CN114531680B - Light-weight IBC bidirectional identity authentication system and method based on quantum key - Google Patents
Light-weight IBC bidirectional identity authentication system and method based on quantum key Download PDFInfo
- Publication number
- CN114531680B CN114531680B CN202210216220.2A CN202210216220A CN114531680B CN 114531680 B CN114531680 B CN 114531680B CN 202210216220 A CN202210216220 A CN 202210216220A CN 114531680 B CN114531680 B CN 114531680B
- Authority
- CN
- China
- Prior art keywords
- quantum key
- key
- authentication
- identity
- party
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/20—Information technology specific aspects, e.g. CAD, simulation, modelling, system security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a light-weight IBC bidirectional identity authentication system based on a quantum key, which comprises an authenticator, a verifier, a quantum key wireless application system and a key generation center; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for an authenticator and a verifier; the authentication party and the verification party realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantum key wireless application system and the key generation center. The invention improves and optimizes the IBC authentication technology, thereby reducing redundancy in the identity authentication process, reducing information interaction times of the two sides of the identity authentication, simultaneously encrypting the whole quantum key of the identity authentication without losing security, and being more suitable for wide application in the novel power system distributed new energy access application scene.
Description
Technical Field
The invention relates to the field of quantum secret communication, in particular to a light-weight IBC bidirectional identity authentication system and method based on a quantum key.
Background
The quantum has the inherent properties of inseparable, unmeasurable and unclonable due to the mechanical properties, and has great application value in the field of transmission secret communication. Quantum Key Distribution (QKD) is an important branch in quantum secure communications technology. QKD is the establishment of a secure channel between two users, sharing quantum keys through single photon transmission/reception and key agreement. Such a secure channel necessarily involves an authentication process for both parties.
The traditional communication parties commonly adopt a PKI authentication system and an IBC authentication system. PKI refers to a ubiquitous security infrastructure that implements and provides security services with the concept and technology of public keys. In PKI, the CA authentication center binds the identity information (user name, id card number, etc.) of the user with its public key, so that the function of identity authentication in the network environment can be realized. PKI provides a range of applications (encryption, decryption, signing and verification, etc.) that support public key cryptography. The security service functions which can be supported by the system mainly comprise: identity authentication, data integrity verification, data confidentiality, non-repudiation, and the like. The PKI aims to provide comprehensive security services for various network applications by managing the generation and storage of a secret key, the security of a public key certificate and the like by means of the theoretical basis of public key cryptography, so that the authentication of the identity of a user, the confidentiality, the integrity, the validity and the like of data can be effectively realized.
The IBC authentication is different from PKI authentication scheme, the key idea of the IBC authentication technology is that the certificate is not used in the system any more, but the authentication can be completed through three keys, namely a system master key, a user public key and a private key. The public key of the user is generated by extracting the identity information of the user, and the private key can be calculated by a trusted third party called a private key generator and transmitted to the user through a secure channel. The identity authentication idea realizes the binding of the public key and the identity of the authentication entity, so that the authentication of both sides can be completed without exchanging the public key.
PKI authentication requires a large number of CA certificate exchanges, the key management is complex, and the expenditure on calculation and communication resources is large; the public and private key pairs authenticated by the IBC are stored in the private key generator, so that the problem of key escrow exists, and once the private key generator is cracked, the leakage of all keys can be caused; meanwhile, the IBC algorithm is based on bilinear pair operation, the operation complexity is high, and the existing algorithm is not efficient enough. Therefore, it is important to design a more flexible, secure, and lightweight identity authentication process for the limitations of PKI authentication and IBC authentication.
Disclosure of Invention
In view of the above, the invention aims to provide a light-weight IBC bidirectional identity authentication system and method based on a quantum key, which improves and optimizes an IBC authentication technology, thereby reducing redundancy of an identity authentication process, reducing information interaction times of two sides of the identity authentication, simultaneously encrypting the whole quantum key of the identity authentication, ensuring no loss of safety, and being more suitable for wide application in a novel power system distributed new energy access application scene.
In order to achieve the above purpose, the invention adopts the following technical scheme:
a light-weight IBC bidirectional identity authentication system based on a quantum key comprises an authenticator, a verifier, a quantum key wireless application system and a key generation center; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for an authenticator and a verifier; the authentication party and the verification party realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantum key wireless application system and the key generation center.
Further, the authenticator and the verifier each comprise an encryption module, a decryption module and a database.
Further, the authentication party generates an identity, and the identity consists of a terminal position, a type, an attribute and a number.
Further, the identity label construction specifically comprises: and abstracting the terminal equipment according to the four attributes in the model, and connecting by using the character "/", wherein the obtained character string is the identity of the terminal equipment.
An authentication method of a lightweight IBC bidirectional identity authentication system based on a quantum key comprises the following steps:
step 1: the authentication requests to the quantum key wireless application system to obtain the quantum key;
step 2: the quantum key wireless application system sends a request for generating the quantum key to the key generation center, and the key generation center generates the quantum key and informs the quantum key wireless application system;
step 3: the quantum key wireless application system sends information generated by the quantum key to the authenticator;
step 4: the authentication party requests to acquire an encrypted quantum key from a key generation center, and the key generation center sends the encrypted quantum key to the authentication party;
step 5: the authenticator generates an identity. The encryption module of the authentication party encrypts the identity field by using the encryption quantum key to obtain an encrypted identity field;
step 6: the authentication party sends the encrypted identification field to the verification party;
step 7: the verification requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the verification party;
step 8: decrypting the encrypted identification field by the verifier by using the decryption quantum key to obtain the identification field;
step 9: the verification party compares the identity identification field with the identity identification information in the database module thereof;
step 10: the verification direction key generation center requests to acquire an encrypted quantum key, and the key generation center sends the encrypted quantum key to the verification direction;
step 11: the verification party encrypts the identity authentication success information by using the encryption quantum key to obtain encrypted identity authentication success information;
step 12: the verification party sends encrypted identity authentication success information to the authentication party;
step 13: the authentication requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the authentication party;
step 14: the authentication party decrypts the encrypted identity authentication success information by using the decryption quantum key to obtain the identity authentication success information;
step 15: and obtaining successful information of identity authentication, and storing the successful information into an authenticator database to finish a bidirectional identity authentication flow between the authenticator and the verifier.
Furthermore, the authentication party and the verification party in the authentication method of the light-weight IBC bidirectional identity authentication system based on the quantum key realize the identity authentication information interaction and the quantum key interaction in a wireless communication mode, and are suitable for the application scene of the novel power system distributed new energy access service.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention adopts a wireless communication mode to realize the identity authentication information interaction between the authentication party and the verification party, and the quantum key interaction between the authentication party and the verification party as well as the quantum key wireless application system and the key generation center, thereby expanding the application range of power service, being more flexible to deploy and being applicable to a distributed new energy access scene;
2. according to the invention, the identity authentication information interaction between the authentication party and the verification party adopts quantum key encryption and decryption, so that the risk that the identity authentication information is intercepted and tampered is avoided, and the safety of the identity authentication interaction is improved;
3. the authentication is completed only by 1 time of identity identification transmission and confirmation between the authentication party and the verification party, so that the weight reduction of the authentication is realized in a true sense.
Drawings
Fig. 1 is a quantum key distribution network architecture diagram for a distributed new energy access scene provided by an embodiment of the present invention;
FIG. 2 is a flow chart of a lightweight IBC bidirectional identity authentication method based on a quantum key, which is provided by the embodiment of the invention;
fig. 3 is a schematic diagram of identity construction for a distributed new energy access service according to an embodiment of the present invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings and examples.
Referring to fig. 1, the invention provides an example of a light-weight IBC bidirectional identity authentication system based on a quantum key, wherein an authenticator is a distributed new energy service terminal, a verifier is a distributed new energy service master station, a quantum key wireless application system and a key generation center are distributed new energy background service systems; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for the distributed new energy business terminal and the master station; the distributed new energy business terminal and the master station realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantity background service system.
Referring to fig. 2, in this embodiment, there is also provided an authentication method of a lightweight IBC bidirectional identity authentication system based on a quantum key, including the following steps:
step 1: the distributed new energy service terminal requests to the quantum key wireless application system to obtain the quantum key through the wireless network, and the quantum key wireless application system transmits whether the distributed new energy service terminal is permitted to obtain the quantum key or not to the distributed new energy service terminal. And executing the step 2 if the permission is granted, otherwise, ending.
Step 2: the quantum key wireless application system agrees with the request of obtaining the quantum key of the distributed new energy business terminal, and sends the request of generating the quantum key to the key generating center, and the key generating center utilizes devices such as a random number generator and the like to generate the quantum key. After the quantum key is generated, the key generation center informs the quantum key wireless application system that the quantum key is generated.
Step 3: after receiving the information generated by the quantum key of the key generation center, the quantum key wireless application system forwards the information generated by the quantum key to the distributed new energy service terminal. After confirming the information, the distributed new energy service terminal replies to the quantum key wireless application system.
Step 4: the distributed new energy business terminal sends a request for acquiring the encrypted quantum key to the key generation center, and the key generation center sends the encrypted quantum key to the distributed new energy business terminal.
Step 5: and the distributed new energy service terminal generates an identity. The identity mark fully combines the service characteristics of distributed new energy access, and consists of terminal position, type, attribute and number, and is particularly shown in figure 3.
Preferably, in this embodiment, the location information is that the specific location of the distributed new energy terminal device is familiar, and longitude and latitude, geographic location name, even network address, etc. can be selected according to different platforms, and is represented by field location; the attribute of the type of the distributed new energy equipment is mainly used for distinguishing the type of the distributed new energy equipment, such as sensing equipment, digital equipment, controllers and the like, and is defined by a field type; the field of the attribute of the distributed new energy equipment is mainly used for expressing the specific functions of the equipment, such as temperature acquisition, humidity acquisition, illumination intensity acquisition, audio acquisition and the like, and is expressed by a field attribute; finally, because the same type of equipment exists in the same range of the internet of things and is used repeatedly in a large amount, for example, a plurality of temperature sensors of the same type are placed at the same position, in order to distinguish the distributed new energy equipment, the equipment of the same type needs to be numbered and distinguished, and the equipment is represented by a deviceID field. And abstracting the distributed new energy terminal equipment according to the four attributes in the model, and connecting by using a character 'v', wherein the obtained character string is the identity of the distributed new energy terminal equipment.
The encryption module of the distributed new energy service terminal encrypts the identity field by using the encryption quantum key acquired by the key generation center to obtain an encrypted identity field.
Step 6: after the encrypted identification field is obtained, the distributed new energy service terminal sends the encrypted identification field to the distributed new energy service master station.
Step 7: the distributed new energy business master station receives the encrypted identification field sent by the distributed new energy business terminal, and forwards the encrypted identification field to the key generation center to request to obtain the decryption quantum key. And the key generation center sends a decryption quantum key to the distributed new energy service master station according to the received encrypted identification field.
Step 8: and the distributed new energy service master station receives the decryption quantum key from the key generation center, and decrypts the encrypted identity field to obtain the identity field.
Step 9: the distributed new energy service master station compares the obtained identity mark field with the identity mark information in the database module thereof, and if the comparison is successful, the identity authentication is successful; otherwise, ending.
Step 10: after the comparison is successful, the distributed new energy service master station sends a request for acquiring the encrypted quantum key to the key generation center, and the key generation center sends the encrypted quantum key to the distributed new energy service master station.
Step 11: the encryption module of the distributed new energy service master station encrypts the identity authentication success information by using the encryption quantum key acquired by the key generation center to obtain the encrypted identity authentication success information.
Step 12: after the encrypted identity authentication success information is obtained, the distributed new energy service master station sends the encrypted identity authentication success information to the distributed new energy service terminal.
Step 13: the distributed new energy business terminal receives the encrypted identity authentication success information sent by the distributed new energy business master station, and forwards the encrypted identity authentication success information to the key generation center to request to obtain the decryption quantum key. And the key generation center sends a decryption quantum key to the distributed new energy service terminal according to the received encrypted identity authentication success information.
Step 14: and the distributed new energy service terminal receives the decryption quantum key from the key generation center, and decrypts the encrypted identity authentication success information to obtain the identity authentication success information.
Step 15: and obtaining successful identity authentication information, and storing the successful identity authentication information into a distributed new energy business terminal database to finish a bidirectional identity authentication process between the distributed new energy business terminal and the master station.
The foregoing description is only of the preferred embodiments of the invention, and all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.
Claims (5)
1. The light-weight IBC bidirectional identity authentication method based on the quantum key is characterized by comprising the following steps of:
step 1: the authentication requests to the quantum key wireless application system to obtain the quantum key;
step 2: the quantum key wireless application system sends a request for generating the quantum key to the key generation center, and the key generation center generates the quantum key and informs the quantum key wireless application system;
step 3: the quantum key wireless application system sends information generated by the quantum key to the authenticator;
step 4: the authentication party requests to acquire an encrypted quantum key from a key generation center, and the key generation center sends the encrypted quantum key to the authentication party;
step 5: the authentication party generates an identity mark, and an encryption module of the authentication party encrypts an identity mark field by using an encryption quantum key to obtain an encrypted identity mark field;
step 6: the authentication party sends the encrypted identification field to the verification party;
step 7: the verification requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the verification party;
step 8: decrypting the encrypted identification field by the verifier by using the decryption quantum key to obtain the identification field;
step 9: the verification party compares the identity identification field with the identity identification information in the database module thereof;
step 10: the verification direction key generation center requests to acquire an encrypted quantum key, and the key generation center sends the encrypted quantum key to the verification direction;
step 11: the verification party encrypts the identity authentication success information by using the encryption quantum key to obtain encrypted identity authentication success information;
step 12: the verification party sends encrypted identity authentication success information to the authentication party;
step 13: the authentication requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the authentication party;
step 14: the authentication party decrypts the encrypted identity authentication success information by using the decryption quantum key to obtain the identity authentication success information;
step 15: and obtaining successful information of identity authentication, and storing the successful information into an authenticator database to finish a bidirectional identity authentication flow between the authenticator and the verifier.
2. A system for implementing the quantum key based lightweight IBC two-way identity authentication method of claim 1, comprising an authenticator, a verifier, a quantum key wireless application system and a key generation center; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for an authenticator and a verifier; the authentication party and the verification party realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantum key wireless application system and the key generation center.
3. The system of claim 2, wherein the authenticator and the verifier each comprise an encryption module, a decryption module, and a database.
4. The system of claim 2, wherein the authenticator generates an identity consisting of a terminal location, type, attribute, number.
5. The quantum key-based lightweight IBC mutual authentication system according to claim 4, wherein the identity construction is specifically: the terminal equipment is abstracted according to four attributes in the model, and connected by using characters "/", and the obtained character string is the identity of the terminal equipment, wherein the four attributes comprise terminal positions, types, attributes and numbers.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210216220.2A CN114531680B (en) | 2022-03-07 | 2022-03-07 | Light-weight IBC bidirectional identity authentication system and method based on quantum key |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210216220.2A CN114531680B (en) | 2022-03-07 | 2022-03-07 | Light-weight IBC bidirectional identity authentication system and method based on quantum key |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114531680A CN114531680A (en) | 2022-05-24 |
CN114531680B true CN114531680B (en) | 2023-06-27 |
Family
ID=81626246
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210216220.2A Active CN114531680B (en) | 2022-03-07 | 2022-03-07 | Light-weight IBC bidirectional identity authentication system and method based on quantum key |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114531680B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115314278B (en) * | 2022-08-04 | 2023-06-30 | 长扬科技(北京)股份有限公司 | Trusted network connection identity authentication method, electronic equipment and storage medium |
CN117527208B (en) * | 2023-10-27 | 2024-05-14 | 梵迩佳智能科技有限公司 | Application method and device of low-voltage station quantum encryption communication technology |
CN118449786B (en) * | 2024-07-08 | 2024-09-03 | 国网浙江省电力有限公司杭州供电公司 | Local communication lightweight authentication method, system, equipment and medium of power terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248488A (en) * | 2013-05-14 | 2013-08-14 | 顾纯祥 | Identity-based key generation method and identity-based authentication method |
CN109218319A (en) * | 2018-09-21 | 2019-01-15 | 四川长虹电器股份有限公司 | A kind of identity authorization system and authentication method based on block chain |
CN111083131A (en) * | 2019-12-10 | 2020-04-28 | 南瑞集团有限公司 | Lightweight identity authentication method for power Internet of things sensing terminal |
CN111835752A (en) * | 2020-07-09 | 2020-10-27 | 国网山西省电力公司信息通信分公司 | Lightweight authentication method based on equipment identity and gateway |
CN112887338A (en) * | 2021-03-18 | 2021-06-01 | 南瑞集团有限公司 | Identity authentication method and system based on IBC identification password |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7020297B2 (en) * | 2018-05-29 | 2022-02-16 | 日本電信電話株式会社 | Key sharing system, equipment, key sharing method and program |
-
2022
- 2022-03-07 CN CN202210216220.2A patent/CN114531680B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103248488A (en) * | 2013-05-14 | 2013-08-14 | 顾纯祥 | Identity-based key generation method and identity-based authentication method |
CN109218319A (en) * | 2018-09-21 | 2019-01-15 | 四川长虹电器股份有限公司 | A kind of identity authorization system and authentication method based on block chain |
CN111083131A (en) * | 2019-12-10 | 2020-04-28 | 南瑞集团有限公司 | Lightweight identity authentication method for power Internet of things sensing terminal |
CN111835752A (en) * | 2020-07-09 | 2020-10-27 | 国网山西省电力公司信息通信分公司 | Lightweight authentication method based on equipment identity and gateway |
CN112887338A (en) * | 2021-03-18 | 2021-06-01 | 南瑞集团有限公司 | Identity authentication method and system based on IBC identification password |
Non-Patent Citations (6)
Title |
---|
Zhong Yantao, Ma Jianfeng."A_highly_secure_identity-based_authenticated_key-exchange_protocol_for_satellite_communication".IEEE.2010,第12卷全文. * |
一种新的基于PKI的双向身份认证系统的设计;刘敏;徐进;;信息化研究(第04期);全文 * |
基于ECC组合公钥的GSM双向认证;张毅;崔天喜;唐红;;计算机工程与应用(第19期);全文 * |
基于IBC体制的挑战/应答式双向身份认证协议;马春波;杜以聪;曾坤;;计算机工程与设计(02);全文 * |
基于组合对称密钥的大规模身份认证体系研究;刘彤;徐冠宁;;通信学报(第S2期);全文 * |
基于身份标识加密的身份认证方案;黄仁季;吴晓平;李洪成;;网络与信息安全学报(第06期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114531680A (en) | 2022-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111083131B (en) | Lightweight identity authentication method for power Internet of things sensing terminal | |
CN113783836B (en) | Internet of things data access control method and system based on block chain and IBE algorithm | |
CN114531680B (en) | Light-weight IBC bidirectional identity authentication system and method based on quantum key | |
CN109495274B (en) | Decentralized intelligent lock electronic key distribution method and system | |
CN102315937B (en) | System and method for secure transaction of data between wireless communication device and server | |
Jiang et al. | An efficient scheme for user authentication in wireless sensor networks | |
CN1929371B (en) | Method for negotiating key share between user and peripheral apparatus | |
CN113114460B (en) | Quantum encryption-based power distribution network information secure transmission method | |
CN113746632B (en) | Multi-level identity authentication method for Internet of things system | |
CN108540436B (en) | Communication system and communication method for realizing information encryption and decryption transmission based on quantum network | |
CN110932854B (en) | Block chain key distribution system and method for Internet of things | |
CN110535626B (en) | Secret communication method and system for identity-based quantum communication service station | |
CN101720071A (en) | Short message two-stage encryption transmission and secure storage method based on safety SIM card | |
CN101540669A (en) | Method for distributing keys and protecting information for wireless mobile communication network | |
CN110224816A (en) | Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number | |
CN115484033A (en) | PMU power system communication method based on state cryptographic algorithm | |
CN113676448B (en) | Offline equipment bidirectional authentication method and system based on symmetric key | |
Parameswarath et al. | Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralized Identity | |
CN116599659B (en) | Certificate-free identity authentication and key negotiation method and system | |
CN110752934B (en) | Method for network identity interactive authentication under topological structure | |
CN109005029B (en) | Trusted application mark generation method and system, application method and apply end equipment | |
CN114826593B (en) | Quantum security data transmission method and digital certificate authentication system | |
CN102387162A (en) | Mail server access method and system based on digital certificate | |
CN114513361B (en) | Power distribution Internet of things based on block chain | |
CN113676330B (en) | Digital certificate application system and method based on secondary secret key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |