KR101739203B1 - Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption - Google Patents
Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption Download PDFInfo
- Publication number
- KR101739203B1 KR101739203B1 KR1020150155350A KR20150155350A KR101739203B1 KR 101739203 B1 KR101739203 B1 KR 101739203B1 KR 1020150155350 A KR1020150155350 A KR 1020150155350A KR 20150155350 A KR20150155350 A KR 20150155350A KR 101739203 B1 KR101739203 B1 KR 101739203B1
- Authority
- KR
- South Korea
- Prior art keywords
- password
- signature
- user authentication
- remote server
- result
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/008—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Abstract
According to an embodiment of the present invention, there is provided a method of authenticating a user, comprising: registering a first cipher text generated by performing a first encryption upon input of an ID and a first password to a remote server together with the ID; Inputting an ID and a second password from a user; Generating a hash value by hashing a second password input by the user into a hash function; Encrypting the hash value of the second password using the same type encryption method to generate a second cipher text for the second password; Transmitting the ID and the second ciphertext to the remote server and receiving an operation result between the first ciphertext and the second ciphertext from the remote server; Performing decoding using the same type of encryption key on the result of the calculation; And processing the user authentication using the ID based on the result of performing the decryption.
Description
The following description relates to a method and apparatus for performing password-based user authentication using homogeneous cryptography and disposable private key-based digital signatures.
User authentication is a series of procedures that allow a user to confirm access rights and access when a user attempts to access a specific system such as a computer, a web server, or a smart phone. Knowledge base authentication using passwords and personal identification numbers, biometric authentication using body information, and proprietary authentication using hardware (card, dongle, etc.) are mainly used, and password authentication is widely used. In password-based authentication, a user enters his or her ID and password to perform user registration, and the system stores a pair of user identification information (ID and password) in a specific system file. Thereafter, the user having the corresponding ID compares the password inputted when the user attempts to authenticate (login) with the stored password, and allows access to the system if they match.
However, if a system file storing user IDs and passwords is leaked due to an attack on the system, all users' passwords are exposed. Therefore, generally, passwords are stored in a hashed state through a cryptographic hash function, The hash value of the input password is compared with the stored value. In other words,
ID of , Password And the value To Unidirectional cryptographic hash function Operation of , The system registers the user identification information pair / RTI > Then, When a user attempts to authenticate (login), the system enters the password About And if so, access is allowed. At this time, Is a one-way function Is selected to have sufficient entropy, an attack on the system Even if the air- From the value It is impossible to restore. However, in general, the passwords selected by users are statistically not uniformly distributed, such as '1234' or 'password'. This allows a dictionary attack to be performed, which allows an attacker to pre-compute a hash value for a password that is known to be selected by a large number of users, store the dictionary in a dictionary form, It is an attack to infer the user's original password in such a way that the value is compared with the pre-contained hash value.To prevent this, you should use a method such as to make the hash value more resistant to dictionary attacks or more securely managing the file where the password is stored. In the case of the former,
To add a hash is often used, And stores the password entered at the time of authentication (login) About Is established. At this time, the attacker can use the The value of the attacker's attack complexity is somewhat increased because the value must be considered. However, this method does not fundamentally solve the problem of password-based authentication. In the latter case, the user ID, password pair, And storing the hash value on the remote server. In this case, a strong assumption is made that the remote server must be trusted. This is because a remote server is usually more secure than an external attack than a local system, but it can not rule out the possibility of attacking to retrieve useful information for analyzing user identification information provided by multiple users on a remote server to infer the original value to be.To solve this problem, a method of encrypting a value stored in a server can be considered. A technique such as Homomorphic Encryption can be used because of the characteristic of performing authentication with a cipher text state. However, because the same password can not verify the encrypted authentication result, the local system must verify the result. If the local system is hijacked, there is a possibility that information that can be used for attack exists. Therefore, a method of ensuring the security of the isomorphic password in the comparison process of authenticating the password should be used.
A problem to be solved by the present invention is a password-based user authentication method and system using the homogeneous encryption technique and the disposable private key-based digital signature.
According to one embodiment, a method of authenticating a user includes: registering a first cipher text generated by performing a first encryption upon input of an ID and a first password, with a remote server together with the ID; Inputting the ID and a second password from a user; Generating a hash value by hashing a second password input by the user into a hash function; Encrypting the hash value of the second password using the same type encryption method to generate a second cipher text for the second password; Transmitting the ID and the second ciphertext to the remote server and receiving an operation result between the first ciphertext and the second ciphertext from the remote server; Performing decoding using the same type of encryption key on the result of the calculation; And processing the user authentication using the ID based on the result of performing the decryption.
According to one aspect of the present invention, the step of processing the user authentication using the ID based on the result of performing the decryption includes generating a signature based on the signature generation operation of the signer having the private key for signing, The step of discarding the private key, determining the validity of the signature information through signature verification of the signer's public key and the generated signature, and performing digital signature based on the private key such that the signature can not be recalculated .
According to another aspect of the present invention, the step of processing the user authentication using the ID based on the result of performing the decryption includes a step of performing signature verification through a result of performing the decryption and a signature verification operation from the public key of the signer . ≪ / RTI >
According to another aspect of the present invention, the step of processing the user authentication using the ID based on the result of performing the decryption includes allowing the login of the ID when the signature verification is successful, and when the signature verification is unsuccessful , And refusing to log in the ID.
According to another aspect of the present invention, the step of registering the first ciphertext generated by performing the first ciphertext according to the input of the ID and the first ciphertext to the remote server together with the ciphertext includes: Generating a key pair including a public key and a disposable private key, and determining signature information; Generating a hash value of the first password by hashing the first password according to the input of the ID and the first password from the user; Generating a signature based on the signature generation operation to obtain a signature value, and discarding the disposable private key; Performing an exclusive-OR operation on each of the bits of the hash value and the signature value to generate an exclusive-OR operation result; Generating a first ciphertext by encrypting the exclusive OR operation result using the same encryption method; And transmitting the ID and the first cipher text to the remote server and registering the ID and the first cipher text on the remote server.
According to another aspect of the present invention, the step of transmitting the ID and the first ciphertext to the remote server and registering the ID and the first ciphertext on the remote server includes storing the same encryption key, a public key for verifying the signature of the digital signature, . ≪ / RTI >
According to one embodiment, at least one program is loaded; And at least one processor configured to generate a key pair comprising a homogenous encryption key and a public key for a digital signature and a disposable private key under control of the program, process; Generating a hash value of the first password by hashing the first password according to the input of the ID and the first password; Generating a signature based on the signature generation operation to obtain a signature value, and discarding the disposable private key; Generating an exclusive-OR operation result by performing an exclusive-OR operation on the hash value and the signature value for each bit; Generating a first ciphertext by encrypting the result of the exclusive-OR operation using the same encryption method; Transmitting the ID and the first cipher text to a remote server and registering the ID and the first cipher text on the remote server; Inputting the ID and the second password from a user; Generating a hash value by hashing a second password input by the user into a hash function; Generating a second cipher text for the second password by encrypting the hash value of the second password using the same type encryption method; Transmitting the ID and the second ciphertext to the remote server and receiving an operation result between the first ciphertext and the second ciphertext from the remote server; Performing a decryption process on the result of the calculation using the same encryption key; And processing the user authentication using the ID based on the result of performing the decryption.
The user authentication system according to the embodiment stores the hash value of the password and the digital signature value in the remote server as the result of the exclusive OR operation, so that the password information can not be known, and only the encrypted comparison service is provided .
The user authentication system according to an embodiment can block an attack that restores a password through additional operation from a hacker even when the local system is hijacked.
1 is a diagram for explaining a network environment of a user authentication system according to an embodiment.
2 is a block diagram illustrating a configuration of a user authentication system according to an embodiment.
3 is a flowchart illustrating a user registration process of the user authentication system according to an exemplary embodiment of the present invention.
4 is a flowchart illustrating a user authentication process of the user authentication system according to an embodiment of the present invention.
Hereinafter, embodiments will be described in detail with reference to the accompanying drawings.
Homomorphic encryption is a plaintext,
and If you apply an arithmetic operation * Encryption method satisfying . If this operation is addition (multiplication), the encryption method Is called a homogeneous form for addition (multiplication). Also, the same type of encryption for both addition and multiplication is called fully homomorphic encryption. Accordingly, in the following description, Plain text of , It is considered that addition and multiplication operations between plain texts perform mod 2 after each operation and addition and multiplication between ciphertexts are performed without mod. In other words, And decoding operation About Wow Is considered. Addition and multiplication for mod 2 on an integer are each exclusive OR (symbol: ) And logical AND (symbol: ) Operation, Wow.
One-Time Private Key-Based Digital Signature is a private key for signing
A signatory with Sign information A signature generation operation Through , ≪ / RTI > As a method of discarding the signer Public key of And signature Signature verification operation Signature information through , And no one can sign Can not be recalculated. In other words, the private key of the digital signature is generally used only once for signing, unlike the digital signature.A value having an arbitrary length input bit
To Output value of bit length A unidirectional cryptographic hash function Let's say. Input value end When you have a bit length, And the output value To , The hash function The It can be said thatThe user authentication system according to an exemplary embodiment can perform password-based user authentication using a digital signature based on a disposable private key and the same type of password, and can be configured with two steps of user registration and user authentication.
1 is a diagram for explaining a network environment of a user authentication system according to an embodiment.
Figure 1 shows a
The
The
2 is a block diagram illustrating a configuration of a user authentication system according to an embodiment.
2, the
The
The
The
The
The
The
First, the user registration process of the
The
The
The
In the
Next, the user authentication process of the
The
The user authentication system (200)
Cipher Lt; / RTI > The user authentication system is To a remote server. The user's local system is the identity of the remote server Stored in the user registration process for Using Respectively. To the local system.The
The
The user authentication system according to an embodiment satisfies the following characteristics through a password-based user authentication method configured as described above.
1: Providing normal user authentication through password: If the user enters a normal password,
About Therefore,. Accordingly
Is successfully performed.2: Password protection in case of complete deodorization of local system:
And a key for signature verification of a disposable private key-based electronic signature Signature information Is stored. If the local system is attacked by a hacker, the attacker can encrypt / decrypt the same type of ciphertext, verify the digital signature, . ≪ / RTI > However, the information can not be recovered and can not be signed, so even if the same type of ciphertext can be created, it is impossible to attack using the authentication server.E.g,
Wow Bit exclusive OR for each bit ( ) Operation Bit result Instead of simply creating the hash value of the password Using If the local system is completely hijacked, the following attack using the authentication server is possible. An attacker pretends to be a user, When encrypting the bit plaintext and requesting authentication from the authentication server, the remote server For The attacker on the local system To obtain the original text of the password.However, in the method proposed by the present invention,
Therefore, as described above, Even if an authentication request is made to the authentication server by encrypting the bit plaintext, Can only recover. Wow If one can not be created, Wow It is possible to safeguard the password even if the local system is completely hijacked.3: Prevent dictionary attack by remote server: The remote server for user authentication can not perform dictionary attack because it stores only the same type of ciphertexts, not password original or hash value. Attempts to attack the remote server
They are decoded To perform a dictionary attack and to derive a password from it, And the public key Signature information This information is known only to the local system. If the local system is hacked, , A password dictionary attack is possible. However, it is difficult for a hacker to succeed at attacking a local system and a remote server at the same time.3 is a flowchart illustrating a user registration process of the user authentication system according to an exemplary embodiment of the present invention.
The user authentication system can perform a user registration process and a user authentication process. The user authentication system will explain the user registration process through the operation between the local system 300 and the remote server 301. [
The local system 300 may generate a key pair including the homogeneous encryption key, the public key for the digital signature and the one-time private key, and determine the signature information (311). The local system 300 may generate the hash value of the first password by hashing the password as the ID and the password are input from the user (312).
The local system 300 may generate a signature based on the signature generation operation to obtain the signature value, and discard the disposable private key (313). The local system 300 may perform an exclusive-OR operation on the hash value and the signature value for each bit to generate an exclusive-OR operation result (314).
The local system 300 can generate the cipher text by encrypting the exclusive OR operation result using the same type encryption method. The local system 300 may transmit the ID and the cipher text to the remote server 301. [ The remote server 301 may store the ID and the cipher text as it receives the ID and the cipher sent from the local system 300 (316). At this time, the local system 300 may store the same encryption key, a public key for signature verification of the digital signature, and signature information.
4 is a flowchart illustrating a user authentication process of the user authentication system according to an embodiment of the present invention.
The user authentication system can perform a user registration process and a user authentication process. The user authentication system will explain the user authentication process through the operation between the local system 400 and the remote server 401. [
The local system 400 may generate a hash value by hashing the password input by the user as a hash function as the ID and the password are input from the user (411). The local system 400 may encrypt the hash value of the password using the same type of encryption method to generate a cipher text for the password (412). The local system 400 may send the identity and the ciphertext to the remote server 401. The remote server 401 may extract the cipher text corresponding to the ID upon receiving the ID and the cipher text transmitted from the local system 400 (413). The remote server 401 may perform operations between
The remote server 401 can transmit the operation result between the ciphertexts to the local system 400. [ The local system 400 may perform the decryption using the same encryption key for the operation result (415). The local system 400 may process the user authentication based on the result of performing the decryption (416). The local system 400 can perform signature verification through the result of performing the decryption and the signature verification operation from the signer's public key.
The apparatus described above may be implemented as a hardware component, a software component, and / or a combination of hardware components and software components. For example, the apparatus and components described in the embodiments may be implemented within a computer system, such as, for example, a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable gate array (FPGA) , A programmable logic unit (PLU), a microprocessor, or any other device capable of executing and responding to instructions. The processing device may execute an operating system (OS) and one or more software applications running on the operating system. The processing device may also access, store, manipulate, process, and generate data in response to execution of the software. For ease of understanding, the processing apparatus may be described as being used singly, but those skilled in the art will recognize that the processing apparatus may have a plurality of processing elements and / As shown in FIG. For example, the processing unit may comprise a plurality of processors or one processor and one controller. Other processing configurations are also possible, such as a parallel processor.
The software may include a computer program, code, instructions, or a combination of one or more of the foregoing, and may be configured to configure the processing device to operate as desired or to process it collectively or collectively Device can be commanded. The software and / or data may be in the form of any type of machine, component, physical device, virtual equipment, computer storage media, or device , Or may be permanently or temporarily embodied in a transmitted signal wave. The software may be distributed over a networked computer system and stored or executed in a distributed manner. The software and data may be stored on one or more computer readable recording media.
The method according to an embodiment may be implemented in the form of a program command that can be executed through various computer means and recorded in a computer-readable medium. The computer-readable medium may include program instructions, data files, data structures, and the like, alone or in combination. The program instructions to be recorded on the medium may be those specially designed and configured for the embodiments or may be available to those skilled in the art of computer software. Examples of computer-readable media include magnetic media such as hard disks, floppy disks and magnetic tape; optical media such as CD-ROMs and DVDs; magnetic media such as floppy disks; Magneto-optical media, and hardware devices specifically configured to store and execute program instructions such as ROM, RAM, flash memory, and the like. Examples of program instructions include machine language code such as those produced by a compiler, as well as high-level language code that can be executed by a computer using an interpreter or the like. The hardware devices described above may be configured to operate as one or more software modules to perform the operations of the embodiments, and vice versa.
While the present invention has been particularly shown and described with reference to exemplary embodiments thereof, it is to be understood that the invention is not limited to the disclosed exemplary embodiments. For example, it is to be understood that the techniques described may be performed in a different order than the described methods, and / or that components of the described systems, structures, devices, circuits, Lt; / RTI > or equivalents, even if it is replaced or replaced.
Therefore, other implementations, other embodiments, and equivalents to the claims are also within the scope of the following claims.
Claims (7)
Registering a first cipher text generated by performing a first cipher for the first password using the same type encryption method upon input of an ID and a first password, together with the ID, to a remote server;
Inputting the ID and a second password from a user;
Generating a hash value by hashing a second password input by the user into a hash function;
Encrypting the hash value of the second password using the same type encryption method to generate a second cipher text for the second password;
Transmitting the ID and the second ciphertext to the remote server and receiving an operation result between the first ciphertext and the second ciphertext from the remote server;
Performing decoding using the same type of encryption key on the result of the calculation; And
Processing the user authentication using the ID based on the result of performing the decryption;
Lt; / RTI >
Wherein the step of processing the user authentication using the ID based on the result of performing the decryption includes:
A signature generation step of generating a signature based on a signature generation operation of a signer having a private key for signing, then discarding the private key, and verifying the signature of the signer by signature verification from the public key of the signer and the generated signature Determining the validity, and performing a digital signature based on the private key such that recalculation of the signature is not possible
And a user authentication method.
Wherein the step of processing the user authentication using the ID based on the result of performing the decryption includes:
Performing signature verification through a result of performing the decryption and a signature verification operation from a signer's public key
And a user authentication method.
Wherein the step of processing the user authentication using the ID based on the result of performing the decryption includes:
Allowing login of the ID if the signature verification is successful, and rejecting login of the ID if the signature verification is unsuccessful
And a user authentication method.
Registering a first cipher text generated by performing a first cipher for the first password using the same type encryption method upon input of an ID and a first password, together with the ID, to a remote server;
Inputting the ID and a second password from a user;
Generating a hash value by hashing a second password input by the user into a hash function;
Encrypting the hash value of the second password using the same type encryption method to generate a second cipher text for the second password;
Transmitting the ID and the second ciphertext to the remote server and receiving an operation result between the first ciphertext and the second ciphertext from the remote server;
Performing decoding using the same type of encryption key on the result of the calculation; And
Processing the user authentication using the ID based on the result of performing the decryption;
Lt; / RTI >
Wherein the step of registering the first cipher text generated by performing the first cipher for the first password in the remote server together with the ID by using the same type encryption method when the ID and the first password are inputted,
Generating a key pair including a homogeneous encryption key, a public key for digital signature and a disposable private key, and determining signature information;
Generating a hash value of the first password by hashing the first password according to the input of the ID and the first password from the user;
Generating a signature based on the signature generation operation to obtain a signature value, and discarding the disposable private key;
Performing an exclusive-OR operation on each of the bits of the hash value and the signature value to generate an exclusive-OR operation result;
Generating a first ciphertext by encrypting the exclusive OR operation result using the same encryption method; And
Transmitting the ID and the first cipher text to the remote server and registering the ID and the first cipher text on the remote server
And a user authentication method.
And transmitting the ID and the first cipher text to the remote server and registering the ID and the first cipher text on the remote server,
A step of storing the same encryption key, a public key for signature verification of the electronic signature, and signature information
And a user authentication method.
At least one processor
Lt; / RTI >
Wherein the at least one processor, under control of the program,
Generating a key pair including a homogeneous encryption key, a public key for digital signature and a disposable private key, and determining signature information;
Generating a hash value of the first password by hashing the first password according to the input of the ID and the first password;
Generating a signature based on the signature generation operation to obtain a signature value, and discarding the disposable private key;
Generating an exclusive-OR operation result by performing an exclusive-OR operation on the hash value and the signature value for each bit;
Generating a first ciphertext by encrypting the result of the exclusive-OR operation using the same-type encryption method;
Transmitting the ID and the first cipher text to a remote server and registering the ID and the first cipher text on the remote server;
Inputting the ID and the second password from a user;
Generating a hash value by hashing a second password input by the user into a hash function;
Generating a second cipher text for the second password by encrypting the hash value of the second password using the same type encryption method;
Transmitting the ID and the second ciphertext to the remote server and receiving an operation result between the first ciphertext and the second ciphertext from the remote server;
Performing a decryption process on the result of the calculation using the same encryption key; And
Processing the user authentication using the ID based on the result of performing the decryption;
The user authentication system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150155350A KR101739203B1 (en) | 2015-11-05 | 2015-11-05 | Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150155350A KR101739203B1 (en) | 2015-11-05 | 2015-11-05 | Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170053063A KR20170053063A (en) | 2017-05-15 |
KR101739203B1 true KR101739203B1 (en) | 2017-05-23 |
Family
ID=58739464
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150155350A KR101739203B1 (en) | 2015-11-05 | 2015-11-05 | Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101739203B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11316657B2 (en) | 2018-04-06 | 2022-04-26 | Crypto Lab Inc. | User device and electronic device for sharing data based on block chain and homomorphic encryption technology and methods thereof |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102255286B1 (en) * | 2018-06-05 | 2021-05-26 | 아이리텍 잉크 | Method for physical identity management in blockchain using a decentralized biometrics system |
KR102157695B1 (en) * | 2018-08-07 | 2020-09-18 | 한국스마트인증 주식회사 | Method for Establishing Anonymous Digital Identity |
KR102084699B1 (en) * | 2019-08-22 | 2020-03-04 | 주식회사 알비엔 | Regional Economic Circulation System based on OTPA Block Chain Technology |
KR102466015B1 (en) * | 2021-06-21 | 2022-11-11 | 주식회사 크립토랩 | Server device for processing homomorphic ciphertext and method thereof |
KR102631080B1 (en) * | 2021-09-28 | 2024-01-30 | 건국대학교 산학협력단 | Docker image authentication apparatus and method using homomoriphic encryption |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101475747B1 (en) | 2014-01-22 | 2014-12-23 | 고려대학교 산학협력단 | Method for an outsourcing multi-party computation using homomorphic encryption |
-
2015
- 2015-11-05 KR KR1020150155350A patent/KR101739203B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101475747B1 (en) | 2014-01-22 | 2014-12-23 | 고려대학교 산학협력단 | Method for an outsourcing multi-party computation using homomorphic encryption |
Non-Patent Citations (2)
Title |
---|
Sergey Gorbunov, 외 2명, "Leveled fully homomorphic signatures from standard lattices," Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing. ACM, 2015. (2015.06.)* |
신승수, 한군희. "안전한 통신을 위한 메신저 프로토콜 설계." 한국산학기술학회논문지 Vol11, No.10 pp.3958-3963(2010.)* |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11316657B2 (en) | 2018-04-06 | 2022-04-26 | Crypto Lab Inc. | User device and electronic device for sharing data based on block chain and homomorphic encryption technology and methods thereof |
Also Published As
Publication number | Publication date |
---|---|
KR20170053063A (en) | 2017-05-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11757662B2 (en) | Confidential authentication and provisioning | |
RU2718689C2 (en) | Confidential communication control | |
CN108809646B (en) | Secure shared key sharing system | |
KR101727660B1 (en) | Method of using one device to unlock another device | |
KR101739203B1 (en) | Password-based user authentication method using one-time private key-based digital signature and homomorphic encryption | |
US10797879B2 (en) | Methods and systems to facilitate authentication of a user | |
KR101755995B1 (en) | Method and system for feature vector based remote biometric verification using homomorphic encryption | |
US20150318998A1 (en) | Methods and systems for client-enhanced challenge-response authentication | |
JP6927981B2 (en) | Methods, systems, and devices that use forward secure cryptography for passcode verification. | |
CN112425118A (en) | Public-private key account login and key manager | |
US11153074B1 (en) | Trust framework against systematic cryptographic | |
US9942042B1 (en) | Key containers for securely asserting user authentication | |
US20210073359A1 (en) | Secure one-time password (otp) authentication | |
Mun et al. | A novel secure and efficient hash function with extra padding against rainbow table attacks | |
CN111291398B (en) | Block chain-based authentication method and device, computer equipment and storage medium | |
CN114553566B (en) | Data encryption method, device, equipment and storage medium | |
JP6037450B2 (en) | Terminal authentication system and terminal authentication method | |
KR102094606B1 (en) | Apparatus and method for authentication | |
EP3361670B1 (en) | Multi-ttp-based method and device for verifying validity of identity of entity | |
US11528144B1 (en) | Optimized access in a service environment | |
CN113508380A (en) | Method for terminal entity authentication | |
KR102145679B1 (en) | Method for evading mitm attack for https protocol | |
Li et al. | Robust dynamic ID–based remote user authentication scheme using smart cards | |
CN114338052B (en) | Method and device for realizing identity authentication | |
TWI746504B (en) | Method and device for realizing synchronization of session identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |