CN112423295A - Lightweight security authentication method and system based on block chain technology - Google Patents
Lightweight security authentication method and system based on block chain technology Download PDFInfo
- Publication number
- CN112423295A CN112423295A CN202011248305.6A CN202011248305A CN112423295A CN 112423295 A CN112423295 A CN 112423295A CN 202011248305 A CN202011248305 A CN 202011248305A CN 112423295 A CN112423295 A CN 112423295A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- intelligent mobile
- certificate
- message
- certificates
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
A lightweight security authentication method and system based on block chain technology, the authentication method includes storing certificates of intelligent mobile terminals in classification, so that certificates of the same organization information are stored in the same block chain; constructing an identity authentication message, signing the identity authentication message of the newly-accessed intelligent mobile terminal B by using an ECC algorithm, and sending the signed identity authentication message to the opposite intelligent mobile terminal; the intelligent mobile terminal A receives the message, detects the certificate of the intelligent mobile terminal B, judges whether the certificate is a legal certificate or not, if the certificate is successfully authenticated by a legal rule, and if the certificate is illegal, the intelligent mobile terminal A refuses to join the network; the certificates are broadcasted to update the certificates of other intelligent mobile terminals, and the transmitted certificates are encrypted by using the CTR mode based on the SM4 algorithm, so that real-time updating and safe transmission of the certificates are realized. The invention also provides a system for realizing the method. The invention can realize higher security by safer certificate storage, shorter key length and smaller calculation amount.
Description
Technical Field
The invention belongs to the field of mobile internet, and relates to a lightweight security authentication method and system based on a block chain technology.
Background
In recent years, with the rapid development of mobile internet and the rapid growth of mobile applications, Android devices have become the most common internet access tools for people. Under the background of the era of mobile internet, intelligent mobile terminals have been incorporated into people's daily lives. People use the intelligent mobile terminal to carry out mobile payment, online shopping, online meeting, movie and television shooting and the like. In modern smart cities, Android devices interact remotely through base stations, with the devices under each base station communicating over a single wireless transmission channel, such as a cellular network. Due to the openness and the expandability of the Android intelligent mobile terminal, the Android equipment is vulnerable to attackers. A large number of manufacturers choose to develop their mobile devices by customizing the original Android system, which also results in a severe disruption of the Android ecosystem. In order to ensure the safety of the Android device, identity authentication of the Android device is an effective solution. The identity authentication can prevent unauthorized users from entering the system, and ensure that only the intelligent mobile terminal with legal identity can enter the block chain network. The identity authentication is to verify the identity of the intelligent mobile terminal by issuing a certificate and a certificate signature. Theoretically, the method can effectively prevent illegal intelligent mobile terminals from entering the network, and meanwhile, attackers are prevented from stealing authentication information.
Traditional authentication mechanisms can resist partial attacks, but still have many problems: first, a large amount of computing and storage resources are wasted. The traditional user authentication protocol based on the RSA public key system and the Diffie-Hellman key agreement consumes a lot of computing and storage resources, which requires higher hardware equipment requirements for the intelligent mobile terminal. Meanwhile, the operation efficiency of the Android device during the authentication of the intelligent mobile terminal is greatly reduced, and the intelligent mobile terminal cannot perform big data analysis or massive information processing. Second, the security is low. The traditional authentication mechanism can only resist some common attacks, but has no resistance to some more complex attacks or needs to consume huge resources. Third, it is easily tampered with. Due to the openness of the Android device, when the Android device sends a message to other devices, the message is easily tampered, and the Android device cannot verify the correctness of the message. If the information transmitted between the intelligent mobile terminals cannot be encrypted and protected, great potential safety hazards exist, and immeasurable loss is generated. In the current identity authentication mechanism, the problem that a key is easily tampered in the authentication process between Android devices is not solved, and meanwhile, the authentication security cannot be realized. Using only a resource-intensive authentication scheme is not sufficient to protect smart mobile terminal users from attacks.
Disclosure of Invention
The present invention provides a lightweight security authentication method and system based on a block chain technique, which can achieve higher security with safer certificate storage, shorter key length, and smaller calculation amount, aiming at the problems of higher storage resource consumption and lower security of the identity authentication mechanism in the prior art.
In order to achieve the purpose, the invention has the following technical scheme:
a lightweight security authentication method based on a block chain technology comprises the following steps:
step one, classified storage is carried out on intelligent mobile terminal certificates, so that the intelligent mobile terminal certificates with the same organization information are stored in the same block chain;
secondly, constructing an identity authentication message, signing the identity authentication message of the newly-accessed intelligent mobile terminal B by using an ECC algorithm, and sending the signed identity authentication message to the opposite intelligent mobile terminal A;
step three, the intelligent mobile terminal A receives the signed identity authentication message, detects the certificate of the intelligent mobile terminal B, judges whether the certificate is a legal certificate, if the certificate is legal, the intelligent mobile terminal A successfully authenticates, adds the number of the intelligent mobile terminal B to the list of the intelligent mobile terminals which have accessed the network, and if the certificate is illegal, refuses to join the network;
and step four, broadcasting the certificate of the intelligent mobile terminal B to update the certificates of other intelligent mobile terminals, and encrypting the transmitted certificate by using the CTR mode based on the SM4 algorithm to realize real-time updating and safe transmission of the certificate.
Preferably, in the authentication process, whether the intelligent mobile terminals of the two parties belong to a unified organization is judged, and if the intelligent mobile terminals of the two parties belong to the unified organization, the inquiry or the exchange of certificates is allowed; then distributing the certificate, and generating an X.509CA root certificate in a PEM format by an OpenSSL (public switched socket layer socket) according to a self-issuing function; and the CA issues the certificate request files of the intelligent mobile terminal A and the intelligent mobile terminal B to generate digital certificates.
Preferably, in the second step, the intelligent mobile terminal a first generates a random number r, and sends the random number r and the identity identifier IDATime stamp TACombining the identity authentication request messages; then, the message m is generated by using the public key encryption of the intelligent mobile terminal B and the private key signature of the intelligent mobile terminal Ar。
Preferably, the message mrCalculated according to the following formula:
mr={EprivA(EpubB(r||IDA||TA))}
where, | | represents a data connector, EprivA(EpubB(r||IDA||TA) ID) an identity number representing the smart mobile terminal aATime stamp TAAnd encrypting the random number r by a public key of the intelligent mobile terminal B and signing by a private key of the intelligent mobile terminal A.
Preferably, in the third step, the public key of the smart mobile terminal a is used to decrypt the authentication request message m sent by the smart mobile terminal BrThe calculation formula is as follows:
DpubA((r||IDA||TA))=(r||IDA||TA)
where | represents a data connector.
Preferably, the third step is to compare the timestamp T of the smart mobile terminal a firstATimestamp T with intelligent mobile terminal BBIf T isB<TAIf the difference value of the two is within a reasonable time delay range, verifying whether the random number r is used by the intelligent mobile terminal A; if the random number r is not used, the intelligent mobile terminal A adds the random number r to a random number list used by the intelligent mobile terminal A through verification, and adds the serial number ID of the intelligent mobile terminal AAAdding the calculation formula into the intelligent mobile terminal list as follows:
in the formula, U is an intelligent mobile terminal list, and R is a random number list used by the intelligent mobile terminal a.
Preferably, the third step authenticates the certificate of the smart mobile terminal a according to the following formula:
Verk(A,S)=1→mr={EprivB(EpubA(r′||IDB||TB))}
authenticating the certificate A of the intelligent mobile terminal according to the prestored ECC digital certificate, if the Ver iskIf the (A, S) is 1, the verification is successful; the intelligent mobile terminal B sends an authentication request message m of the intelligent mobile terminal B to the intelligent mobile terminal Ar′;
Repeating the authentication process to realize bidirectional authentication between the intelligent mobile terminals;
the following calculation verifies whether the signature of the intelligent mobile terminal A is correct:
preferably, the step four of CTR mode encryption based on SM4 algorithm includes the following steps:
the intelligent mobile terminal A firstly cuts the plaintext data P into n plaintext variables P1,P2,...,PnGenerating Key X of HMAC0=Ek(T0) Performing hash calculation on the counting sequenceThen, for plaintext data i 1, 2.., n-1, ciphertext variables are generated:1, 2.. n-1, generating cipher text variables for less than 128-bit plaintext blocksThen, the ciphertext variable is intercepted according to the plaintext data to obtain a final ciphertext variable Cn(ii) a And then carrying out HMAC (high-rate memory access) on the ciphertext message and the initial counter to obtain H ═ HMAC (X)0,C||T0) (ii) a Finally, the cipher text variable, the counter and the message abstract variable are connected C1||C2||...Cn||T0And | H forms ciphertext data and sends the ciphertext data to the intelligent mobile terminal B.
Preferably, in the fourth step, the intelligent mobile terminal B first decomposes the received message into a ciphertext message C and an initial counter T0Generating a key X of the HMAC simultaneously with a message digest variable H0=Ek(T0) (ii) a Then generating a ciphertext message and a message digest of the initial counter; judging whether the message digest is consistent with the received message digest, and if not, directly discarding the plaintext message; if they are consistent, the cipher text is countedDecomposition of data into ciphertext variables C1,C2,...,CnAnd encrypting the counting sequenceGenerating plaintext variables for plaintext dataIntercepting plaintext variable to generate Pn(ii) a Finally, P is added1,P2,...PnAnd forming plaintext data to complete the safe communication between the intelligent mobile terminal A and the intelligent mobile terminal B.
The invention also provides a lightweight security authentication system based on the block chain technology, which comprises the following steps:
the intelligent mobile terminal certificate classified storage module is used for storing the intelligent mobile terminal certificates in a classified manner, so that the intelligent mobile terminal certificates with the same organization information are stored in the same block chain;
the identity authentication message construction module is used for signing the identity authentication message of the newly-accessed intelligent mobile terminal B by utilizing an ECC algorithm and sending the signature to the opposite intelligent mobile terminal A;
the authentication module is used for detecting the certificate of the intelligent mobile terminal B after the intelligent mobile terminal A receives the signature, judging whether the certificate is a legal certificate or not, if the certificate is legal, the intelligent mobile terminal A successfully authenticates, the number of the intelligent mobile terminal B is added to the list of the accessed intelligent mobile terminals, and if the certificate is illegal, the intelligent mobile terminal A refuses to join the network;
and the certificate updating and transmitting module is used for broadcasting the certificate of the intelligent mobile terminal B to update the certificates of other intelligent mobile terminals, and encrypting the transmitted certificate by using the CTR mode based on the SM4 algorithm to realize real-time updating and safe transmission of the certificate.
Compared with the prior art, the invention has the following beneficial effects:
1) has the characteristics of light weight and safety. The invention does not need to consume a large amount of computing resources, converts the long secret key and the RSA digital certificate with low safety of the traditional method into the ECC digital certificate on the whole thinking, has less computing resource consumption by using an identity authentication mechanism based on the ECC algorithm, and has the speed of generating the secret key about 10 times of that of the RSA algorithm. And the same security can be realized under the condition of shorter key length, and the authentication speed is greatly improved.
2) Has the characteristic of being not tampered. The invention stores the certificate in the block chain, classifies and stores the certificate according to different organization information, and effectively improves the access efficiency of the certificate by storing and inquiring the certificate through the block chain. In addition, the block chain has the characteristic of being not tampered, so that the certificate is prevented from being tampered in the authentication process.
3) A highly robust message broadcast. The invention can encrypt the broadcast message of the certificate which is successfully authenticated, can encrypt and decrypt in parallel by the communication encryption method based on the SM4-CTR mode, can improve the encryption and decryption efficiency, and realizes the safe communication method which supports high real-time performance and tolerates disorder of the ciphertext.
Drawings
FIG. 1 is an overall flow diagram of the security authentication method of the present invention;
FIG. 2 is a schematic diagram of the smart mobile terminal certificate store of the present invention;
FIG. 3 is a flowchart illustrating the identity authentication of an intelligent mobile terminal according to the present invention;
FIG. 4 is a time consuming diagram of the present invention for verifying a signature.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples.
The lightweight security authentication method based on the block chain technology mainly comprises three stages: pre-stored certificate information, identity authentication and broadcasting certificate encryption based on the CTR mode.
Firstly, storing certificates of two authentication parties to a block chain to realize high security of the certificates in the authentication process, then realizing lightweight security characteristics by using an authentication mechanism based on an ECC algorithm, completing the lightweight security authentication process by encrypting the cochain intelligent mobile terminal broadcasting the certificates to other nodes after the authentication is successful, and simultaneously giving a specific attack model.
The method and the device are realized by adopting ECC authentication scheme codes developed by an OpenSSL development software package in the embodiment, and can distribute certificates for the intelligent mobile terminal.
Referring to fig. 1, the lightweight security authentication method based on the block chain technology of the present invention includes the following steps:
step one, storing a certificate;
(1a) private keys of the authentication center CA and the intelligent mobile terminal A, B are generated by using an ECC key generation algorithm, and meanwhile, a CA root certificate is generated by using the self-issuing certificate function of the OpenSSL software library. A certificate request file is generated through a private key of the smart mobile terminal A, B, and then the CA is used to issue the request file of the smart mobile terminal A, B to generate an ECC digital certificate of the smart mobile terminal A, B.
(1b) And in the subsequent authentication process, only two parties with the same organization attribute can execute inquiry and exchange operations to find the storage block of the other party and acquire the certificate information.
Referring to fig. 2, an intelligent mobile terminal has a corresponding organization information, and the intelligent mobile terminals with different organization information are classified and stored in different block chains.
Step two, identity authentication;
(2a) constructing an identity authentication request message according to the result of (1b) the intelligent mobile terminal storing the certificate information, wherein the identity authentication request message comprises a random number r and an identity identifier IDATime stamp TAAnd encrypting the identity authentication request message by using an ECC algorithm and sending the encrypted identity authentication request message to the intelligent mobile terminal B. After the intelligent mobile terminal B decrypts the message, firstly, whether the timestamp of the intelligent mobile terminal A is in a time delay range is judged, if the timestamp of the intelligent mobile terminal A meets the requirement, whether the random number is used is judged, and if not, the authentication fails. And if the random number is not used, judging the validity of the certificate of the intelligent mobile terminal A by using an ECDSA signature algorithm. And if the certificate is legal, performing identity authentication of the intelligent mobile terminal A, otherwise, failing to perform authentication.
Referring to fig. 3, the steps of performing identity authentication on the intelligent mobile terminal in the present invention are as follows:
(2a1) encrypting the identity authentication request message:
mr={EprivA(EpubB(r||IDA||TA))} <1>
(2a2) decrypting the identity authentication request message by using the public key of the intelligent mobile terminal A:
DpubA((r||IDA||TA))=(r||IDA||TA) <2>
(2a3) the timestamp is within the experimental range and the random number is not used, add the smart mobile terminal number and the random number to the used list:
(2a4) judging whether the certificate is legal:
(2b) and authenticating the certificate of the intelligent mobile terminal A according to the prestored ECC digital certificate. If VerkIf (A, S) ═ 1, the verification is successful. The intelligent mobile terminal B sends an authentication request message m of the intelligent mobile terminal B to the intelligent mobile terminal Ar' repeating the authentication process to realize the bidirectional authentication between the intelligent mobile terminals.
Step three, encrypting a broadcast certificate based on the CTR mode;
(3a) and (3) obtaining plaintext data of the intelligent mobile terminal A in the step (2b), carrying out hash calculation on the counter sequence by utilizing a hash algorithm, and carrying out XOR on the counter sequence and the plaintext sequence to generate a ciphertext. And then intercepting the ciphertext variable according to the plaintext data to obtain a final ciphertext variable. And finally, carrying out HMAC on the ciphertext message and the initial counter to obtain a message digest variable H.
(3a1) Cutting plaintext data P into n plaintext variables P1,P2,P3,...,Pn;
(3a2) Performing hash calculation on the counting sequence:
(3a3) generating a ciphertext variable:
(3a4) generating a message digest variable:
H=HMAC(X0,C||T0) <7>
and connecting the ciphertext data, the counter and the message digest variable to form ciphertext data and sending the ciphertext data to the intelligent mobile terminal B.
(3b) And receiving the ciphertext data, decomposing the message, and generating the ciphertext message and the message digest of the initial counter. And judging whether the message digest is consistent with the received message digest. If so, the count sequence is encrypted. Otherwise, the ciphertext data is discarded. And generating a plaintext variable for the ciphertext data, and intercepting the plaintext variable.
(3b1) And (3) generating a message abstract:
H′=HMAC(X0,C||T0) <8>
(3b2) encryption of the count sequence:
(3b3) generating a plaintext variable:
finally, intercepting the plaintext variable P1,P2,P3,...,PnAnd forming plaintext data to finish encryption of the broadcast certificates of the other intelligent mobile terminals of the intelligent mobile terminal A.
The invention also provides a lightweight security authentication system based on the block chain technology, which comprises the following steps:
the intelligent mobile terminal certificate classified storage module is used for storing the intelligent mobile terminal certificates in a classified manner, so that the intelligent mobile terminal certificates with the same organization information are stored in the same block chain;
the identity authentication message construction module is used for signing the identity authentication message of the newly-accessed intelligent mobile terminal B by utilizing an ECC algorithm and sending the signature to the opposite intelligent mobile terminal A;
the authentication module is used for detecting the certificate of the intelligent mobile terminal B after the intelligent mobile terminal A receives the signature, judging whether the certificate is a legal certificate or not, if the certificate is legal, the intelligent mobile terminal A successfully authenticates, the number of the intelligent mobile terminal B is added to the list of the accessed intelligent mobile terminals, and if the certificate is illegal, the intelligent mobile terminal A refuses to join the network;
and the certificate updating and transmitting module is used for broadcasting the certificate of the intelligent mobile terminal B to update the certificates of other terminals, and encrypting the transmitted certificate by using the CTR mode based on the SM4 algorithm to realize real-time updating and safe transmission of the certificate.
Referring to fig. 4, the length of the ECC key selected by the present invention is 256bits, and the length of the RSA key is 2048bits, and compared with the conventional RSA-based authentication method, the authentication method of the present invention can achieve faster authentication with a shorter key length, and when the number of experiments is larger, the average time consumed by the ECC authentication method is shorter.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the technical solution of the present invention, and it should be understood by those skilled in the art that the technical solution can be modified and replaced by a plurality of simple modifications and replacements without departing from the spirit and principle of the present invention, and the modifications and replacements also fall within the protection scope covered by the claims.
Claims (10)
1. A lightweight security authentication method based on a block chain technology is characterized by comprising the following steps:
step one, classified storage is carried out on intelligent mobile terminal certificates, so that the intelligent mobile terminal certificates with the same organization information are stored in the same block chain;
secondly, constructing an identity authentication message, signing the identity authentication message of the newly-accessed intelligent mobile terminal B by using an ECC algorithm, and sending the signed identity authentication message to the opposite intelligent mobile terminal A;
step three, the intelligent mobile terminal A receives the signed identity authentication message, detects the certificate of the intelligent mobile terminal B, judges whether the certificate is a legal certificate, if the certificate is legal, the intelligent mobile terminal A successfully authenticates, adds the number of the intelligent mobile terminal B to the list of the intelligent mobile terminals which have accessed the network, and if the certificate is illegal, refuses to join the network;
and step four, broadcasting the certificate of the intelligent mobile terminal B to update the certificates of other intelligent mobile terminals, and encrypting the transmitted certificate by using the CTR mode based on the SM4 algorithm to realize real-time updating and safe transmission of the certificate.
2. The lightweight security authentication method based on the blockchain technology of claim 1, wherein: judging whether the intelligent mobile terminals of the two parties belong to a unified organization or not in the authentication process, and if so, allowing the inquiry or exchange of certificates; then distributing the certificate, and generating an X.509CA root certificate in a PEM format by the OpenSSL according to the self-issuing function; and the CA issues the certificate request files of the intelligent mobile terminal A and the intelligent mobile terminal B to generate digital certificates.
3. The lightweight security authentication method based on the blockchain technology of claim 1, wherein: secondly, the intelligent mobile terminal A firstly generates a random number r and sends the random number r and the identity identifier IDATime stamp TACombining the identity authentication request messages; then, the message m is generated by using the public key encryption of the intelligent mobile terminal B and the private key signature of the intelligent mobile terminal Ar。
4. The blockchain-based technology of claim 3A lightweight security authentication method for a surgery, characterized in that said message mrCalculated according to the following formula:
mr={EprivA(EpubB(r||IDA||TA))}
where, | | represents a data connector, EprivA(EpubB(r||IDA||TA) ID) an identity number representing the smart mobile terminal aATime stamp TAAnd encrypting the random number r by a public key of the intelligent mobile terminal B and signing by a private key of the intelligent mobile terminal A.
5. The lightweight security authentication method based on the blockchain technology as claimed in claim 3, wherein the third step decrypts the authentication request message m sent by the smart mobile terminal B by using the public key of the smart mobile terminal arThe calculation formula is as follows:
DpubA((r||IDA||TA))=(r||IDA||TA)
where | represents a data connector.
6. The lightweight security authentication method based on blockchain technology as claimed in claim 1, wherein said third step is to compare the timestamp T of the smart mobile terminal a firstATimestamp T with intelligent mobile terminal BBIf T isB<TAIf the difference value of the two is within a reasonable time delay range, verifying whether the random number r is used by the intelligent mobile terminal A; if the random number r is not used, the intelligent mobile terminal A adds the random number r to a random number list used by the intelligent mobile terminal A through verification, and adds the serial number ID of the intelligent mobile terminal AAAdding the calculation formula into the intelligent mobile terminal list as follows:
in the formula, U is an intelligent mobile terminal list, and R is a random number list used by the intelligent mobile terminal a.
7. The lightweight security authentication method based on the blockchain technology as claimed in claim 1, wherein the certificate of the smart mobile terminal a is authenticated according to the following formula:
Verk(A,S)=1→mr={EprivB(EpubA(r′||IDB||TB))}
authenticating the certificate A of the intelligent mobile terminal according to the prestored ECC digital certificate, if the Ver iskIf the (A, S) is 1, the verification is successful; the intelligent mobile terminal B sends an authentication request message m of the intelligent mobile terminal B to the intelligent mobile terminal Ar′;
Repeating the authentication process to realize bidirectional authentication between the intelligent mobile terminals;
the following calculation verifies whether the signature of the intelligent mobile terminal A is correct:
8. the lightweight security authentication method based on blockchain technology as claimed in claim 1, wherein said step four of CTR mode encryption based on SM4 algorithm comprises the steps of:
the intelligent mobile terminal A firstly cuts the plaintext data P into n plaintext variables P1,P2,...,PnGenerating Key X of HMAC0=Ek(T0) Performing hash calculation on the counting sequenceThen, for plaintext data i 1, 2.., n-1, ciphertext variables are generated:generating ciphertext variables for less than 128-bit plaintext blocksThen, the ciphertext variable is intercepted according to the plaintext data to obtain a final ciphertext variable Cn(ii) a And then carrying out HMAC (high-rate memory access) on the ciphertext message and the initial counter to obtain H ═ HMAC (X)0,C||T0) (ii) a Finally, the cipher text variable, the counter and the message abstract variable are connected C1||C2||...Cn||T0And | H forms ciphertext data and sends the ciphertext data to the intelligent mobile terminal B.
9. The lightweight security authentication method based on the block chaining technique as claimed in claim 8, wherein said intelligent mobile terminal B in step four first decomposes the received message into a ciphertext message C and an initial counter T0Generating a key X of the HMAC simultaneously with a message digest variable H0=Ek(T0) (ii) a Then generating a ciphertext message and a message digest of the initial counter; judging whether the message digest is consistent with the received message digest, and if not, directly discarding the plaintext message; if so, decomposing the ciphertext data into ciphertext variables C1,C2,...,CnAnd encrypting the counting sequenceGenerating plaintext variables for plaintext dataIntercepting plaintext variable to generate Pn(ii) a Finally, P is added1,P2,...PnAnd forming plaintext data to complete the safe communication between the intelligent mobile terminal A and the intelligent mobile terminal B.
10. A lightweight security authentication system based on block chaining technology, comprising:
the intelligent mobile terminal certificate classified storage module is used for storing the intelligent mobile terminal certificates in a classified manner, so that the intelligent mobile terminal certificates with the same organization information are stored in the same block chain;
the identity authentication message construction module is used for signing the identity authentication message of the newly-accessed intelligent mobile terminal B by utilizing an ECC algorithm and sending the signature to the opposite intelligent mobile terminal A;
the authentication module is used for detecting the certificate of the intelligent mobile terminal B after the intelligent mobile terminal A receives the signature, judging whether the certificate is a legal certificate or not, if the certificate is legal, the intelligent mobile terminal A successfully authenticates, the number of the intelligent mobile terminal B is added to the list of the accessed intelligent mobile terminals, and if the certificate is illegal, the intelligent mobile terminal A refuses to join the network;
and the certificate updating and transmitting module is used for broadcasting the certificate of the intelligent mobile terminal B to update the certificates of other intelligent mobile terminals, and encrypting the transmitted certificate by using the CTR mode based on the SM4 algorithm to realize real-time updating and safe transmission of the certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011248305.6A CN112423295B (en) | 2020-11-10 | 2020-11-10 | Lightweight security authentication method and system based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011248305.6A CN112423295B (en) | 2020-11-10 | 2020-11-10 | Lightweight security authentication method and system based on block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112423295A true CN112423295A (en) | 2021-02-26 |
CN112423295B CN112423295B (en) | 2022-11-22 |
Family
ID=74781368
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011248305.6A Active CN112423295B (en) | 2020-11-10 | 2020-11-10 | Lightweight security authentication method and system based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112423295B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113595744A (en) * | 2021-09-29 | 2021-11-02 | 北京卓建智菡科技有限公司 | Network access method, device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110598422A (en) * | 2019-08-01 | 2019-12-20 | 浙江葫芦娃网络集团有限公司 | Trusted identity authentication system and method based on mobile digital certificate |
US20200111080A1 (en) * | 2018-10-08 | 2020-04-09 | BitGo Holdings, Inc. | Security Secret Interface and Token Wrap Structure Apparatuses, Methods and Systems |
CN111222174A (en) * | 2019-12-31 | 2020-06-02 | 远光软件股份有限公司 | Joining method, verification method, device and storage medium of block chain node |
CN111222989A (en) * | 2019-12-31 | 2020-06-02 | 远光软件股份有限公司 | Transaction method of multi-channel block chain, electronic device and storage medium |
CN111262872A (en) * | 2020-01-20 | 2020-06-09 | 新晨科技股份有限公司 | Enterprise block chain service platform |
-
2020
- 2020-11-10 CN CN202011248305.6A patent/CN112423295B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200111080A1 (en) * | 2018-10-08 | 2020-04-09 | BitGo Holdings, Inc. | Security Secret Interface and Token Wrap Structure Apparatuses, Methods and Systems |
CN110598422A (en) * | 2019-08-01 | 2019-12-20 | 浙江葫芦娃网络集团有限公司 | Trusted identity authentication system and method based on mobile digital certificate |
CN111222174A (en) * | 2019-12-31 | 2020-06-02 | 远光软件股份有限公司 | Joining method, verification method, device and storage medium of block chain node |
CN111222989A (en) * | 2019-12-31 | 2020-06-02 | 远光软件股份有限公司 | Transaction method of multi-channel block chain, electronic device and storage medium |
CN111262872A (en) * | 2020-01-20 | 2020-06-09 | 新晨科技股份有限公司 | Enterprise block chain service platform |
Non-Patent Citations (2)
Title |
---|
杨涵麟: "基于区块链的群机器人多目标决策安全控制架构及算法", 《CNKI中国硕士学位论文全文数据库信息科技辑》 * |
邓伟,闻楷等: "配电网数据加密认证方案的设计与分析", 《软件》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113595744A (en) * | 2021-09-29 | 2021-11-02 | 北京卓建智菡科技有限公司 | Network access method, device, electronic equipment and storage medium |
CN113595744B (en) * | 2021-09-29 | 2021-12-31 | 北京卓建智菡科技有限公司 | Network access method, device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112423295B (en) | 2022-11-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112491846B (en) | Cross-chain block chain communication method and device | |
CN109559122B (en) | Block chain data transmission method and block chain data transmission system | |
CN108810895B (en) | Wireless Mesh network identity authentication method based on block chain | |
EP0651533B1 (en) | Method and apparatus for privacy and authentication in a mobile wireless network | |
EP2416524B1 (en) | System and method for secure transaction of data between wireless communication device and server | |
CN105049401B (en) | A kind of safety communicating method based on intelligent vehicle | |
CN113301022B (en) | Internet of things equipment identity security authentication method based on block chain and fog calculation | |
CN111614621B (en) | Internet of things communication method and system | |
CN113630248B (en) | Session key negotiation method | |
CN113612610B (en) | Session key negotiation method | |
CN112187450B (en) | Method, device, equipment and storage medium for key management communication | |
CN114826656A (en) | Trusted data link transmission method and system | |
Zhang et al. | A Novel Privacy‐Preserving Authentication Protocol Using Bilinear Pairings for the VANET Environment | |
CN110999202A (en) | Computer-implemented system and method for highly secure, high-speed encryption and transmission of data | |
CN111049738B (en) | E-mail data security protection method based on hybrid encryption | |
CN111416712B (en) | Quantum secret communication identity authentication system and method based on multiple mobile devices | |
US11240661B2 (en) | Secure simultaneous authentication of equals anti-clogging mechanism | |
CN116318702A (en) | Multi-particle GHZ state-based semi-quantum ring signature method and device | |
CN114422135A (en) | Verifiable accidental transmission method based on elliptic curve | |
CN112423295B (en) | Lightweight security authentication method and system based on block chain technology | |
CN117828673B (en) | Block chain-based data circulation and privacy protection method and device | |
Chen et al. | Provable secure group key establishment scheme for fog computing | |
CN114070549A (en) | Key generation method, device, equipment and storage medium | |
CN118018187A (en) | Agent re-encryption method based on SM9 cooperative algorithm | |
CN113938275B (en) | Quantum homomorphic signature method based on d-dimension Bell state |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |