equiv; R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 &equiv; R 2 mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 &equiv; R 2 mod p - - - ( 2 )
Respectively the same form before them is subtracted the back same form, can obtain about c 1, c 2..., c NSystem of linear equations (3):
2 ( a 11 - a 01 ) c 1 + . . . + 2 ( a 1 N - a 0 N ) c N &equiv; ( &Sigma; j = 1 N a 1 j 2 - &Sigma; j = 1 N a 0 j 2 ) mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N &equiv; ( &Sigma; j = 1 N a Nj 2 - &Sigma; j = 1 N a ( N - 1 ) j 2 ) mod p - - - ( 3 )
If in computational process, the coefficient matrix determinant of equation group (3) is zero, then reselects ID gCalculate, guarantee the unique center C (c that confirms this sphere of equation like this 1, c 2..., c N); Again any formula of this centre coordinate substitution equation group (2) is calculated, can be obtained R 2Then c 1, c 2..., c NAnd R 2Substitution equation (1) is so the equation of this sphere just can confirm that this equation is exactly to be designated as the user of g and the secret sphere UC that certificate server is shared down g, establish this equation and be:
(x 1-c 1) 2+(x 2-c 2) 2+...+(x N-c N) 2≡R 2modp
(2.3) certificate server is selected secret sphere UC at random gGo up and remove A G0And A GiN in addition some B Gi, B Gi=(b I1, b I2..., b IN), wherein i=1 ..., N; B GiEach coordinate components all in finite field gf (p), look for B GiEach coordinate specifically find the solution as follows:
(A) find the N-2 number to being that quadratic residue is to (e Iq, d Iq), make e Iq≡ d Iq 2Modp, wherein q=1 ..., N-2, e Iq, d IqBe to satisfy e in the finite field gf (p) Iq≡ d Iq 2Any two integers of modp condition, and satisfy
b i1≡(d i1+c 1)modp
b i2≡(d i2+c 2)modp
……
b i(N-2)≡(d i(N-2)+c N-2)modp
(B) select two pairs of quadratic residues to (e again Iz, d Iz), make e Iz≡ d Iz 2Modp, wherein z=N-1, N, e Iz, d IzBe to satisfy e in the finite field gf (p) Iz≡ d Iz 2Any two integers of modp condition, and satisfy
e i ( N - 1 ) + e iN &equiv; ( R 2 - &Sigma; y = 1 N - 2 e iy ) mod p
Order
b i(N-1)≡(d i(N-1)+c N-1)modp
b iN≡(d iN+c N)modp
Above-mentioned steps (A) and (B) be the situation that N>=3 o'clock are suitable for is then directly used step (B) when N=2; Repeat N time and calculate, can obtain N B GiPoint is verified after each the calculating, guarantees that N the point that obtains is mutually different;
(2.4) certificate server is p, f, ID g, and B G1, B G2...,, B GNThe user is preserved hereof and sent to form to encrypt; AES can use existing secure cryptographic algorithm, and like AES etc., the user preserves the file after the encryption; But the user imports the PIN code declassified document and obtains information needed, and below we claim that this encrypt file is for " userInfo ".
Said step (3) user generates authentication information, specifically may further comprise the steps:
(3.1) be designated as the user U of g under gThe encrypt file that contains the information of succeeding in registration " userInfo " of input PIN code decrypted authentication server transmission obtains p, f, ID g, and B G1, B G2..., B GN
(3.2) user is at client input self password PW g, can calculate B G0=(f (PW g), f (2 * PW g) ..., f (N * PW g));
(3.3) user is according to B G0Add the N point B of storage in the file " userInfo " G1, B G2..., B GN, N+1 point utilizes this N+1 vector structure N n-dimensional sphere n equation altogether, can reconstruct original secret sphere UC gBe about to B G0And B G1, B G2..., B GNSubstitution N n-dimensional sphere n equation gets equation group:
( b 01 - c 1 ) 2 + ( b 02 - c 2 ) 2 + . . . + ( b 0 N - c N ) 2 &equiv; R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 N - c N ) 2 &equiv; R 2 mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; ( b N 1 - c 1 ) 2 + ( b N 2 - c 2 ) 2 + . . . + ( b NN - c N ) 2 &equiv; R 2 mod p
Respectively the same form before them is subtracted the back same form, can obtain about c 1, c 2..., c NSystem of linear equations:
2 ( b 11 - b 01 ) c 1 + . . . + 2 ( b 1 N - b 0 N ) c N &equiv; ( &Sigma; j = 1 N b 1 j 2 - &Sigma; j = 1 N b 0 j 2 ) mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; 2 ( b N 1 - b ( N - 1 ) 1 ) c 1 + . . . + 2 ( b NN - b ( N - 1 ) N ) c N &equiv; ( &Sigma; j = 1 N b Nj 2 - &Sigma; j = 1 N b ( N - 1 ) j 2 ) mod p
So can find the solution system of linear equations, can get centre coordinate C (c 1, c 2..., c N);
(3.4) user calculates w 1=f (c 1* t), w2=f (c 2* t) ..., w N=f (c N* t), wherein t is a timestamp, makes W g=(w 1, w 2..., w N);
(3.5) cross W gBe straight line L with C, under the situation of seldom seeing, if W gIdentical with C, reselect timestamp t, calculate W again g(after recomputating, because timestamp is different, one guarantees that surely these two vectors are inequality); The parametric equation of straight line L is following
y 1 &equiv; ( w 1 + ( c 1 - w 1 ) &times; k ) mod p y 2 &equiv; ( w 2 + ( c 2 - w 2 ) &times; k ) mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; y N &equiv; ( w N + ( c N - w N ) &times; k ) mod p
Wherein k is the independent variable parameter, y 1..., y NBe dependent variable;
Getting L goes up except that W gWith any 1 M outside the C g(m 1..., m N), (y of correspondence when promptly k gets the arbitrary number in the finite field gf (p) except that 0 and 1 1..., y N) value;
(3.6) user is with authentication message Meg={t, ID g, B G1, M gSend to certificate server, wherein, t is a timestamp, ID gBe the sign that representative is designated as the user identity of g down, B G1Be be stored in the file " userInfo " at sphere UC gOn a point, M gBe on the straight line L that generates more arbitrarily, in the each authentication message that generates of same user, t and M gBe different, ID gAnd B G1Always identical.
Said step (4) certificate server checking user authentication information specifically may further comprise the steps:
(4.1) certificate server is received user U gAuthentication message Meg, whether elder generation's review time stabs effective, invalid then authentification failure effectively then gets into next step;
(4.2) certificate server is according to ID gReach self secret vector set compute vector
A gi=(f(ID g×S i1),f(ID g×S i2),...,f(ID g×S iN)),(i=1,...,N)
A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N, N vector added the some B in the authentication message like this G1, altogether N+1 vectorial, so certificate server can reconstruct and the sphere UC that shares of user g, utilize this N+1 vector structure N n-dimensional sphere n equation, be about to B G1, and A G1, A G2..., A GNSubstitution N n-dimensional sphere n equation:
( b 11 c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 N - c N ) 2 &equiv; R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 &equiv; R 2 mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 &equiv; R 2 mod p
The preceding same form with them subtracts the back same form respectively, can obtain about c 1, c 2..., c NSystem of linear equations:
2 ( b 11 - b 11 ) c 1 + . . . + 2 ( 2 1 N - b 1 N ) c N &equiv; ( &Sigma; j = 1 N a 1 j 2 - &Sigma; j = 1 N b 1 j 2 ) mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N &equiv; ( &Sigma; j = 1 N a Nj 2 - &Sigma; j = 1 N a ( N - 1 ) j 2 ) mod p
So can find the solution the centre coordinate C (c of system of linear equations 1, c 2..., c N);
(4.3) authentication server computes W g=(f (c 1* t), f (c 2* t) ..., f (c N* t), a W is crossed in reconstruct gAnd the straight line L of center C:
y 1 &equiv; ( w 1 + ( c 1 - w 1 ) &times; k ) mod p y 2 &equiv; ( w 2 + ( c 2 - w 2 ) &times; k ) mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; y N &equiv; ( w N + ( c N - w N ) &times; k ) mod p ;
(4.4) certificate server check post M g(m 1..., m N) whether on straight line L, if then through authentication, otherwise authentification failure, the process of checking is following:
M 1..., m NEach minor of substitution linear equation is calculated respectively, obtains:
m 1 &equiv; ( w 1 + ( c 1 - w 1 ) &times; k 1 ) mod p m 2 &equiv; ( w 2 + ( c 2 - w 2 ) &times; k 2 ) mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; m N &equiv; ( w N + ( c N - w N ) &times; k N ) mod p
Then have:
k 1 &equiv; ( m 1 - w 1 ) &times; ( c 1 - w 1 ) - 1 mod p k 2 &equiv; ( m 2 - w 2 ) &times; ( c 2 - w 2 ) - 1 mod p &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; &CenterDot; k N &equiv; ( m N - w N ) &times; ( c N - w N ) - 1 mod p
If k 1=k 2=...=k N, some M then is described gOn straight line L, certificate server is accepted user identity; Otherwise some M gNot on straight line L, the subscriber authentication failure.
Action principle of the present invention is: the mathematical principle that utilizes " point on known N+1 the N dimension space that satisfies certain condition; can uniquely confirm a N n-dimensional sphere n (N-sphere/hyper sphere/N ties up and justifies) "; Designed a kind of identity identifying method, the respective identity authentication method that whether can the same N n-dimensional sphere n of reconstruct designs through certain secrets information comparison certificate server and user based on the N n-dimensional sphere n.
The present invention compared with prior art has following advantage and beneficial effect:
The first, the main computing that authentication method is used is to On Solving System of Linear Equations, so the step required time that three need of authentication method calculate is all very short, can apply to practical application well.
The second, certificate server need be for each user preserve user data, the required preservation of certificate server only be N to all general secret vector of N dimension of all users: (S 11, S 12... S 1N) ..., (S N1, S N2... S NN).The data that only need preserve seldom of certificate server end just can realize the checking to a large number of users identity like this, have saved memory space greatly.
The 3rd, can effectively resist Replay Attack, because certificate server can stab the review time, thereby authentication message Meg can not reuse.
The 4th, can effectively resist and forge the authentication message attack, if the disabled user intercepts and captures authentication message Meg, also can only know point on the sphere, can't reconstruct sphere UC g, also can't know centre coordinate.If disabled user's modification time stabs, but can't construct legal some M g, also just can't forge authentication message, even intercepted and captured many authentication messages, also can't therefrom recover enough effective information reconstruct spheres, so the disabled user can't forge legal authentication message.
The 5th, can effectively resist off-line password conjecture (dictionary attack), the secret information f (PW of user self password in this authentication method g) do not expose to the open air in network, thereby it is difficult to do dictionary attack.The assailant has intercepted and captured authentication message Meg simultaneously, also can only know M gAnd B G1, can't the reconstruct sphere.Even through dictionary attack conjecture user password PW g, and then conjecture B G0, also can only know two some B on the sphere G0And B G1, still can't the reconstruct sphere.The possible value space of other point is just very big on the N n-dimensional sphere n, thus dictionary attack to the attack dynamics of the inventive method very a little less than.In each authentication message that generates, B G1Point all is identical, so even the assailant has intercepted and captured many authentication messages, can not obtain more information about sphere.
The 6th, can effectively resist the personation certificate server and attack, the process that certificate server is constructed secret sphere will be used the N dimensional vector of the linear independence of N own secret.Validated user can only be known N+1 point on the secret sphere of own institute reconstruct, and this secret sphere of authentication server computes is to utilize other N point on the sphere, adds the B that is generated by user password G0Point, the user does not know N some A of certificate server Gi(wherein i=1 ..., N), it is secret vectorial not know that more certificate server generates N of these points, so validated user is difficult to palm off certificate server.
The 7th, can effectively resist fake user and attack, if validated user wants to pretend to be other user, can revise the ID in the authentication message g, but can't know that the secret that other user and certificate server are shared (is other ID gThereby can't generate legal some M the center of corresponding secret sphere), g, also just can't forge authentication message, so can't pretend to be other validated user.
Description of drawings
Fig. 1 is the identity authorization system configuration diagram of the preferred embodiment of the present invention;
Fig. 2 is a view after the authentication server initialization of the preferred embodiment of the present invention;
Fig. 3 is user's 1 registration process sketch map of the preferred embodiment of the present invention;
Fig. 4 is user's 1 registration process authentication server calculating process sketch map of the preferred embodiment of the present invention;
Fig. 5 is user's 2 registration process sketch mapes of the preferred embodiment of the present invention;
Fig. 6 is user's 2 registration process authentication server calculating process sketch mapes of the preferred embodiment of the present invention;
Fig. 7 is the registration process authentication server operation result two-dimensional representation of the preferred embodiment of the present invention;
Fig. 8 is the user authentication process sketch map of the preferred embodiment of the present invention;
Fig. 9 is user authentication process user's computing sketch map of the preferred embodiment of the present invention;
Figure 10 is the user authentication process authentication server computing sketch map of the preferred embodiment of the present invention;
Figure 11 is the verification process operation result two-dimensional representation of the preferred embodiment of the present invention.
Embodiment
Below in conjunction with embodiment and accompanying drawing, the present invention is done to specify further, but execution mode of the present invention is not limited thereto.
Embodiment
Typical identity authorization system framework is as shown in Figure 1, and this system comprises certificate server (CA), and user 1, user 2.Certificate server (CA), each user connect through world-wide web.
As shown in Figure 2, certificate server (CA) is set relevant parameter after initialization, wherein is the secret parameter of preserving in the solid box, and frame of broken lines is an open parameters.The situation that present embodiment is chosen N=2 specifies, because in 2 dimension spaces, " 2 n-dimensional sphere n " is actual to be " circle ", so in the following description, adopts " 2 dimension circle " this term to substitute " N n-dimensional sphere n ".Like 2 dimensional vector S among the figure 1And S 2Be that the secret secret vector of preserving is (so only select 2 dimensional vectors for simple declaration here; In practical application, can select the more secret vector of dimensions vector conduct); Safe one-way function f is disclosed with big prime number p, and the whole process of embodiment is all carried out under finite field gf (p).
As shown in Figure 3, user U 1(CA) registers to certificate server.
PW wherein 1Be user U 1The password of self is preserved by user self is secret, and this password can be made up of letter and number, and character string can convert numeral into.The user sends register requirement to certificate server (CA), and self password is carried out safe one-way function f computing obtains A as a result 10=(f (PW 1), f (2*PW 1)) send to certificate server (CA) as identity information.Certificate server (CA) utilizes self secret vectorial S 1, S 2And be encrypted to the encrypt file of " userInfo " by name behind the corresponding User Identity of information calculations submitted to of user, send it to user U again 1:
Fig. 4 shows the calculating relative users identify label calculating process that certificate server (CA) is carried out when user 1 registers:
Certificate server (CA) is user U 1Specify a unique ID 1, the representative of consumer identity.Certificate server (CA) calculates 2 vectors based on 2 that preserve secret vectors:
A 11=(f(ID 1×S 11),f(ID 1×S 12))
A 12=(f(ID 1×S 21),f(ID 1×S 22))
A 11Coordinate be designated as (a 11, a 12), A 12Coordinate be designated as (a 21, a 22), add the A that the user sends 10(be designated as (a 01, a 02)), these three vectors are formed the equation group of one 2 dimension circle, and the substitution relevant parameter gets:
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 &equiv; R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 &equiv; R 2 mod p ( a 21 - c 1 ) 2 + ( a 22 - c 2 ) 2 &equiv; R 2 mod p
Subtract preceding Shi Kede through the back formula:
2 ( a 11 - a 01 ) c 1 + 2 ( a 12 - a 02 ) c 2 &equiv; ( &Sigma; v = 1 2 a 1 v 2 - &Sigma; v = 1 2 a 0 v 2 ) mod p
2 ( a 21 - a 11 ) c 1 + 2 ( a 22 - a 12 ) c 2 &equiv; ( &Sigma; v = 1 2 a 2 v 2 - &Sigma; v = 1 2 a 1 v 2 ) mod p
Through finding the solution this linear equation in two unknowns group, can obtain center C (c 1, c 2), and then radius squared R 2If, can't find the solution this equation group in the computational process, then reselect user U 1ID 1, recomputate again up to can solving equation.Choose two other different some B from this 2 dimension circle at last 11, B 12(these two points are different from A 10, A 11, A 12), detailed process is following:
Select two pairs of quadratic residues to (e 11, d 11), (e 12, d 12) make e 11≡ d 11 2Modp and e 12≡ d 12 2Modp, and satisfy
e 11+e 12≡R 2modp
Order
b 11≡(d 11+c 1)modp
b 12≡(d 12+c 2)modp
B 11=(b 11,b 12);
Select two pairs of quadratic residues to (e equally again 21, d 21), (e 22, d 22) make e 21≡ d 21 2Modp and e 22≡ d 22 2Modp, and satisfy
e 21+e 22≡R 2modp
Order
b 21≡(d 21+c 1)modp
b 22≡(d 22+c 2)modp
B 12=(b 21,b 22);
At last with B 11, B 12And big prime number p, safe one-way function f all encrypt in the file, is called " userInfo ", and " userInfo " passed back the U to the user 1
As shown in Figure 5, user U 2(CA) registers to certificate server.This process and user U 1Registration process is the same.Be that present certificate server (CA) has used ID 1This ID must reselect other ID and compose the U to the user 2
As shown in Figure 6, certificate server (CA) is at user U 2The calculating process that is carried out when registering.This process is consistent with Fig. 4 calculating process, is user U this moment 2The ID that uses is ID 2
As shown in Figure 7, certificate server (CA) is at user U 1, user U 2Registration back operation result 2 dimension sketch mapes.Wherein 2 tie up circle UC 1Be user U 1Utilizing self provides password information A 10And the secret vectorial S of certificate server (CA) 1, S 2(utilize ID 1Carry out computing and obtain A 11, A 12) structure, B 11, B 12Be two other different point that certificate server (CA) is selected, deposit in the encrypt file " userInfo ", self take care of by user 1; 2 dimension circle UC 2Be user U 2Utilizing self provides password information A 20And the secret vectorial S of certificate server (CA) 1, S 2(utilize ID 2Carry out computing and obtain A 21, A 22) structure, B 21, B 22Two other the different point that is certificate server (CA) selection is as user U 2The identity sign.Because user U 1, user U 2ID different, the 2 dimension fenestras that certificate server (CA) constructs are not the same, and can increase the fail safe of whole identity authorization system thus.
Fig. 8 is user U 1Process sketch map to certificate server (CA) request authentication.User U wherein 1Calculate earlier, utilize the identify label that self password and encrypt file " userInfo " contain to construct 2 dimension circles again, again with information B 11, M 1, timestamp t and self ID 1Send to certificate server (CA).Certificate server (CA) at first the review time stab t whether in tolerance interval, if exceed the time qualified authentication failure of just thinking, as t effectively then certificate server (CA) utilize B 11Also construct sphere again with self secret vector, and inspection M 1Whether correct, whether the checking that determines one's identity thus is successful.
As shown in Figure 9, user U 1Process sketch map to certificate server (CA) request authentication user self computing.User U 1Utilize self password PW 1Calculate A 10, note A 10=(f (PW 1), f (2*PW 1))=(a 01, a 02) and " userInfo " in B 1(b 11, b 12), B 12(b 21, b 22) three points are formed the equation group of 2 dimension circles, and the substitution relevant parameter gets:
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 &equiv; R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 &equiv; R 2 mod p ( b 21 - c 1 ) 2 + ( b 22 - c 2 ) 2 &equiv; R 2 mod p
Subtract preceding Shi Kede through the back formula:
2 ( b 11 - a 01 ) c 1 + 2 ( b 12 - a 02 ) &equiv; ( &Sigma; v = 1 2 b 1 v 2 - &Sigma; j = 1 2 a 0 v 2 ) mod p
2 ( b 21 - b 11 ) c 1 + 2 ( b 22 - b 12 ) c 2 &equiv; ( &Sigma; v = 1 2 b 2 v 2 - &Sigma; v = 1 2 b 1 v 2 ) mod p
Through finding the solution this linear equation in two unknowns group, can obtain center C (c 1, c 2), and then obtain radius squared R 2User U 1Select a timestamp t again, and calculate W 1, W wherein 1(w 1, w 2)=(f (c 1* f (c t), 2* t)).The user crosses W then 1, C makes straight line L, detailed process is following:
y 1 &equiv; ( w 1 + ( c 1 - w 1 ) &times; k ) mod p y 2 &equiv; ( w 2 + ( c 2 - w 2 ) &times; k ) mod p
Wherein k is an independent variable, y 1, y 2Be dependent variable, and on straight line L, select wherein to be different from C, W 1A bit be designated as M 1(m 1, m 2).End user is Meg={t, ID 1, B 11, M 1Send to certificate server (CA) as authentication information, accept the checking of certificate server (CA), and etc. result to be verified.
Shown in figure 10, the process sketch map of user 1 certificate server (CA) self computing when certificate server request authentication.Certificate server (CA) checks that at first the user sends the timestamp t of authentication information, if overtime then authentication failed, otherwise would continue down checking.Certificate server (CA) utilizes self secret vectorial S 1, S 2And ID 1Computing obtains A 11, A 12:
A 11(a 11,a 12)=(f(s 11*ID 1),f(s 12*ID 1))
A 12(a 21,a 22)=(f(s 21*ID 1),f(s 22*ID 1))
Add the B that the user sends 11, these three points can be formed one 2 dimension equation of a circle group again, and with the parameter substitution wherein
( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 &equiv; R 2 mod p ( a 21 - c 1 ) 2 + ( a 22 - c 2 ) 2 &equiv; R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 &equiv; R 2 mod p
Subtract preceding formula through the back formula and can obtain a linear equation in two unknowns group
2 ( a 21 - a 11 ) c 1 + 2 ( a 22 - a 12 ) c 2 &equiv; ( &Sigma; v = 1 2 a 2 v 2 - &Sigma; v = 1 2 a 1 v 2 ) mod p
2 ( b 11 - a 21 ) c 1 + 2 ( b 12 - a 22 ) c 2 &equiv; ( &Sigma; v = 1 2 b 1 v 2 - &Sigma; v = 1 2 a 2 v 2 ) mod p
Can obtain center C (c through finding the solution this linear equation in two unknowns group 1, c 2), and then obtain radius squared R 2Certificate server (CA) is obtained W again 1, W 1(w 1, w 2)=(f (c 1* f (c t), 2* t)), wherein t is the timestamp in the user authentication information, crosses C, W then 1Make straight line L, and checking user U 1The M that sends 1On straight line, verification method is following for point:
k 1 &equiv; ( ( m 1 - w 1 ) &times; ( c 1 - w 1 ) - 1 ) mod p k 2 &equiv; ( ( m 2 - w 2 ) &times; ( c 2 - w 2 ) - 1 ) mod p
If K 1Equal K 2, M then 1On straight line L, thus the authentication success; If K 1Be not equal to K 2, M then 1Not on straight line L, thus the authentication failure.
Shown in figure 11, user 1 is to certificate server request authentication operation result two-dimensional representation.User U 1Utilize self information structure 2 dimension circles, obtained center C and W 1Straight line, and on this straight line, select arbitrarily a some M 1If certificate server (CA) utilizes corresponding information also can construct same 2 dimension circles, and utilizes user U 1The correct information that provides just can be verified M 1With sphere centre C and W 1Cross same straight line L, can judge user U thus 1Identity.Simultaneously because W 1Be to change in time, so in the t ' time, the user will construct other straight line L ', the straight line of promptly constructing in the each authentication process itself of user all can be inequality, so just more can improve security of system.
The foregoing description is a preferred implementation of the present invention; But execution mode of the present invention is not limited by the examples; Other any do not deviate from change, the modification done under spirit of the present invention and the principle, substitutes, combination, simplify; All should be the substitute mode of equivalence, be included within protection scope of the present invention.

Claims (3)

1. identity identifying method based on the N n-dimensional sphere n may further comprise the steps:
(1) certificate server initialization: certificate server is selected finite field gf (p) and safe one-way function f, selects some secret vectors simultaneously; Wherein GF (p) has confirmed the finite field at group computing place, and promptly all group's calculating processes all carry out in finite field gf (p), and p is a big prime number;
(2) user's registration: the user is according to self selected password PW gCalculate a vector through safety one-way function f and submit to certificate server, certificate server inspection user identity is for the user specifies an ID gAs the sign of user identity, the sign of each user identity has nothing in common with each other; Vectorial unique definite N n-dimensional sphere n that certificate server combines the secret vector sum user of self to submit to, if can not construct such N n-dimensional sphere n, then certificate server is reselected the sign ID of this user identity gCalculate again; The point some inequality that last certificate server will be selected at this N n-dimensional sphere n through safe lane at random is with the sign ID of user identity g, the encrypt file formed of big prime number p and safe one-way function f passes to the user;
(3) user generates authentication information: the encrypt file that when the user needs its identity of certificate server identification, utilizes certificate server to pass back, and combine self selected password PW g, construct a N n-dimensional sphere n again, select geometric properties on this N n-dimensional sphere n to pass to certificate server simultaneously and verify as authentication information;
(4) certificate server checking user authentication information: the authentication information that certificate server is accepted the user utilizes the secret vector of self to re-construct a N n-dimensional sphere n simultaneously; And calculate the geometric properties on the N n-dimensional sphere n that the user arranges to use; Authentication information with result of calculation and user's submission compares at last; If identical then accept user identity, otherwise refusing user's identity;
The some secret vectors of selection in the said step (1) are meant the N dimensional vector of secret selected N the linear independence of certificate server: (S 11, S 12..., S 1N) ..., (S N1, S N2..., S NN), S wherein KlIn finite field gf (p), select at random, k=1 ..., N, l=1 ..., N; The open N value of certificate server, but this N N dimensional vector can only preserve by certificate server is secret, and in case selected with regard to no longer change;
Said step (2) user registration specifically may further comprise the steps:
(2.1) user U gSelected password PW g, U wherein gBe the user who is designated as g down, PW gBe the user U that is designated as g down gSelected password, this password is made up of letter and number, because of character string can convert numeral into, the PW of the following stated gBe meant the later integer of conversion, below all calculating of each step all in finite field gf (p), carry out;
User's compute vector A G0=(f (PW g), f (2 * PW g) ..., f (N * PW g)) and pass to certificate server;
(2.2) certificate server is specified a unique ID for this user g, and calculate N n-dimensional sphere n equation:
(a) certificate server calculates N vector according to self secret N N dimensional vector of preserving:
A g 1 = ( f ( ID g &times; S 11 ) , f ( ID g &times; S 12 ) , . . . , f ( ID g &times; S 1 N ) ) . . . . A gN = ( f ( ID g &times; S N 1 ) , f ( ID g &times; S N 2 ) , . . . , f ( ID g &times; S NN ) )
(b) A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N, add the A that the user transmits G0, A G0Coordinate is designated as (a 01, a 02..., a 0N), utilize N+1 vectorial A G0, A G1..., A GNStructure N n-dimensional sphere n equation, the substitution spherical equation:
(x 1-c 1) 2+(x 2-c 2) 2+...+(x N-c N) 2=R 2
(c wherein 1, c 2..., c N) be the center of N n-dimensional sphere n, R is the radius of this N n-dimensional sphere n, (x 1, x 2..., x N) be arbitrfary point on the sphere;
:
( a 01 - c 1 ) 2 + ( a 02 - c 2 ) 2 + . . . + ( a 0 N - c N ) 2 &equiv; R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 &equiv; R 2 mod p . . . . . . . . . . . . ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 &equiv; R 2 mod p
Respectively the same form before them is subtracted the back same form then, obtain about c 1, c 2..., c NSystem of linear equations:
2 ( a 11 - a 01 ) c 1 + . . . + 2 ( a 1 N - a 0 N ) c N &equiv; ( &Sigma; j = 1 N a 1 j 2 - &Sigma; j = 1 N a 0 j 2 ) mod p . . . . . . . . . . . . 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N &equiv; ( &Sigma; j = 1 N a Nj 2 - &Sigma; j = 1 N a ( N - 1 ) j 2 ) mod p
If in computational process, the coefficient matrix determinant of equation group is zero, then reselects ID gCalculate, guarantee the unique center C (c that confirms this sphere of equation group like this 1, c 2..., c N); Then obtain R 2Then just according to c 1, c 2..., c NAnd R 2Confirm spherical equation, definite spherical equation is exactly to be designated as the user of g and the secret sphere UC that certificate server is shared down g, establish this equation and be:
(x 1-c 1) 2+(x 2-c 2) 2+...+(x N-c N) 2≡R 2?mod?p
(2.3) certificate server is selected secret sphere UC at random gGo up and remove A G0, A G1..., A GNN in addition some B Gi, B GiIn i=1,2 ..., N, B Gi=(b I1, b I2..., b IN); B GiEach coordinate components all in finite field gf (p), look for B GiEach coordinate specifically find the solution as follows:
(a) find the N-2 number to being that quadratic residue is to (e Iq, d Iq), make e Iq≡ d Iq 2Mod p, wherein q=1 ..., N-2, e Iq, d IqBe to satisfy e in the finite field gf (p) Iq≡ d Iq 2Any two integers of mod p condition, and satisfy
b i1≡(d i1+c 1)mod?p
b i2≡(d i2+c 2)mod?p
......
b i(N-2)≡(d i(N-2)+c N-2)mod?p
(b) select two pairs of quadratic residues to (e again Iz, d Iz), make e Iz≡ d Iz 2Mod p, wherein z=N-1, N, e Iz, d IzBe to satisfy e in the finite field gf (p) Iz≡ d Iz 2Any two integers of mod p condition, and satisfy
e i ( N - 1 ) + e iN &equiv; ( R 2 - &Sigma; y = 1 N - 2 e iy ) mod p
Order
b i(N-1)≡(d i(N-1)+c N-1)mod?p
b iN≡(d iN+c N)mod?p
Above-mentioned steps (a) and step (b) are N >=3 o'clock suitable situation, when N=2, then directly use step (b);
Repeat N time and calculate, obtain N B GiPoint is verified after each the calculating, guarantees that N the point that obtains is mutually different;
(2.4) certificate server is p, f, ID gAnd B G1, B G2..., B GNPreserve hereof and send to the user with the form of encrypting, AES is to use existing secure cryptographic algorithm, and the user preserves the file after the encryption, and the user imports the PIN code declassified document and obtains information needed, and we claim that this encrypt file is " userInfo ";
Said step (3) user generates authentication information, specifically may further comprise the steps:
(3.1) be designated as the user U of g under gThe encrypt file that contains the information of succeeding in registration " userInfo " of input PIN code decrypted authentication server transmission obtains p, f, ID gAnd B G1, B G2..., B GN
(3.2) user is at client input self password PW g, calculate B G0=(f (PW g), f (2 * PW g) ..., f (N * PW g)), A G0=B G0
(3.3) user is according to B G0Add the N point B of storage in the file " userInfo " G1, B G2..., B GN, N+1 point utilizes this N+1 vector structure N n-dimensional sphere n equation altogether, reconstructs original secret sphere UC gBe about to B G0And B G1, B G2..., B GNSubstitution N n-dimensional sphere n equation gets equation group:
( b 01 - c 1 ) 2 + ( b 02 - c 2 ) 2 + . . . + ( b 0 N - c N ) 2 &equiv; R 2 mod p ( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 N - c N ) 2 &equiv; R 2 mod p . . . . . . . . . . . . ( b N 1 - c 1 ) 2 + ( b N 2 - c 2 ) 2 + . . . + ( b NN - c N ) 2 &equiv; R 2 mod p
Respectively the same form before them is subtracted the back same form, obtain about c 1, c 2..., c NSystem of linear equations:
2 ( b 11 - b 01 ) c 1 + . . . + 2 ( b 1 N - b 0 N ) c N &equiv; ( &Sigma; j = 1 N b 1 j 2 - &Sigma; j = 1 N b 0 j 2 ) mod p . . . . . . . . . . . . 2 ( b N 1 - b ( N - 1 ) 1 ) c 1 + . . . + 2 ( b NN - b ( N - 1 ) N ) c N &equiv; ( &Sigma; j = 1 N b Nj 2 - &Sigma; j = 1 N b ( N - 1 ) j 2 ) mod p
Promptly get centre coordinate C (c so find the solution system of linear equations 1, c 2..., c N);
(3.4) user calculates w 1=f (c 1* t), w 2=f (c 2* t) ..., W N=f (c N* t), wherein t is a timestamp, makes W g=(w 1, w 2..., w N);
(3.5) cross W gBe straight line L with C, under the situation of seldom seeing, if W gIdentical with C, reselect timestamp t, calculate W again gThe parametric equation of straight line L is following:
y 1 &equiv; ( w 1 + ( c 1 - w 1 ) &times; k ) mod p y 2 &equiv; ( w 2 + ( c 2 - w 2 ) &times; k ) mod p . . . . . . . . . . . . y N &equiv; ( w N + ( c N - w N ) &times; k ) mod p
Wherein k is the independent variable parameter, y 1..., y NBe dependent variable;
Getting L goes up except that W gWith any 1 M outside the C g(m 1..., m N), (y of correspondence when promptly k gets the arbitrary number in the finite field gf (p) except that 0 and 1 1..., y N) value;
(3.6) user is with authentication message Meg={t, ID g, B G1, M gSend to certificate server, wherein, t is a timestamp, ID gBe the sign that representative is designated as the user identity of g down, B G1Be be stored in the file " userInfo " at N n-dimensional sphere n UC gOn a point, M gBe that the straight line L that generates goes up except that W gWith outside the C more arbitrarily, in the each authentication message that generates of same user, t and M gRespectively with respect to t and M in the authentication message that generates before gBe different, ID gAnd B G1Respectively with respect to the ID in the authentication message that generates before gAnd B G1Always identical;
Said step (4) certificate server checking user authentication information specifically may further comprise the steps:
(4.1) certificate server is received user U gAuthentication message Meg, whether elder generation's review time stabs effective, invalid then authentification failure effectively then gets into next step;
(4.2) certificate server is according to ID gReach self secret vector set compute vector
A gi=(f(ID g×S i1),f(ID g×S i2),...,f(ID g×S iN))
A GiCoordinate be designated as (a I1, a I2..., a IN), wherein i=1,2 ..., N, N vector added the some B in the authentication message like this G1, altogether N+1 vectorial, so certificate server can reconstruct and the sphere UC that shares of user g, utilize this N+1 vector structure N n-dimensional sphere n equation, be about to B G1, A G1, A G2..., A GNSubstitution N n-dimensional sphere n equation:
( b 11 - c 1 ) 2 + ( b 12 - c 2 ) 2 + . . . + ( b 1 N - c N ) 2 &equiv; R 2 mod p ( a 11 - c 1 ) 2 + ( a 12 - c 2 ) 2 + . . . + ( a 1 N - c N ) 2 &equiv; R 2 mod p . . . . . . . . . . . . ( a N 1 - c 1 ) 2 + ( a N 2 - c 2 ) 2 + . . . + ( a NN - c N ) 2 &equiv; R 2 mod p
The preceding same form with them subtracts the back same form respectively, obtains about c 1, c 2..., c NSystem of linear equations:
2 ( a 11 - b 11 ) c 1 + . . . + 2 ( a 1 N - b 1 N ) c N &equiv; ( &Sigma; j = 1 N a 1 j 2 - &Sigma; j = 1 N a 1 j 2 ) mod p . . . . . . . . . . . . 2 ( a N 1 - a ( N - 1 ) 1 ) c 1 + . . . + 2 ( a NN - a ( N - 1 ) N ) c N &equiv; ( &Sigma; j = 1 N a Nj 2 - &Sigma; j = 1 N a ( N - 1 ) j 2 ) mod p
So find the solution the centre coordinate C (c of system of linear equations 1, c 2..., c N);
(4.3) authentication server computes W g=(f (c 1* t), f (c 2* t) ..., f (c N* t)), a W is crossed in reconstruct gAnd the straight line L of center C:
y 1 &equiv; ( w 1 + ( c 1 - w 1 ) &times; k ) mod p y 2 &equiv; ( w 2 + ( c 2 - w 2 ) &times; k ) mod p . . . . . . . . . . . . y N &equiv; ( w N + ( c N - w N ) &times; k ) mod p ;
(4.4) certificate server check post M g(m 1..., m N) whether on straight line L, if then through authentication, otherwise authentification failure, the process of checking is following:
M 1..., m NEach minor of substitution linear equation is calculated respectively, obtains:
m 1 &equiv; ( w 1 + ( c 1 - w 1 ) &times; k 1 ) mod p m 2 &equiv; ( w 2 + ( c 2 - w 2 ) &times; k 2 ) mod p . . . . . . . . . . . . m N &equiv; ( w N + ( c N - w N ) &times; k N ) mod p
Then have:
k 1 &equiv; ( m 1 - w 1 ) &times; ( c 1 - w 1 ) - 1 mod p k 2 &equiv; ( m 2 - w 2 ) &times; ( c 2 - w 2 ) - 1 mod p . . . . . . . . . . . . k N = ( m N - w N ) &times; ( c N - w N ) - 1 mod p
If k 1=k 2=...=k N, some M then is described gOn straight line L, certificate server is accepted user identity; Otherwise some M gNot on straight line L, the subscriber authentication failure.
2. a kind of identity identifying method based on the N n-dimensional sphere n according to claim 1 is characterized in that: said step (1) certificate server initialization specifically may further comprise the steps:
Certificate server is selected safe one-way function f, and certain big prime number p is open with it behind selected f of certificate server and the p.
3. a kind of identity identifying method based on the N n-dimensional sphere n according to claim 2 is characterized in that: said big prime number satisfies p=8n+3, and n is a certain positive integer.
CN2009100382490A 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere Expired - Fee Related CN101510875B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN2009100382490A CN101510875B (en) 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere
PCT/CN2009/071395 WO2010108335A1 (en) 2009-03-27 2009-04-22 Identity authentication method based on n-dimensional sphere

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009100382490A CN101510875B (en) 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere

Publications (2)

Publication Number Publication Date
CN101510875A CN101510875A (en) 2009-08-19
CN101510875B true CN101510875B (en) 2012-02-22

Family

ID=41003139

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009100382490A Expired - Fee Related CN101510875B (en) 2009-03-27 2009-03-27 Identification authentication method based on N-dimension sphere

Country Status (2)

Country Link
CN (1) CN101510875B (en)
WO (1) WO2010108335A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753295B (en) * 2009-12-24 2011-09-14 华南理工大学 Group key management method based on linear geometry
US9069932B2 (en) 2012-07-06 2015-06-30 Blackberry Limited User-rotatable three-dimensionally rendered object for unlocking a computing device
CN104639321B (en) * 2013-11-12 2018-03-23 中国移动通信集团公司 A kind of identity identifying method, equipment and system
US10505924B1 (en) 2016-12-09 2019-12-10 Wells Fargo Bank, N.A. Defined zone of authentication
CN114978537B (en) * 2022-05-16 2024-02-13 中国人民解放军国防科技大学 Identity recognition method, device, equipment and computer readable storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6978036B2 (en) * 1998-07-31 2005-12-20 Digimarc Corporation Tamper-resistant authentication techniques for identification documents
FR2809556B1 (en) * 2000-05-24 2002-07-12 Jean Luc Berthelot METHOD FOR GENERATING AN ELECTRONIC SIGNATURE LINKED TO AN AUTHENTIC ACT AND AUTHENTICATION METHOD
JP3525104B2 (en) * 2000-09-01 2004-05-10 日本電信電話株式会社 Authentication method, apparatus and program recording medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JP特开2002-77148A 2002.03.15
Shiuh-Jeng Wang et al.Yet Another Log-in Authentication using N-dimensional Construction based on Circle Property.《IEEE》.2003,第337-341页第3.1节. *
张华 等.基于几何方法的门限秘密共享方案.《计算机工程》.2008,第34卷(第8期),第130页至第131页. *

Also Published As

Publication number Publication date
CN101510875A (en) 2009-08-19
WO2010108335A1 (en) 2010-09-30

Similar Documents

Publication Publication Date Title
Jiang et al. Three-factor authentication protocol using physical unclonable function for IoV
Gunasinghe et al. PrivBioMTAuth: Privacy preserving biometrics-based and user centric protocol for user authentication from mobile phones
EP3069249B1 (en) Authenticatable device
US11824991B2 (en) Securing transactions with a blockchain network
Tams et al. Security considerations in minutiae-based fuzzy vaults
Gope et al. A scalable protocol level approach to prevent machine learning attacks on physically unclonable function based authentication mechanisms for Internet of Medical Things
JP5499358B2 (en) Authentication processing method and apparatus
Kim et al. Cryptanalysis and improvement of a biometrics-based multi-server authentication with key agreement scheme
EP3374913A1 (en) Public/private key biometric authentication system
Gasti et al. Secure, fast, and energy-efficient outsourced authentication for smartphones
Qureshi et al. SeVEP: Secure and verifiable electronic polling system
Sarier Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management
CN101510875B (en) Identification authentication method based on N-dimension sphere
CN109981290A (en) The communication system and method close based on no certificate label under a kind of intelligent medical environment
Zhu et al. Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework
Barman et al. A novel secure key-exchange protocol using biometrics of the sender and receiver
CN106034122A (en) Information processing method, electronic equipment and server
Gope et al. A comparative study of design paradigms for PUF-based security protocols for IoT devices: Current progress, challenges, and future expectation
Tian et al. Pribioauth: Privacy-preserving biometric-based remote user authentication
Gupta et al. User anonymity-based secure authentication protocol for telemedical server systems
Wu et al. A new authenticated key agreement scheme based on smart cards providing user anonymity with formal proof
Meshram et al. An efficient remote user authentication with key agreement procedure based on convolution-Chebyshev chaotic maps using biometric
Zahednejad et al. A secure and efficient AKE scheme for IoT devices using PUF and cancellable biometrics
Narasimhan et al. Bio‐PUF‐MAC authenticated encryption for iris biometrics
Kardaş et al. k‐strong privacy for radio frequency identification authentication protocols based on physically unclonable functions

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20120222

Termination date: 20180327

CF01 Termination of patent right due to non-payment of annual fee