CN109347626B - 一种具有反跟踪特性的安全身份认证方法 - Google Patents
一种具有反跟踪特性的安全身份认证方法 Download PDFInfo
- Publication number
- CN109347626B CN109347626B CN201811019796.XA CN201811019796A CN109347626B CN 109347626 B CN109347626 B CN 109347626B CN 201811019796 A CN201811019796 A CN 201811019796A CN 109347626 B CN109347626 B CN 109347626B
- Authority
- CN
- China
- Prior art keywords
- user
- authentication
- irc
- key
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0866—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811019796.XA CN109347626B (zh) | 2018-09-03 | 2018-09-03 | 一种具有反跟踪特性的安全身份认证方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811019796.XA CN109347626B (zh) | 2018-09-03 | 2018-09-03 | 一种具有反跟踪特性的安全身份认证方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109347626A CN109347626A (zh) | 2019-02-15 |
CN109347626B true CN109347626B (zh) | 2021-05-25 |
Family
ID=65292221
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811019796.XA Active CN109347626B (zh) | 2018-09-03 | 2018-09-03 | 一种具有反跟踪特性的安全身份认证方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109347626B (zh) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110008727B (zh) * | 2019-04-10 | 2020-07-21 | 南方电网数字电网研究院有限公司 | 加密敏感参数的处理方法、装置、计算机设备和存储介质 |
CN110460438A (zh) * | 2019-08-07 | 2019-11-15 | 南京信息工程大学 | 具有用户隐私保护功能的轻量级通讯方法 |
CN110704864B (zh) * | 2019-08-28 | 2021-05-04 | 电子科技大学 | 基于区块链的政府诚信档案证照管理方法 |
CN111130758B (zh) * | 2020-02-03 | 2021-07-06 | 电子科技大学 | 一种适用于资源受限设备的轻量级匿名认证方法 |
CN111769937A (zh) * | 2020-06-24 | 2020-10-13 | 四川大学 | 面向智能电网高级测量体系的两方认证密钥协商协议 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2093927A4 (en) * | 2007-10-29 | 2013-10-09 | Huawei Tech Co Ltd | AUTHENTICATION METHOD, SYSTEM, SERVER AND USER N UD |
CN103905437A (zh) * | 2014-03-22 | 2014-07-02 | 哈尔滨工程大学 | 一种基于口令的远程认证协议方法 |
CN104639329A (zh) * | 2015-02-02 | 2015-05-20 | 浙江大学 | 基于椭圆曲线码的用户身份相互认证方法 |
CN105871553A (zh) * | 2016-06-28 | 2016-08-17 | 电子科技大学 | 一种无需用户身份的三因素的远程用户认证方法 |
CN107483195A (zh) * | 2017-09-08 | 2017-12-15 | 哈尔滨工业大学深圳研究生院 | 物联网环境下安全的双方认证与密钥协商协议 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10162943B2 (en) * | 2016-04-27 | 2018-12-25 | Comcast Cable Communications, Llc | Streamlined digital rights management |
-
2018
- 2018-09-03 CN CN201811019796.XA patent/CN109347626B/zh active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2093927A4 (en) * | 2007-10-29 | 2013-10-09 | Huawei Tech Co Ltd | AUTHENTICATION METHOD, SYSTEM, SERVER AND USER N UD |
CN103905437A (zh) * | 2014-03-22 | 2014-07-02 | 哈尔滨工程大学 | 一种基于口令的远程认证协议方法 |
CN104639329A (zh) * | 2015-02-02 | 2015-05-20 | 浙江大学 | 基于椭圆曲线码的用户身份相互认证方法 |
CN105871553A (zh) * | 2016-06-28 | 2016-08-17 | 电子科技大学 | 一种无需用户身份的三因素的远程用户认证方法 |
CN107483195A (zh) * | 2017-09-08 | 2017-12-15 | 哈尔滨工业大学深圳研究生院 | 物联网环境下安全的双方认证与密钥协商协议 |
Non-Patent Citations (2)
Title |
---|
一种基于椭圆曲线的轻量级身份认证及密钥协商方案;郭松辉;《计算机科学》;20150115(第1期);全文 * |
无线传感器网络中一种新的无条件安全密钥协商模型;吕秋云;《传感技术学报》;20140615(第6期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN109347626A (zh) | 2019-02-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109347626B (zh) | 一种具有反跟踪特性的安全身份认证方法 | |
Li et al. | A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems | |
CN111797427B (zh) | 一种兼顾隐私保护的区块链用户身份监管方法及系统 | |
CN109327313A (zh) | 一种具有隐私保护特性的双向身份认证方法、服务器 | |
Jiang et al. | Two-factor authentication protocol using physical unclonable function for IoV | |
US20170142082A1 (en) | System and method for secure deposit and recovery of secret data | |
Chen et al. | A two‐factor authentication scheme with anonymity for multi‐server environments | |
JP2009529832A (ja) | 発見不可能、即ち、ブラック・データを使用するセキュアなデータ通信 | |
US10091189B2 (en) | Secured data channel authentication implying a shared secret | |
Cui et al. | Chaotic map-based authentication scheme using physical unclonable function for internet of autonomous vehicle | |
CN101282216B (zh) | 带隐私保护的基于口令认证的三方密钥交换方法 | |
CN113727296A (zh) | 一种智慧医疗中基于无线传感器系统的匿名隐私保护认证协议方法 | |
Noh et al. | Secure authentication and four-way handshake scheme for protected individual communication in public wi-fi networks | |
He et al. | An accountable, privacy-preserving, and efficient authentication framework for wireless access networks | |
Niu et al. | A novel user authentication scheme with anonymity for wireless communications | |
CN111416712B (zh) | 基于多个移动设备的量子保密通信身份认证系统及方法 | |
CN116388995A (zh) | 一种基于puf的轻量级智能电网认证方法 | |
CN106230840B (zh) | 一种高安全性的口令认证方法 | |
CN109522689B (zh) | 移动办公环境下的多因子强身份认证方法 | |
Bansal et al. | Lightweight authentication protocol for inter base station communication in heterogeneous networks | |
Farash | Cryptanalysis and improvement of ‘an improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks’ | |
Juang et al. | Efficient 3GPP authentication and key agreement with robust user privacy protection | |
Chuang et al. | Cryptanalysis of four biometric based authentication schemes with privacy-preserving for multi-server environment and design guidelines | |
Hwang et al. | A new efficient authentication protocol for mobile networks | |
Li | A secure chaotic maps‐based privacy‐protection scheme for multi‐server environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information |
Inventor after: Hu Haibin Inventor after: Chen Si Inventor after: Lv Qiuyun Inventor before: Lv Qiuyun Inventor before: Chen Si Inventor before: Hu Haibin |
|
CB03 | Change of inventor or designer information | ||
TR01 | Transfer of patent right |
Effective date of registration: 20230908 Address after: Room 2002, Zone A, Huazhou Business Center, No. 1038 Jiangnan Avenue, Changhe Street, Binjiang District, Hangzhou City, Zhejiang Province, 310051 Patentee after: Zhejiang Qiangua Information Technology Co.,Ltd. Address before: 310018 No. 2 street, Xiasha Higher Education Zone, Hangzhou, Zhejiang Patentee before: HANGZHOU DIANZI University |
|
TR01 | Transfer of patent right |