WO2010105479A1 - 一种身份认证及共享密钥产生方法 - Google Patents

一种身份认证及共享密钥产生方法 Download PDF

Info

Publication number
WO2010105479A1
WO2010105479A1 PCT/CN2009/075132 CN2009075132W WO2010105479A1 WO 2010105479 A1 WO2010105479 A1 WO 2010105479A1 CN 2009075132 W CN2009075132 W CN 2009075132W WO 2010105479 A1 WO2010105479 A1 WO 2010105479A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
key
initiator
participant
public key
Prior art date
Application number
PCT/CN2009/075132
Other languages
English (en)
French (fr)
Inventor
刘贤洪
康红娟
Original Assignee
四川长虹电器股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 四川长虹电器股份有限公司 filed Critical 四川长虹电器股份有限公司
Priority to EP09841762.9A priority Critical patent/EP2410691B1/en
Priority to JP2012500039A priority patent/JP5330591B2/ja
Priority to US13/257,779 priority patent/US8526607B2/en
Publication of WO2010105479A1 publication Critical patent/WO2010105479A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3093Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme

Definitions

  • the present invention relates to encryption technologies, and in particular, to an identity authentication and key agreement method.
  • identity authentication and key agreement are the foundation of security.
  • the purpose of the certification is to confirm the identity of both parties involved in order to prepare for subsequent security communications and to grant relevant rights.
  • Identity authentication can be technically divided into three categories: password-based authentication, symmetric key-based authentication, and public key-based authentication.
  • the implementation can be divided into: authentication with third party participation and certification without third party participation.
  • Password-based authentication is currently widely used in the Internet, finance, etc. due to its simplicity, such as password login for e-mail accounts, passwords for bank cards, and so on.
  • Symmetric key-based authentication is also widely used, such as IC card internal authentication and external authentication. The characteristics of these two methods are simple and practical, but the security is not high, and it is easy to be cracked. Only in the case of low security requirements, or in the case of high security requirements, other methods can be used for security assurance. practical. With the increase of security requirements, public key system authentication is generally adopted in the case of high security requirements.
  • the PKI (Public Key Infrastructure) mechanism is typical.
  • the public key algorithms widely used at present are RSA and ECC, which are characterized by high security.
  • the disadvantage is that the operation is complicated and the resources are consumed.
  • the chip implementation is large in scale and high in cost. This is one of the reasons why the ECC algorithm has been around for many years but it has not received massive support from the chip.
  • the authentication of the public key generally uses a digital certificate to confirm the identity of the other party, and needs to be handed in during the authentication process. The certificate is changed, and the validity of the certificate of the other party needs to be verified. This will consume a certain amount of data bandwidth and consume a large amount of computing resources. In a certain writing situation, there may be no way to achieve it. For example
  • Chinese Patent Publication No. CN101064610A discloses an identity authentication technology and a key agreement (sharing) technology, and the main implementation methods of the technology are as follows:
  • the key authority generates a pair of public/private keys for each principal from its own keystore.
  • the public/private key pairs of each device are different, which can revoke a specified device. .
  • Each device stores the public key/private key pair in the device, where the private key requires secret storage, and other devices are not allowed to access, and the public key can be accessed by other devices;
  • the authentication initiator initiates an authentication request, first generating a random number R and transmitting it along with its public key to the authentication participant.
  • the authentication participant obtains the authentication request, and after receiving the random number R and the public key of the authentication initiator, transmits the public key to the authentication initiator;
  • the blacklist function can also be used in this system.
  • the public key is defined as a blacklist member, and the digital certificate blacklist function can be achieved.
  • V After V receives and , it will be transmitted to U;
  • V starts calculating:
  • K f ⁇ K uv , R,) ⁇
  • /0 is a function agreed in advance, which can be a hash function or an encryption function. Or other irreversible functions and their combinations.
  • V uses its own calculated ⁇ as the encrypted password, encrypts it ⁇ ⁇ E (R ; and then transmits the result to U;
  • V After receiving the U transmission, V will compare with the comparison. If it is the same, it is considered that the opposite party has generated the same key as itself.
  • the two parties use K as the common key for subsequent communication. Or use K to encrypt the key that carries the subsequent communication.
  • the technical problem to be solved by the present invention is to provide an identity authentication method and a shared key generation method thereof in view of the above disadvantages of the prior art.
  • the present invention solves the technical problem, and adopts a technical solution, which is an identity authentication method and a shared key generation method thereof, including a key issuing authority, which is used to issue a public key and a private key to a device; each device has at least one Setting the correlation coefficient k and returning to the key authority of the public key and the private key Coefficient a, modulus m, and offset vector; where k, a are natural numbers, and k ⁇ 0; , , are vectors of ⁇ , 1 is a natural number of 2; let the public key of the authentication initiator be PA, private key For s A, the public key of the authentication participant is Pb and the private key is Sb ; and the feature is that the following steps are included:
  • the authentication initiator initiates the authentication request and transmits its public key to the authentication participant.
  • b. After the authentication participant obtains the authentication request, it transmits its public key to the authentication initiator.
  • M B kx(p A xs + p A xe T + a) mo d «3 ⁇ 4 .
  • S Transpose vector of A
  • is the transpose vector
  • d with M A, M B as the basis for authentication, if the two are the same, the authentication is successful, otherwise the authentication fails.
  • each device can also hold the public key of other devices as legal. List of identities. Among them, the private key requires the holder to keep it secretly and cannot be leaked out.
  • the key authority sets the correlation coefficient k, the offset vector ⁇ , the regression coefficient &, the modulus m; k, a is a natural number, and 1 ⁇ 0. These parameters are only authorized by the software developer or chip developer and are not made public. , are all vectors of ⁇ , and 1 is a natural number of 2. n should be greater than or equal to 20, the greater the dimension, the stronger the confidentiality, but the more complicated the calculation.
  • n 20. If the device: [, device j is any two devices, the pairing public key and private key satisfy the condition: kx(pxs J T + pxe T + a) ⁇ kx(p ⁇ xs 1 T + p j xe T + a) Modw3 ⁇ 4 ⁇ where, is the transpose vector;
  • is the transpose vector; the transpose vector for s j.
  • device A is the authentication initiator, whose pairing public key is Pa and the private key is Sa ;
  • device B is the authentication participant, the pairing public key is PB, and the private key is S B .
  • Equipment A and Equipment B (collectively referred to as both parties to the certification) The conditions for successful certification are as follows:
  • Embodiment 1 The present invention is applied to one-way authentication and key agreement.
  • One-way authentication means that device A authenticates device B, and device B does not need to authenticate device A.
  • the key authority assigns a pair of public and private keys to each principal (device) from its own keystore.
  • the keystore of the key authority must be kept secret, and the private key of the authentication subject must also be kept secret.
  • Each device's public/private key pair is different, which can revoke a specific device.
  • Each device saves the public/private key pair in the device, where the private key requires secret storage and no other devices are allowed to access it.
  • the public key can be accessed by other devices.
  • Second assume that the authentication initiator's paired public key is ⁇ , the private key is ⁇ , and the authentication participant's match For the public key, the private key is ⁇ .
  • the authentication initiator initiates the authentication request, first generates a random number, and transmits it to the authentication participant along with its public key A;
  • the authentication participant obtains the authentication request, and after receiving the random number and the public key of the authentication initiator, generates a random number and transmits it to the authentication initiator together with the public key; Fourth, the authentication is initiated. After receiving the public key information sent by the other party, the party and the authentication participant check whether the public key is in its own blacklist. If it is in the blacklist, the subsequent process is aborted; otherwise, the fifth party, the authentication initiator calculates
  • K_M A B_E(M A , R A HR ⁇ mod ⁇ (3)
  • K_M B B_E(M B , R A ⁇ R B ) mod m ( 6 ) Calculate the authentication code C B :
  • C B B_E l (K_M B , R A II R B ) mod m (7 )
  • the authentication participant will send it to the authentication initiator.
  • the authentication initiator waits for the other party to return to C B . If the specified time is not received, the authentication fails.
  • the certification initiator will receive the comparison with the ⁇ calculated by himself, and if they are the same, they think The other party's identity is legal, and a common key - ⁇ ⁇ , is generated, and the authentication is successful. If they are not the same, the authentication fails.
  • the authentication parties use -M ⁇ as the initial value of the shared key to generate the communication key of the authentication party, or directly use - ⁇ ⁇ as the key for subsequent communication.
  • the authentication initiator or the authentication participant may generate and transmit a random number only by one party, and the other party may not need to generate and transmit.
  • _ 0 is defined as an operation such as an encryption operation, a HASH operation, an HMAC operation, and the like.
  • S_£0 and _ 0 can be the same or different.
  • the operations of equations (3), (4), (5), (6), and (7) are all designed to increase the security during data transfer.
  • This scheme is applied to mutual authentication and key agreement.
  • Two-way authentication refers to the situation where device A and device B need to confirm each other's identity.
  • the authentication initiator initiates the authentication request, first generating a random number ⁇ and transmitting it to the authentication participant along with its public key ⁇ ;
  • the authentication participant obtains the authentication request and receives the random number and the public of the authentication initiator. After the key ⁇ , a random number is generated and transmitted to the authentication initiator along with its own public key;
  • the authentication initiator and the authentication participant After receiving the public key sent by the other party, the authentication initiator and the authentication participant check whether the public key is in its own blacklist. If it is in the blacklist, the subsequent process is aborted, otherwise it continues;
  • K_M A B_E(M A ,R A ) m odm (9)
  • K_M B B_E(M B ,R A ) m odm (14)
  • the certification participant will send it to the certification initiator and wait for the other party to return to B at the specified time. If the specified time is not received, the authentication fails.
  • the authentication initiator will compare the received ones with their own calculations. If they are equal, the other party's identity is considered legal, and a common key ⁇ - ⁇ ⁇ ⁇ - ⁇ ⁇ ⁇ ) is generated, otherwise the authentication fails; (8) The authentication initiator sends ⁇ to the authentication participant, waiting for the other party to return. If the specified time is not received, the authentication fails;
  • the certification participant compares the received ⁇ with its own calculation. If it is equal, the other party's identity is considered legal, and a common key ⁇ ⁇ - ⁇ ⁇ ⁇ ⁇ - ⁇ ⁇ , otherwise the authentication fails;
  • both parties to the authentication use -M ⁇ as the initial value of the shared key, thereby generating the communication key of the authentication party, or directly using K as the key for subsequent communication.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Algebra (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Lock And Its Accessories (AREA)

Description

一种身份认证及共享密钥产生方法 技术领域
本发明涉及加密技术, 特别涉及一种身份认证和密钥协商方法。
背景技术
在通信、 电子商务、 金融、 数据传送、 内容保护等领域, 身份认证和密 钥协商是安全的基础。 认证的目的是确认参与双方的身份, 从而为后续的安 全通信、 赋予相关权限做准备。
身份认证从技术上可以分为三类: 基于口令的认证、 基于对称密钥的认 证以及基于公钥体制的认证。 从实现方式上可以分为: 有第三方参与的认证 和没有第三方参与的认证。 基于口令的认证目前在互联网、 金融等方面由于 其简单性还在广泛使用, 比如电子邮箱账户的密码登陆、 银行卡的密码等。 基于对称密钥的认证目前也在广泛使用,比如 IC卡内部认证和外部认证方式。 这两种方式的特点就是简单实用, 但是安全性不高, 很容易被破解, 只能在 安全性要求不高的场合, 或者在安全性要求高的场合辅之以其它的方法进行 安全保证才能实用。 随着对安全性要求的增加, 目前在安全性要求高的场合 一般都采用了公钥体制的认证,典型的就是 PKI (Public Key Infrastructure) 机制, 目前在互联网、 金融、 电子商务等领域已经得到了大量的使用。 基于 公钥体制的认证, 目前大量采用的公钥算法是 RSA和 ECC, 特点是安全性高, 缺点是运算复杂, 耗用资源多, 结果芯片实现则规模大, 成本高。 这也是 ECC 算法已经出现多年但是目前并未得到芯片大规模支持的原因之一。 此外, 公 钥的认证一般采用数字证书的方式来确认对方身份, 在认证的过程中需要交 换证书, 并且需要对对方的证书的合法性进行验证, 这将耗费一定的数据带 宽, 也耗用较大的计算资源, 在某写场合, 可能已经没有办法实现。 比如对
IC卡的认证。中国专利公开号 CN101064610A公开了一种身份认证技术和密钥 协商 (共享) 技术, 该技术主要实现方法如下:
1) 密钥颁发机构从自己的密钥库中给每个主体产生一对公钥 /私钥, 每 个设备的公钥 /私钥对均不一样, 这样可以实现对某个指定设备的吊销。 令设 备的公钥为 P2 K Pn) , 私钥为 S = S2 L ^),其中, 和 均为 1
Xn的向量;
2) 每个设备将公钥 /私钥对均保存在设备中, 其中私钥要求秘密保存, 不允许其它设备访问, 公钥可以让其它的设备访问;
3) 假定认证发起方的公钥为 ^, 私钥为 ,认证参与方的公钥 ^, 私钥 为^。认证发起方发起认证请求, 首先产生一个随机数 R, 并和其公钥一起传 送给认证参与方。认证参与方获得认证请求, 在接收到认证发起方的随机数 R 和和公钥 后, 将自己的公钥 传送给认证发起方;
4)认证参与方开始计算 K2 = X^, 由于 为 ΙΧη向量, 为 的转 置向量, 即为 nXl向量, 所以两者之积 为一个常标量。 然后认证参与方计 算 =/^2,R),并将结果传送给认证发起方;
5)认证发起方计算 = ^χ^τ, 由于 ^为 ΙΧη向量, ^为 nXl向量, 所以两者之积 为一个常标量。然后认证发起方计算 = , ,并将结果传 送给认证参与方;
6) 认证双方将 A与 ^进行比较, 如果两者相等, 则认为认证通过, 否则 认证失败; 7) y = ( ' 一般事先约定, 并采用密码学领域的单向算法, 如 HASH 算法、 加密等;
8) 由于每对公钥 私钥 ^均是配对的, 因此本系统中同样可以使用黑名 单功能,即将公钥 定义为黑名单的成员,就可以达到数字证书黑名单的功能。
该算法应用于密钥协商的方法如下:
1 ) 可信管理机构 TA 为每台设备各分配两个指数向量
^=(«1 «2 Κ „)„, ^二 (Α βι Κ A)lx„ , 其中" , 为公开参数, β^ ζΡ , 为秘密参数; 要求对于任意的两个设备 υ 和 V, 均有
Figure imgf000005_0001
2)设参与通信的双方为 U和 V,则双方各有自己的指数向量 、 和 、
I,
3) U首先产生一个随机数 ,并将 和 传送给 V;
4) V接收到 和 后, 将 传送给 U;
5) U开始计算:
Figure imgf000005_0002
然后计算:
K = f{Kvu,R,)^
6) V开始计算:
Kuy =^υ x modp
然后计算:
K = f{Kuv,R,)^ 以上两歩中, /0为事先约定的一个函数, 可以是 hash 函数、 加密函数 或者其它的不可逆函数以及他们的组合。
7) U再次产生一个随机数 ^,并将 ^传送给 V; 随后计算^ = £( ^ ;
8) V同时也产生一个随机数 ,并将 传送给 U;随后计算 = £( ^);
9) U使用自己计算出的 Κ作为加密的密码, 对 进行加密 = £(^,^); 然后将结果 传送给 V;
10) V使用自己计算出的 Κ作为加密的密码,对 进行加密 ^ = E(R ; 然后将结果 传送给 U;
11 ) U接收到 V传送的 后, 将 与 e^进行比较, 如果相同则认为对 方已经产生了与自己相同的密钥;
12 ) V接收到 U传送的 后, 将 与 进行比较, 如果相同则认为对 方已经产生了与自己相同的密钥;
以上过程全部通过, 则双方采用 K作为共同密钥进行后续通信。 或者使 用 K来加密传送后续通信的密钥。
上述方法在实现上虽然非常简单, 但是, 在理论上, 该方法存在一定的 安全问题。 即理论上, 如果获得了足够多的公钥和私钥 (已经有相关文献报 导), 则第三方可以自有产生与原系统完全兼容的公钥和私钥。
发明内容
本发明所要解决的技术问题, 就是针对现有技术的上述缺点, 提供一种 身份认证方法及其共享密钥产生方法。
本发明解决所述技术问题, 采用的技术方案是, 一种身份认证方法及其 共享密钥产生方法, 包括密钥颁发机构, 用于向设备颁发公钥和私钥; 每个 设备至少具有一对公钥 和私钥 所述密钥颁发机构设定关联系数 k、 回归 系数 a、 模数 m及偏移向量 ;其中, k、 a为自然数, 且 k≠0; 、 、 均 为 ΙΧη的向量, 1 为 2的自然数; 设认证发起方的公钥为 PA, 私钥为 sA, 认证参与方的公钥为 Pb, 私钥为 Sb; 其特征在于, 包括以下歩骤:
a、 认证发起方发起认证请求, 并将其公钥^传送给认证参与方; b、 认证参与方获得认证请求后, 将其公钥 ^传送给认证发起方; c、 认证发起方计算: MA =kx(pBxs +pBxeT + a) mod«¾; 认证参与方计算: MB =kx(pAxs + pAxeT + a) mod«¾ . 其中, 为 SA的转置向量; ^为 的转置向量; 为 的转置向量; d、 以 MA、 MB作为认证的根据, 两者相同则认证成功, 否则认证失败。 本发明的有益效果是:
(1) 设备可以获取的公钥和私钥对无法直接组成线性方程组, 因此没有 办法直接破解本系统, 安全性高;
(2) 公钥 和私钥 ^的选取, 可以采取一定的措施, 比如保持一定的线 性相关性, 则本发明理论上很难破解;
(3) 方案的参数如果选择适当, 则乘法可以转换为加法, 实现简单, 芯 片规模小, 非常有利于降低成本, 比如, n维向量中的每个成员选为 2bit, 则 MA、 MB通过加法运算即可得到。 具体实施方式
下面结合实施例, 详细描述本发明的技术方案。
首先, 成立一个密钥颁发机构, 向设备颁发公钥和私钥。 每个设备除了 有一对配套的公钥 和私钥 外, 还可以保存有其他设备的公钥, 作为合法 身份名单。 其中, 私钥要求持有方秘密保存, 不可向外泄露。 密钥颁发机构 设定关联系数 k、偏移向量 ^、 回归系数&、 模数 m; k、 a为自然数, 且1^≠0。 这些参数仅向软件开发商或者芯片开发商授权, 不对外公开。 、 均为 ΙΧη的向量, 1 为 2的自然数。 n—般应大于等于 20,维数越大保密性越强, 但计算也会越复杂。 作为芯片应用, 去 n = 20就可以了。 如果设备:[、 设备 j 为 任 意 两 台 设 备 , 其 配 对 公 钥 和 私 钥 满 足 条 件 : kx(pxsJ T + pxeT + a)kx(p^xs1 T + pjxeT + a)modw¾ ^ 其中, 为 的转置向量;
^为 的转置向量; 为 sj的转置向量。 假定设备 A为认证发起方, 其配对 公钥为 Pa、 私钥为 Sa; 设备 B为认证参与方, 其配对公钥为 PB, 私钥为 SB 。 设备 A和设备 B (统称为认证双方) 认证成功的条件为下述同余式成立:
→ → → → → → → →
kx(pAxs + pAxeT + a)≡kx<;pBxs + pBxeT + a) modm (1) 其中, 为 SA的转置向量; ^为 的转置向量; 为 的转置向量。 实施例 1 本发明应用于单向认证和密钥协商。
单向认证是指设备 A认证设备 B, 而设备 B不需要认证设备 A的情况。 首先, 密钥颁发机构从自己的密钥库中给每个主体 (设备) 分配一对公 钥 和私钥 , 密钥颁发机构的密钥库必须保密, 认证主体的私钥也必须保 密。每个设备的公钥 /私钥对均不一样,这样可以实现对某个指定设备的吊销。 每个设备将公钥 /私钥对均保存在设备中, 其中私钥要求秘密保存, 不允许其 它设备访问。 公钥可以让其它的设备访问; 第二歩, 假定认证发起方的配对公钥为^、 私钥为 ^,认证参与方的配 对公钥 、 私钥为 ^。 认证发起方发起认证请求, 首先产生一个随机数 , 并与其公钥 A一起传送给认证参与方;
第三歩, 认证参与方获得认证请求, 在接收到认证发起方的随机数 和 公钥^后, 产生一个随机数 , 并与自己的公钥 一起传送给认证发起方; 第四歩, 认证发起方和认证参与方在收到对方发送的公钥信息后, 检查 其公钥是否在自身黑名单中, 如果在黑名单中, 则中止后续过程, 否则继续; 第五歩, 认证发起方计算
Figure imgf000009_0001
计算认证数据
K_MA =B_E(MA,RA HR^ mod^ (3)
计算认证码 CA :
CA =B_El(K_MA,RA \\RB) mod m (4)
认证参与方计算 MB B =kx(pAxs^ + pAxeT + a) mod m (5) 计算认证数据 - MB :
K_MB =B_E(MB,RA \\RB) mod m (6) 计算认证码 CB :
CB =B_El(K_MB,RA II RB) mod m (7) 认证参与方将 发送给认证发起方。认证发起方等待对方返回 CB,如果规 定时间没有收到, 则认证失败。
认证发起方将收到的 与自己计算所得的 ^进行比较, 如果相同则认为 对方身份合法, 并且产生了共同的密钥 -Λ^, 认证成功。 如果不相同, 则认 证失败。
认证成功后,认证双方以 -M^作为共享密钥的初始值, 以此产生认证双 方通信密钥, 或直接以 -Λ ^作为后续通信的密钥。
这里根据情况, 认证发起方或者认证参与方可以只有一方产生和传送随 机数, 而另外一方可以不需要产生和传送。 假设设备 B不产生随机数, 则以 上运算中 11 变为 , 如: K_MA =B_E(MA,RA)f CA =B_El(K_MA,RA)o 上式中, ii^表示 和 两个数直接串联组合为一个数, 比如 =10234, RB =88756,则 ^ 11^=1023488756。
如果仅作认证, 则不需要进行公式 (4)、 (7) 的运算, 可以直接对认证 数据 -MA、 -MB进行比较, 相同则认证成功。
上式中, _ 0定义为一种运算, 比如加密运算、 HASH运算、 HMAC运算 等。 S_£0和 _ 0可以相同, 也可以不同。 公式(3)、 (4)、 (5)、 (6)、 (7) 的运算, 都是为了增加数据传送过程中的安全性。
实施例 2
该方案应用于双向认证和密钥协商。
双向认证是指设备 A和设备 B需要相互确认对方身份的情况。
(1) 假定认证发起方(设备 A)的公钥为 ^, 私钥为 ^,认证参与方(设 备 B) 的公钥 ^, 私钥为
(2) 认证发起方发起认证请求,首先产生一个随机数 ^,并与其公钥 ^ 一起传送给认证参与方;
(3) 认证参与方获得认证请求,在接收到认证发起方的随机数 和和公 钥^后, 产生一个随机数 , 并与自己的公钥 一起传送给认证发起方;
(4) 认证发起方和认证参与方在收到对方发送的公钥后, 检查其公钥 否在自身黑名单中, 如果在黑名单中, 则中止后续过程, 否则继续;
(5) 认证发起方计算 MA :
MA =kx(pBxs +pBxeT + a) modm (8) 计算认证数据 -M
K_MA =B_E(MA,RA) modm (9)
计算认证码 、 CB
CA =B_El(K_MA,RA) modm (10)
CB =B_El(K_MA,RB) m0dm (11)
认证参与方计算 MB
MB
Figure imgf000011_0001
+ pAxeT + a) modm (13)
计算认证数据 -Ms :
K_MB =B_E(MB,RA) modm (14)
计算认证码 G、 CB'
CA =B_El(K_MB,RA) m0dm (15)
CB =B_El(K_MB,RB) mod n, (16)
(6) 认证参与方将 发送给认证发起方, 并在规定时间等待对方返回 B, 如果规定时间没有收到, 则认证失败;
(7) 认证发起方将收到的 与自己计算的 ^进行比较, 如果相等则认 为对方身份合法, 并且产生了共同的密钥 Κ-ΜΑ Κ-ΜΒ ~),否则认证失败; (8) 认证发起方将 ^发送给认证参与方, 等待对方返回 如果规定时 间没有收到, 则认证失败;
(9) 认证参与方将接收到的 ^与自己计算的 进行比较, 如果相等则 认为对方身份合法, 并且产生了共同的密钥 ί Κ-ΜΑ ^ΚΜΒ、, 否则认证失 败;
(10)认证成功后, 认证双方以 -M^作为共享密钥的初始值, 以此产生 认证双方通信密钥, 或直接以 K 作为后续通信的密钥。

Claims

权 利 要 求 书
1、 一种身份认证及共享密钥产生方法, 包括密钥颁发机构, 用于向设备 颁发公钥和私钥; 每个设备至少具有一对公钥 和私钥^ ; 所述密钥颁发机 构设定关联系数 回归系数&、 模数 m及偏移向量 ^ 其中, k、 a为自然数, 且1^≠0; 、 均为 Ι Χ η的向量, 1 为 2的自然数; 设认证发起方的 公钥为 P!, 私钥为 S a, 认证参与方的公钥为 ¾, 私钥为 S b ; 其特征在于, 包 括以下歩骤:
a、 认证发起方发起认证请求, 并将其公钥 ^传送给认证参与方; b、 认证参与方获得认证请求后, 将其公钥 ^传送给认证发起方; c、 认证发起方计算: MA = kx (pBx s^+ pBxeT + a) mo d «¾ ;
认证参与方计算: MB = kx(pAx Sg + pAxeT + a) mo d «¾ ;
其中, 为 s A的转置向量; i e的转置向量; s 为 的转置向量; d、 以 MA、 MB作为认证的根据, 两者相同则认证成功, 否则认证失败。
2、 根据权利要求 1所述的一种身份认证及共享密钥产生方法, 其特征在 于, 所述 n 20。
3、 根据权利要求 1或 2所述的一种身份认证及共享密钥产生方法, 其特 征在于, 歩骤 a和 b中, 收到对方公钥后, 判断其是否合法, 是则继续后续 歩骤, 否则终止后续歩骤。
4、 根据权利要求 1、 2或 3所述的一种身份认证及共享密钥产生方法, 其特征在于, 所述公钥 ;和私钥 ^具有线性相关性。
5、根据权利要求 1、 2、 3或 4所述的一种身份认证及共享密钥产生方法, 其特征在于, 认证成功则以 MA作为认证双方共享密钥的初始值, 以此产生认 证双方通信密钥。
6、 根据上述任意一项权利要求所述的一种身份认证及共享密钥产生方 法, 其特征在于,
歩骤 a还包括, 认证发起方产生一个随机数 RA, 并传送给认证参与方; 歩骤 c还包括:
认证发起方对 RA、 MA进行运算得到 B_E(MA,RA) ;
认证参与方对 RA MB进行相同的运算得到 B_E(MB,RA);
歩骤 d为: 以 B_E(MA,RA)、 B_E(MB,RA)作为认证的根据, 两者相同则认证 成功, 否则认证失败。
7、 根据权利要求 6所述的一种身份认证及共享密钥产生方法, 其特征在 于,认证成功则以 B_E(MA,RA)作为认证双方共享密钥的初始值, 以此产生认证 双方通信密钥。
8、 根据权利要求 6所述的一种身份认证及共享密钥产生方法, 其特征在 于,
歩骤 b进一歩包括, 认证参与方产生一个随机数 RB, 并传送给认证发起 方;
歩骤 c中, 认证发起方对 MA、 RA、 RB进行运算得到 B_E(MA,RA,RB) ; 认 证参与方对 MB、 RA、 RB进行相同的运算得到 B_E(MB,RA,RB) ;
歩骤 d为: 以 B_E(MA,RA,RB)、 B_E(MB,RA
Figure imgf000014_0001
认证根据, 两者相同则 认证成功, 否则认证失败。
9、 根据权利要求 8所述的一种身份认证及共享密钥产生方法, 其特征在 于, 认证成功则以 B_E(MA,RA,RB)作为认证双方共享密钥的初始值, 以此产生 认证双方通信密钥。
10、 根据上述任意一项权利要求所述的一种身份认证及共享密钥产生方 法, 其特征在于, 该方法可以用于认证发起方对认证参与方的单向认证, 也 用于认证发起方和认证参与方的相互认证。
PCT/CN2009/075132 2009-03-20 2009-11-25 一种身份认证及共享密钥产生方法 WO2010105479A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP09841762.9A EP2410691B1 (en) 2009-03-20 2009-11-25 Method for authenticating identity and generating share key
JP2012500039A JP5330591B2 (ja) 2009-03-20 2009-11-25 身元認証及び共有鍵生成の方法
US13/257,779 US8526607B2 (en) 2009-03-20 2009-11-25 Identity authentication and shared key generation method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910300983XA CN101499908B (zh) 2009-03-20 2009-03-20 一种身份认证及共享密钥产生方法
CN200910300983.X 2009-03-20

Publications (1)

Publication Number Publication Date
WO2010105479A1 true WO2010105479A1 (zh) 2010-09-23

Family

ID=40946800

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2009/075132 WO2010105479A1 (zh) 2009-03-20 2009-11-25 一种身份认证及共享密钥产生方法

Country Status (6)

Country Link
US (1) US8526607B2 (zh)
EP (1) EP2410691B1 (zh)
JP (1) JP5330591B2 (zh)
KR (1) KR101634158B1 (zh)
CN (1) CN101499908B (zh)
WO (1) WO2010105479A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553419A (zh) * 2022-03-24 2022-05-27 上海循态量子科技有限公司 基于连续变量量子密钥分发的量子身份认证方法及系统

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101499908B (zh) * 2009-03-20 2011-06-22 四川长虹电器股份有限公司 一种身份认证及共享密钥产生方法
CN102916814B (zh) * 2012-11-06 2016-04-13 四川虹微技术有限公司 一种基于矩阵运算的双向认证方法
US9367676B2 (en) 2013-03-22 2016-06-14 Nok Nok Labs, Inc. System and method for confirming location using supplemental sensor and/or location data
US9887983B2 (en) 2013-10-29 2018-02-06 Nok Nok Labs, Inc. Apparatus and method for implementing composite authenticators
US10270748B2 (en) 2013-03-22 2019-04-23 Nok Nok Labs, Inc. Advanced authentication techniques and applications
CN105684344B (zh) * 2013-10-28 2019-06-11 华为终端有限公司 一种密钥配置方法和装置
US9654469B1 (en) 2014-05-02 2017-05-16 Nok Nok Labs, Inc. Web-based user authentication techniques and applications
CN106470104B (zh) 2015-08-20 2020-02-07 阿里巴巴集团控股有限公司 用于生成共享密钥的方法、装置、终端设备及系统
US10637853B2 (en) 2016-08-05 2020-04-28 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10769635B2 (en) 2016-08-05 2020-09-08 Nok Nok Labs, Inc. Authentication techniques including speech and/or lip movement analysis
US10237070B2 (en) * 2016-12-31 2019-03-19 Nok Nok Labs, Inc. System and method for sharing keys across authenticators
US11868995B2 (en) 2017-11-27 2024-01-09 Nok Nok Labs, Inc. Extending a secure key storage for transaction confirmation and cryptocurrency
US11831409B2 (en) 2018-01-12 2023-11-28 Nok Nok Labs, Inc. System and method for binding verifiable claims
CN108737400A (zh) * 2018-05-09 2018-11-02 深圳市汇星数字技术有限公司 流媒体数据授权播放及终端确认方法
US12041039B2 (en) 2019-02-28 2024-07-16 Nok Nok Labs, Inc. System and method for endorsing a new authenticator
US11792024B2 (en) 2019-03-29 2023-10-17 Nok Nok Labs, Inc. System and method for efficient challenge-response authentication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007085779A1 (en) * 2006-01-24 2007-08-02 British Telecommunications Public Limited Company Method and system for recursive authentication in a mobile network
CN101064610A (zh) 2007-05-25 2007-10-31 四川长虹电器股份有限公司 一种身份认证方法
CN101272251A (zh) * 2007-03-22 2008-09-24 华为技术有限公司 鉴权和密钥协商方法、认证方法、系统及设备
CN101499908A (zh) * 2009-03-20 2009-08-05 四川长虹电器股份有限公司 一种身份认证及共享密钥产生方法

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7904722B2 (en) * 1994-07-19 2011-03-08 Certco, Llc Method for securely using digital signatures in a commercial cryptographic system
US5761305A (en) * 1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures
US6154841A (en) * 1996-04-26 2000-11-28 Canon Kabushiki Kaisha Digital signature method and communication system
US6788788B1 (en) * 1998-09-16 2004-09-07 Murata Kikai Kabushiki Kaisha Cryptographic communication method, encryption method, and cryptographic communication system
US7415110B1 (en) * 1999-03-24 2008-08-19 Intel Corporation Method and apparatus for the generation of cryptographic keys
EP1271875A1 (en) * 2001-06-21 2003-01-02 Koninklijke Philips Electronics N.V. Device arranged for exchanging data, and method of manufacturing
US20040029562A1 (en) * 2001-08-21 2004-02-12 Msafe Ltd. System and method for securing communications over cellular networks
ATE314763T1 (de) * 2002-03-13 2006-01-15 Koninkl Philips Electronics Nv Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system
JP3791464B2 (ja) * 2002-06-07 2006-06-28 ソニー株式会社 アクセス権限管理システム、中継サーバ、および方法、並びにコンピュータ・プログラム
US9602275B2 (en) * 2003-10-28 2017-03-21 Intel Corporation Server pool kerberos authentication scheme
EP1797667A1 (en) * 2004-09-30 2007-06-20 Koninklijke Philips Electronics N.V. Polynomial-based key distribution system and method
US20060236116A1 (en) * 2005-04-18 2006-10-19 Lucent Technologies, Inc. Provisioning root keys
CN101374043B (zh) * 2007-08-24 2010-09-22 管海明 密钥协商的方法、加/解密的方法及签名/验证的方法
CN101150399B (zh) * 2007-10-12 2011-01-19 四川长虹电器股份有限公司 共享密钥生成方法
US20090136043A1 (en) * 2007-11-26 2009-05-28 Motorola, Inc. Method and apparatus for performing key management and key distribution in wireless networks
JP5297688B2 (ja) * 2008-05-09 2013-09-25 株式会社日立製作所 ベクトル秘匿型内積計算システム、ベクトル秘匿型内積計算方法及び暗号鍵共有システム

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007085779A1 (en) * 2006-01-24 2007-08-02 British Telecommunications Public Limited Company Method and system for recursive authentication in a mobile network
CN101272251A (zh) * 2007-03-22 2008-09-24 华为技术有限公司 鉴权和密钥协商方法、认证方法、系统及设备
CN101064610A (zh) 2007-05-25 2007-10-31 四川长虹电器股份有限公司 一种身份认证方法
CN101499908A (zh) * 2009-03-20 2009-08-05 四川长虹电器股份有限公司 一种身份认证及共享密钥产生方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553419A (zh) * 2022-03-24 2022-05-27 上海循态量子科技有限公司 基于连续变量量子密钥分发的量子身份认证方法及系统
CN114553419B (zh) * 2022-03-24 2024-05-17 上海循态量子科技有限公司 基于连续变量量子密钥分发的量子身份认证方法及系统

Also Published As

Publication number Publication date
JP5330591B2 (ja) 2013-10-30
EP2410691A1 (en) 2012-01-25
CN101499908A (zh) 2009-08-05
US20120027205A1 (en) 2012-02-02
EP2410691B1 (en) 2019-04-24
CN101499908B (zh) 2011-06-22
KR101634158B1 (ko) 2016-06-28
JP2012521109A (ja) 2012-09-10
US8526607B2 (en) 2013-09-03
KR20120007509A (ko) 2012-01-20
EP2410691A4 (en) 2015-12-02

Similar Documents

Publication Publication Date Title
WO2010105479A1 (zh) 一种身份认证及共享密钥产生方法
JP7119040B2 (ja) データ伝送方法、装置およびシステム
US20240007308A1 (en) Confidential authentication and provisioning
US10015154B2 (en) Un-password: risk aware end-to-end multi-factor authentication via dynamic pairing
CN103124269B (zh) 云环境下基于动态口令与生物特征的双向身份认证方法
CN108599925B (zh) 一种基于量子通信网络的改进型aka身份认证系统和方法
US7607012B2 (en) Method for securing a communication
AU2011305477B2 (en) Shared secret establishment and distribution
US20220327530A1 (en) Digital signature generation using a cold wallet
EP1383265A1 (en) Method for generating proxy signatures
CN110959163A (zh) 能够在多个存储节点上安全存储大型区块链的计算机实现的系统和方法
CN103905384A (zh) 基于安全数字证书的嵌入式终端间会话握手的实现方法
CN113507372A (zh) 一种接口请求的双向认证方法
CN111416712B (zh) 基于多个移动设备的量子保密通信身份认证系统及方法
Jain et al. A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
JP6758476B2 (ja) デバイス間の共通セッション鍵を取得するシステムおよび方法
KR100456624B1 (ko) 이동 통신망에서의 인증 및 키 합의 방법
KR100542652B1 (ko) 무선 통신 환경을 위한 키 분배 프로토콜 방법
EP3185504A1 (en) Security management system for securing a communication between a remote server and an electronic device
İşler et al. Distributed single password protocol framework
WO2022135418A1 (zh) 一种身份鉴别方法和装置
Chattaraj et al. An efficient two-server authentication and key exchange protocol
CN118540056A (zh) 基于密钥中心和口令的公钥认证和密钥协商方法和系统
CN113507379A (zh) 一种基于Mesh网络数字证书认证方法
Serb et al. A Certificate–Based Signature Scheme for Secure Mobile Communications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09841762

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2012500039

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2009841762

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20117024559

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 13257779

Country of ref document: US