CN114531680B - Light-weight IBC bidirectional identity authentication system and method based on quantum key - Google Patents

Light-weight IBC bidirectional identity authentication system and method based on quantum key Download PDF

Info

Publication number
CN114531680B
CN114531680B CN202210216220.2A CN202210216220A CN114531680B CN 114531680 B CN114531680 B CN 114531680B CN 202210216220 A CN202210216220 A CN 202210216220A CN 114531680 B CN114531680 B CN 114531680B
Authority
CN
China
Prior art keywords
quantum key
key
authentication
identity
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210216220.2A
Other languages
Chinese (zh)
Other versions
CN114531680A (en
Inventor
陈斌
周晓东
王晟
殷自力
倪文书
张昊
陈泽文
卞宇翔
冯宝
张天兵
贾玮
孙圣武
郭子昕
吕超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Nanrui Guodun Quantum Technology Co ltd
State Grid Fujian Electric Power Co Ltd
Nari Information and Communication Technology Co
Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd
Original Assignee
Nanjing Nanrui Guodun Quantum Technology Co ltd
State Grid Fujian Electric Power Co Ltd
Nari Information and Communication Technology Co
Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Nanrui Guodun Quantum Technology Co ltd, State Grid Fujian Electric Power Co Ltd, Nari Information and Communication Technology Co, Information and Telecommunication Branch of State Grid Fujian Electric Power Co Ltd filed Critical Nanjing Nanrui Guodun Quantum Technology Co ltd
Priority to CN202210216220.2A priority Critical patent/CN114531680B/en
Publication of CN114531680A publication Critical patent/CN114531680A/en
Application granted granted Critical
Publication of CN114531680B publication Critical patent/CN114531680B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a light-weight IBC bidirectional identity authentication system based on a quantum key, which comprises an authenticator, a verifier, a quantum key wireless application system and a key generation center; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for an authenticator and a verifier; the authentication party and the verification party realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantum key wireless application system and the key generation center. The invention improves and optimizes the IBC authentication technology, thereby reducing redundancy in the identity authentication process, reducing information interaction times of the two sides of the identity authentication, simultaneously encrypting the whole quantum key of the identity authentication without losing security, and being more suitable for wide application in the novel power system distributed new energy access application scene.

Description

Light-weight IBC bidirectional identity authentication system and method based on quantum key
Technical Field
The invention relates to the field of quantum secret communication, in particular to a light-weight IBC bidirectional identity authentication system and method based on a quantum key.
Background
The quantum has the inherent properties of inseparable, unmeasurable and unclonable due to the mechanical properties, and has great application value in the field of transmission secret communication. Quantum Key Distribution (QKD) is an important branch in quantum secure communications technology. QKD is the establishment of a secure channel between two users, sharing quantum keys through single photon transmission/reception and key agreement. Such a secure channel necessarily involves an authentication process for both parties.
The traditional communication parties commonly adopt a PKI authentication system and an IBC authentication system. PKI refers to a ubiquitous security infrastructure that implements and provides security services with the concept and technology of public keys. In PKI, the CA authentication center binds the identity information (user name, id card number, etc.) of the user with its public key, so that the function of identity authentication in the network environment can be realized. PKI provides a range of applications (encryption, decryption, signing and verification, etc.) that support public key cryptography. The security service functions which can be supported by the system mainly comprise: identity authentication, data integrity verification, data confidentiality, non-repudiation, and the like. The PKI aims to provide comprehensive security services for various network applications by managing the generation and storage of a secret key, the security of a public key certificate and the like by means of the theoretical basis of public key cryptography, so that the authentication of the identity of a user, the confidentiality, the integrity, the validity and the like of data can be effectively realized.
The IBC authentication is different from PKI authentication scheme, the key idea of the IBC authentication technology is that the certificate is not used in the system any more, but the authentication can be completed through three keys, namely a system master key, a user public key and a private key. The public key of the user is generated by extracting the identity information of the user, and the private key can be calculated by a trusted third party called a private key generator and transmitted to the user through a secure channel. The identity authentication idea realizes the binding of the public key and the identity of the authentication entity, so that the authentication of both sides can be completed without exchanging the public key.
PKI authentication requires a large number of CA certificate exchanges, the key management is complex, and the expenditure on calculation and communication resources is large; the public and private key pairs authenticated by the IBC are stored in the private key generator, so that the problem of key escrow exists, and once the private key generator is cracked, the leakage of all keys can be caused; meanwhile, the IBC algorithm is based on bilinear pair operation, the operation complexity is high, and the existing algorithm is not efficient enough. Therefore, it is important to design a more flexible, secure, and lightweight identity authentication process for the limitations of PKI authentication and IBC authentication.
Disclosure of Invention
In view of the above, the invention aims to provide a light-weight IBC bidirectional identity authentication system and method based on a quantum key, which improves and optimizes an IBC authentication technology, thereby reducing redundancy of an identity authentication process, reducing information interaction times of two sides of the identity authentication, simultaneously encrypting the whole quantum key of the identity authentication, ensuring no loss of safety, and being more suitable for wide application in a novel power system distributed new energy access application scene.
In order to achieve the above purpose, the invention adopts the following technical scheme:
a light-weight IBC bidirectional identity authentication system based on a quantum key comprises an authenticator, a verifier, a quantum key wireless application system and a key generation center; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for an authenticator and a verifier; the authentication party and the verification party realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantum key wireless application system and the key generation center.
Further, the authenticator and the verifier each comprise an encryption module, a decryption module and a database.
Further, the authentication party generates an identity, and the identity consists of a terminal position, a type, an attribute and a number.
Further, the identity label construction specifically comprises: and abstracting the terminal equipment according to the four attributes in the model, and connecting by using the character "/", wherein the obtained character string is the identity of the terminal equipment.
An authentication method of a lightweight IBC bidirectional identity authentication system based on a quantum key comprises the following steps:
step 1: the authentication requests to the quantum key wireless application system to obtain the quantum key;
step 2: the quantum key wireless application system sends a request for generating the quantum key to the key generation center, and the key generation center generates the quantum key and informs the quantum key wireless application system;
step 3: the quantum key wireless application system sends information generated by the quantum key to the authenticator;
step 4: the authentication party requests to acquire an encrypted quantum key from a key generation center, and the key generation center sends the encrypted quantum key to the authentication party;
step 5: the authenticator generates an identity. The encryption module of the authentication party encrypts the identity field by using the encryption quantum key to obtain an encrypted identity field;
step 6: the authentication party sends the encrypted identification field to the verification party;
step 7: the verification requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the verification party;
step 8: decrypting the encrypted identification field by the verifier by using the decryption quantum key to obtain the identification field;
step 9: the verification party compares the identity identification field with the identity identification information in the database module thereof;
step 10: the verification direction key generation center requests to acquire an encrypted quantum key, and the key generation center sends the encrypted quantum key to the verification direction;
step 11: the verification party encrypts the identity authentication success information by using the encryption quantum key to obtain encrypted identity authentication success information;
step 12: the verification party sends encrypted identity authentication success information to the authentication party;
step 13: the authentication requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the authentication party;
step 14: the authentication party decrypts the encrypted identity authentication success information by using the decryption quantum key to obtain the identity authentication success information;
step 15: and obtaining successful information of identity authentication, and storing the successful information into an authenticator database to finish a bidirectional identity authentication flow between the authenticator and the verifier.
Furthermore, the authentication party and the verification party in the authentication method of the light-weight IBC bidirectional identity authentication system based on the quantum key realize the identity authentication information interaction and the quantum key interaction in a wireless communication mode, and are suitable for the application scene of the novel power system distributed new energy access service.
Compared with the prior art, the invention has the following beneficial effects:
1. the invention adopts a wireless communication mode to realize the identity authentication information interaction between the authentication party and the verification party, and the quantum key interaction between the authentication party and the verification party as well as the quantum key wireless application system and the key generation center, thereby expanding the application range of power service, being more flexible to deploy and being applicable to a distributed new energy access scene;
2. according to the invention, the identity authentication information interaction between the authentication party and the verification party adopts quantum key encryption and decryption, so that the risk that the identity authentication information is intercepted and tampered is avoided, and the safety of the identity authentication interaction is improved;
3. the authentication is completed only by 1 time of identity identification transmission and confirmation between the authentication party and the verification party, so that the weight reduction of the authentication is realized in a true sense.
Drawings
Fig. 1 is a quantum key distribution network architecture diagram for a distributed new energy access scene provided by an embodiment of the present invention;
FIG. 2 is a flow chart of a lightweight IBC bidirectional identity authentication method based on a quantum key, which is provided by the embodiment of the invention;
fig. 3 is a schematic diagram of identity construction for a distributed new energy access service according to an embodiment of the present invention.
Detailed Description
The invention will be further described with reference to the accompanying drawings and examples.
Referring to fig. 1, the invention provides an example of a light-weight IBC bidirectional identity authentication system based on a quantum key, wherein an authenticator is a distributed new energy service terminal, a verifier is a distributed new energy service master station, a quantum key wireless application system and a key generation center are distributed new energy background service systems; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for the distributed new energy business terminal and the master station; the distributed new energy business terminal and the master station realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantity background service system.
Referring to fig. 2, in this embodiment, there is also provided an authentication method of a lightweight IBC bidirectional identity authentication system based on a quantum key, including the following steps:
step 1: the distributed new energy service terminal requests to the quantum key wireless application system to obtain the quantum key through the wireless network, and the quantum key wireless application system transmits whether the distributed new energy service terminal is permitted to obtain the quantum key or not to the distributed new energy service terminal. And executing the step 2 if the permission is granted, otherwise, ending.
Step 2: the quantum key wireless application system agrees with the request of obtaining the quantum key of the distributed new energy business terminal, and sends the request of generating the quantum key to the key generating center, and the key generating center utilizes devices such as a random number generator and the like to generate the quantum key. After the quantum key is generated, the key generation center informs the quantum key wireless application system that the quantum key is generated.
Step 3: after receiving the information generated by the quantum key of the key generation center, the quantum key wireless application system forwards the information generated by the quantum key to the distributed new energy service terminal. After confirming the information, the distributed new energy service terminal replies to the quantum key wireless application system.
Step 4: the distributed new energy business terminal sends a request for acquiring the encrypted quantum key to the key generation center, and the key generation center sends the encrypted quantum key to the distributed new energy business terminal.
Step 5: and the distributed new energy service terminal generates an identity. The identity mark fully combines the service characteristics of distributed new energy access, and consists of terminal position, type, attribute and number, and is particularly shown in figure 3.
Preferably, in this embodiment, the location information is that the specific location of the distributed new energy terminal device is familiar, and longitude and latitude, geographic location name, even network address, etc. can be selected according to different platforms, and is represented by field location; the attribute of the type of the distributed new energy equipment is mainly used for distinguishing the type of the distributed new energy equipment, such as sensing equipment, digital equipment, controllers and the like, and is defined by a field type; the field of the attribute of the distributed new energy equipment is mainly used for expressing the specific functions of the equipment, such as temperature acquisition, humidity acquisition, illumination intensity acquisition, audio acquisition and the like, and is expressed by a field attribute; finally, because the same type of equipment exists in the same range of the internet of things and is used repeatedly in a large amount, for example, a plurality of temperature sensors of the same type are placed at the same position, in order to distinguish the distributed new energy equipment, the equipment of the same type needs to be numbered and distinguished, and the equipment is represented by a deviceID field. And abstracting the distributed new energy terminal equipment according to the four attributes in the model, and connecting by using a character 'v', wherein the obtained character string is the identity of the distributed new energy terminal equipment.
The encryption module of the distributed new energy service terminal encrypts the identity field by using the encryption quantum key acquired by the key generation center to obtain an encrypted identity field.
Step 6: after the encrypted identification field is obtained, the distributed new energy service terminal sends the encrypted identification field to the distributed new energy service master station.
Step 7: the distributed new energy business master station receives the encrypted identification field sent by the distributed new energy business terminal, and forwards the encrypted identification field to the key generation center to request to obtain the decryption quantum key. And the key generation center sends a decryption quantum key to the distributed new energy service master station according to the received encrypted identification field.
Step 8: and the distributed new energy service master station receives the decryption quantum key from the key generation center, and decrypts the encrypted identity field to obtain the identity field.
Step 9: the distributed new energy service master station compares the obtained identity mark field with the identity mark information in the database module thereof, and if the comparison is successful, the identity authentication is successful; otherwise, ending.
Step 10: after the comparison is successful, the distributed new energy service master station sends a request for acquiring the encrypted quantum key to the key generation center, and the key generation center sends the encrypted quantum key to the distributed new energy service master station.
Step 11: the encryption module of the distributed new energy service master station encrypts the identity authentication success information by using the encryption quantum key acquired by the key generation center to obtain the encrypted identity authentication success information.
Step 12: after the encrypted identity authentication success information is obtained, the distributed new energy service master station sends the encrypted identity authentication success information to the distributed new energy service terminal.
Step 13: the distributed new energy business terminal receives the encrypted identity authentication success information sent by the distributed new energy business master station, and forwards the encrypted identity authentication success information to the key generation center to request to obtain the decryption quantum key. And the key generation center sends a decryption quantum key to the distributed new energy service terminal according to the received encrypted identity authentication success information.
Step 14: and the distributed new energy service terminal receives the decryption quantum key from the key generation center, and decrypts the encrypted identity authentication success information to obtain the identity authentication success information.
Step 15: and obtaining successful identity authentication information, and storing the successful identity authentication information into a distributed new energy business terminal database to finish a bidirectional identity authentication process between the distributed new energy business terminal and the master station.
The foregoing description is only of the preferred embodiments of the invention, and all changes and modifications that come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein.

Claims (5)

1. The light-weight IBC bidirectional identity authentication method based on the quantum key is characterized by comprising the following steps of:
step 1: the authentication requests to the quantum key wireless application system to obtain the quantum key;
step 2: the quantum key wireless application system sends a request for generating the quantum key to the key generation center, and the key generation center generates the quantum key and informs the quantum key wireless application system;
step 3: the quantum key wireless application system sends information generated by the quantum key to the authenticator;
step 4: the authentication party requests to acquire an encrypted quantum key from a key generation center, and the key generation center sends the encrypted quantum key to the authentication party;
step 5: the authentication party generates an identity mark, and an encryption module of the authentication party encrypts an identity mark field by using an encryption quantum key to obtain an encrypted identity mark field;
step 6: the authentication party sends the encrypted identification field to the verification party;
step 7: the verification requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the verification party;
step 8: decrypting the encrypted identification field by the verifier by using the decryption quantum key to obtain the identification field;
step 9: the verification party compares the identity identification field with the identity identification information in the database module thereof;
step 10: the verification direction key generation center requests to acquire an encrypted quantum key, and the key generation center sends the encrypted quantum key to the verification direction;
step 11: the verification party encrypts the identity authentication success information by using the encryption quantum key to obtain encrypted identity authentication success information;
step 12: the verification party sends encrypted identity authentication success information to the authentication party;
step 13: the authentication requests to obtain a decryption quantum key from a key generation center, and the key generation center sends the decryption quantum key to the authentication party;
step 14: the authentication party decrypts the encrypted identity authentication success information by using the decryption quantum key to obtain the identity authentication success information;
step 15: and obtaining successful information of identity authentication, and storing the successful information into an authenticator database to finish a bidirectional identity authentication flow between the authenticator and the verifier.
2. A system for implementing the quantum key based lightweight IBC two-way identity authentication method of claim 1, comprising an authenticator, a verifier, a quantum key wireless application system and a key generation center; the quantum key wireless application system and the key generation center are mutually matched to generate an encrypted quantum key and a decrypted quantum key, and provide quantum key service for an authenticator and a verifier; the authentication party and the verification party realize identity authentication information interaction in a wireless communication mode, and realize quantum key interaction with the quantum key wireless application system and the key generation center.
3. The system of claim 2, wherein the authenticator and the verifier each comprise an encryption module, a decryption module, and a database.
4. The system of claim 2, wherein the authenticator generates an identity consisting of a terminal location, type, attribute, number.
5. The quantum key-based lightweight IBC mutual authentication system according to claim 4, wherein the identity construction is specifically: the terminal equipment is abstracted according to four attributes in the model, and connected by using characters "/", and the obtained character string is the identity of the terminal equipment, wherein the four attributes comprise terminal positions, types, attributes and numbers.
CN202210216220.2A 2022-03-07 2022-03-07 Light-weight IBC bidirectional identity authentication system and method based on quantum key Active CN114531680B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210216220.2A CN114531680B (en) 2022-03-07 2022-03-07 Light-weight IBC bidirectional identity authentication system and method based on quantum key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210216220.2A CN114531680B (en) 2022-03-07 2022-03-07 Light-weight IBC bidirectional identity authentication system and method based on quantum key

Publications (2)

Publication Number Publication Date
CN114531680A CN114531680A (en) 2022-05-24
CN114531680B true CN114531680B (en) 2023-06-27

Family

ID=81626246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210216220.2A Active CN114531680B (en) 2022-03-07 2022-03-07 Light-weight IBC bidirectional identity authentication system and method based on quantum key

Country Status (1)

Country Link
CN (1) CN114531680B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314278B (en) * 2022-08-04 2023-06-30 长扬科技(北京)股份有限公司 Trusted network connection identity authentication method, electronic equipment and storage medium
CN117527208B (en) * 2023-10-27 2024-05-14 梵迩佳智能科技有限公司 Application method and device of low-voltage station quantum encryption communication technology
CN118449786B (en) * 2024-07-08 2024-09-03 国网浙江省电力有限公司杭州供电公司 Local communication lightweight authentication method, system, equipment and medium of power terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248488A (en) * 2013-05-14 2013-08-14 顾纯祥 Identity-based key generation method and identity-based authentication method
CN109218319A (en) * 2018-09-21 2019-01-15 四川长虹电器股份有限公司 A kind of identity authorization system and authentication method based on block chain
CN111083131A (en) * 2019-12-10 2020-04-28 南瑞集团有限公司 Lightweight identity authentication method for power Internet of things sensing terminal
CN111835752A (en) * 2020-07-09 2020-10-27 国网山西省电力公司信息通信分公司 Lightweight authentication method based on equipment identity and gateway
CN112887338A (en) * 2021-03-18 2021-06-01 南瑞集团有限公司 Identity authentication method and system based on IBC identification password

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7020297B2 (en) * 2018-05-29 2022-02-16 日本電信電話株式会社 Key sharing system, equipment, key sharing method and program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103248488A (en) * 2013-05-14 2013-08-14 顾纯祥 Identity-based key generation method and identity-based authentication method
CN109218319A (en) * 2018-09-21 2019-01-15 四川长虹电器股份有限公司 A kind of identity authorization system and authentication method based on block chain
CN111083131A (en) * 2019-12-10 2020-04-28 南瑞集团有限公司 Lightweight identity authentication method for power Internet of things sensing terminal
CN111835752A (en) * 2020-07-09 2020-10-27 国网山西省电力公司信息通信分公司 Lightweight authentication method based on equipment identity and gateway
CN112887338A (en) * 2021-03-18 2021-06-01 南瑞集团有限公司 Identity authentication method and system based on IBC identification password

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
Zhong Yantao, Ma Jianfeng."A_highly_secure_identity-based_authenticated_key-exchange_protocol_for_satellite_communication".IEEE.2010,第12卷全文. *
一种新的基于PKI的双向身份认证系统的设计;刘敏;徐进;;信息化研究(第04期);全文 *
基于ECC组合公钥的GSM双向认证;张毅;崔天喜;唐红;;计算机工程与应用(第19期);全文 *
基于IBC体制的挑战/应答式双向身份认证协议;马春波;杜以聪;曾坤;;计算机工程与设计(02);全文 *
基于组合对称密钥的大规模身份认证体系研究;刘彤;徐冠宁;;通信学报(第S2期);全文 *
基于身份标识加密的身份认证方案;黄仁季;吴晓平;李洪成;;网络与信息安全学报(第06期);全文 *

Also Published As

Publication number Publication date
CN114531680A (en) 2022-05-24

Similar Documents

Publication Publication Date Title
CN111083131B (en) Lightweight identity authentication method for power Internet of things sensing terminal
CN113783836B (en) Internet of things data access control method and system based on block chain and IBE algorithm
CN114531680B (en) Light-weight IBC bidirectional identity authentication system and method based on quantum key
CN109495274B (en) Decentralized intelligent lock electronic key distribution method and system
CN102315937B (en) System and method for secure transaction of data between wireless communication device and server
Jiang et al. An efficient scheme for user authentication in wireless sensor networks
CN1929371B (en) Method for negotiating key share between user and peripheral apparatus
CN113114460B (en) Quantum encryption-based power distribution network information secure transmission method
CN113746632B (en) Multi-level identity authentication method for Internet of things system
CN108540436B (en) Communication system and communication method for realizing information encryption and decryption transmission based on quantum network
CN110932854B (en) Block chain key distribution system and method for Internet of things
CN110535626B (en) Secret communication method and system for identity-based quantum communication service station
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN101540669A (en) Method for distributing keys and protecting information for wireless mobile communication network
CN110224816A (en) Anti- quantum calculation application system and short distance energy-saving communication method and computer equipment based on key card and sequence number
CN115484033A (en) PMU power system communication method based on state cryptographic algorithm
CN113676448B (en) Offline equipment bidirectional authentication method and system based on symmetric key
Parameswarath et al. Privacy-Preserving User-Centric Authentication Protocol for IoT-Enabled Vehicular Charging System Using Decentralized Identity
CN116599659B (en) Certificate-free identity authentication and key negotiation method and system
CN110752934B (en) Method for network identity interactive authentication under topological structure
CN109005029B (en) Trusted application mark generation method and system, application method and apply end equipment
CN114826593B (en) Quantum security data transmission method and digital certificate authentication system
CN102387162A (en) Mail server access method and system based on digital certificate
CN114513361B (en) Power distribution Internet of things based on block chain
CN113676330B (en) Digital certificate application system and method based on secondary secret key

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant