WO2010105479A1 - 一种身份认证及共享密钥产生方法 - Google Patents
一种身份认证及共享密钥产生方法 Download PDFInfo
- Publication number
- WO2010105479A1 WO2010105479A1 PCT/CN2009/075132 CN2009075132W WO2010105479A1 WO 2010105479 A1 WO2010105479 A1 WO 2010105479A1 CN 2009075132 W CN2009075132 W CN 2009075132W WO 2010105479 A1 WO2010105479 A1 WO 2010105479A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- key
- initiator
- participant
- public key
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
- H04L9/0841—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
- H04L9/0844—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3093—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving Lattices or polynomial equations, e.g. NTRU scheme
Definitions
- the present invention relates to encryption technologies, and in particular, to an identity authentication and key agreement method.
- identity authentication and key agreement are the foundation of security.
- the purpose of the certification is to confirm the identity of both parties involved in order to prepare for subsequent security communications and to grant relevant rights.
- Identity authentication can be technically divided into three categories: password-based authentication, symmetric key-based authentication, and public key-based authentication.
- the implementation can be divided into: authentication with third party participation and certification without third party participation.
- Password-based authentication is currently widely used in the Internet, finance, etc. due to its simplicity, such as password login for e-mail accounts, passwords for bank cards, and so on.
- Symmetric key-based authentication is also widely used, such as IC card internal authentication and external authentication. The characteristics of these two methods are simple and practical, but the security is not high, and it is easy to be cracked. Only in the case of low security requirements, or in the case of high security requirements, other methods can be used for security assurance. practical. With the increase of security requirements, public key system authentication is generally adopted in the case of high security requirements.
- the PKI (Public Key Infrastructure) mechanism is typical.
- the public key algorithms widely used at present are RSA and ECC, which are characterized by high security.
- the disadvantage is that the operation is complicated and the resources are consumed.
- the chip implementation is large in scale and high in cost. This is one of the reasons why the ECC algorithm has been around for many years but it has not received massive support from the chip.
- the authentication of the public key generally uses a digital certificate to confirm the identity of the other party, and needs to be handed in during the authentication process. The certificate is changed, and the validity of the certificate of the other party needs to be verified. This will consume a certain amount of data bandwidth and consume a large amount of computing resources. In a certain writing situation, there may be no way to achieve it. For example
- Chinese Patent Publication No. CN101064610A discloses an identity authentication technology and a key agreement (sharing) technology, and the main implementation methods of the technology are as follows:
- the key authority generates a pair of public/private keys for each principal from its own keystore.
- the public/private key pairs of each device are different, which can revoke a specified device. .
- Each device stores the public key/private key pair in the device, where the private key requires secret storage, and other devices are not allowed to access, and the public key can be accessed by other devices;
- the authentication initiator initiates an authentication request, first generating a random number R and transmitting it along with its public key to the authentication participant.
- the authentication participant obtains the authentication request, and after receiving the random number R and the public key of the authentication initiator, transmits the public key to the authentication initiator;
- the blacklist function can also be used in this system.
- the public key is defined as a blacklist member, and the digital certificate blacklist function can be achieved.
- V After V receives and , it will be transmitted to U;
- V starts calculating:
- K f ⁇ K uv , R,) ⁇
- /0 is a function agreed in advance, which can be a hash function or an encryption function. Or other irreversible functions and their combinations.
- V uses its own calculated ⁇ as the encrypted password, encrypts it ⁇ ⁇ E (R ; and then transmits the result to U;
- V After receiving the U transmission, V will compare with the comparison. If it is the same, it is considered that the opposite party has generated the same key as itself.
- the two parties use K as the common key for subsequent communication. Or use K to encrypt the key that carries the subsequent communication.
- the technical problem to be solved by the present invention is to provide an identity authentication method and a shared key generation method thereof in view of the above disadvantages of the prior art.
- the present invention solves the technical problem, and adopts a technical solution, which is an identity authentication method and a shared key generation method thereof, including a key issuing authority, which is used to issue a public key and a private key to a device; each device has at least one Setting the correlation coefficient k and returning to the key authority of the public key and the private key Coefficient a, modulus m, and offset vector; where k, a are natural numbers, and k ⁇ 0; , , are vectors of ⁇ , 1 is a natural number of 2; let the public key of the authentication initiator be PA, private key For s A, the public key of the authentication participant is Pb and the private key is Sb ; and the feature is that the following steps are included:
- the authentication initiator initiates the authentication request and transmits its public key to the authentication participant.
- b. After the authentication participant obtains the authentication request, it transmits its public key to the authentication initiator.
- M B kx(p A xs + p A xe T + a) mo d «3 ⁇ 4 .
- S Transpose vector of A
- ⁇ is the transpose vector
- d with M A, M B as the basis for authentication, if the two are the same, the authentication is successful, otherwise the authentication fails.
- each device can also hold the public key of other devices as legal. List of identities. Among them, the private key requires the holder to keep it secretly and cannot be leaked out.
- the key authority sets the correlation coefficient k, the offset vector ⁇ , the regression coefficient &, the modulus m; k, a is a natural number, and 1 ⁇ 0. These parameters are only authorized by the software developer or chip developer and are not made public. , are all vectors of ⁇ , and 1 is a natural number of 2. n should be greater than or equal to 20, the greater the dimension, the stronger the confidentiality, but the more complicated the calculation.
- n 20. If the device: [, device j is any two devices, the pairing public key and private key satisfy the condition: kx(pxs J T + pxe T + a) ⁇ kx(p ⁇ xs 1 T + p j xe T + a) Modw3 ⁇ 4 ⁇ where, is the transpose vector;
- ⁇ is the transpose vector; the transpose vector for s j.
- device A is the authentication initiator, whose pairing public key is Pa and the private key is Sa ;
- device B is the authentication participant, the pairing public key is PB, and the private key is S B .
- Equipment A and Equipment B (collectively referred to as both parties to the certification) The conditions for successful certification are as follows:
- Embodiment 1 The present invention is applied to one-way authentication and key agreement.
- One-way authentication means that device A authenticates device B, and device B does not need to authenticate device A.
- the key authority assigns a pair of public and private keys to each principal (device) from its own keystore.
- the keystore of the key authority must be kept secret, and the private key of the authentication subject must also be kept secret.
- Each device's public/private key pair is different, which can revoke a specific device.
- Each device saves the public/private key pair in the device, where the private key requires secret storage and no other devices are allowed to access it.
- the public key can be accessed by other devices.
- Second assume that the authentication initiator's paired public key is ⁇ , the private key is ⁇ , and the authentication participant's match For the public key, the private key is ⁇ .
- the authentication initiator initiates the authentication request, first generates a random number, and transmits it to the authentication participant along with its public key A;
- the authentication participant obtains the authentication request, and after receiving the random number and the public key of the authentication initiator, generates a random number and transmits it to the authentication initiator together with the public key; Fourth, the authentication is initiated. After receiving the public key information sent by the other party, the party and the authentication participant check whether the public key is in its own blacklist. If it is in the blacklist, the subsequent process is aborted; otherwise, the fifth party, the authentication initiator calculates
- K_M A B_E(M A , R A HR ⁇ mod ⁇ (3)
- K_M B B_E(M B , R A ⁇ R B ) mod m ( 6 ) Calculate the authentication code C B :
- C B B_E l (K_M B , R A II R B ) mod m (7 )
- the authentication participant will send it to the authentication initiator.
- the authentication initiator waits for the other party to return to C B . If the specified time is not received, the authentication fails.
- the certification initiator will receive the comparison with the ⁇ calculated by himself, and if they are the same, they think The other party's identity is legal, and a common key - ⁇ ⁇ , is generated, and the authentication is successful. If they are not the same, the authentication fails.
- the authentication parties use -M ⁇ as the initial value of the shared key to generate the communication key of the authentication party, or directly use - ⁇ ⁇ as the key for subsequent communication.
- the authentication initiator or the authentication participant may generate and transmit a random number only by one party, and the other party may not need to generate and transmit.
- _ 0 is defined as an operation such as an encryption operation, a HASH operation, an HMAC operation, and the like.
- S_£0 and _ 0 can be the same or different.
- the operations of equations (3), (4), (5), (6), and (7) are all designed to increase the security during data transfer.
- This scheme is applied to mutual authentication and key agreement.
- Two-way authentication refers to the situation where device A and device B need to confirm each other's identity.
- the authentication initiator initiates the authentication request, first generating a random number ⁇ and transmitting it to the authentication participant along with its public key ⁇ ;
- the authentication participant obtains the authentication request and receives the random number and the public of the authentication initiator. After the key ⁇ , a random number is generated and transmitted to the authentication initiator along with its own public key;
- the authentication initiator and the authentication participant After receiving the public key sent by the other party, the authentication initiator and the authentication participant check whether the public key is in its own blacklist. If it is in the blacklist, the subsequent process is aborted, otherwise it continues;
- K_M A B_E(M A ,R A ) m odm (9)
- K_M B B_E(M B ,R A ) m odm (14)
- the certification participant will send it to the certification initiator and wait for the other party to return to B at the specified time. If the specified time is not received, the authentication fails.
- the authentication initiator will compare the received ones with their own calculations. If they are equal, the other party's identity is considered legal, and a common key ⁇ - ⁇ ⁇ ⁇ - ⁇ ⁇ ⁇ ) is generated, otherwise the authentication fails; (8) The authentication initiator sends ⁇ to the authentication participant, waiting for the other party to return. If the specified time is not received, the authentication fails;
- the certification participant compares the received ⁇ with its own calculation. If it is equal, the other party's identity is considered legal, and a common key ⁇ ⁇ - ⁇ ⁇ ⁇ ⁇ - ⁇ ⁇ , otherwise the authentication fails;
- both parties to the authentication use -M ⁇ as the initial value of the shared key, thereby generating the communication key of the authentication party, or directly using K as the key for subsequent communication.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mathematical Analysis (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Lock And Its Accessories (AREA)
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP09841762.9A EP2410691B1 (en) | 2009-03-20 | 2009-11-25 | Method for authenticating identity and generating share key |
JP2012500039A JP5330591B2 (ja) | 2009-03-20 | 2009-11-25 | 身元認証及び共有鍵生成の方法 |
US13/257,779 US8526607B2 (en) | 2009-03-20 | 2009-11-25 | Identity authentication and shared key generation method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200910300983XA CN101499908B (zh) | 2009-03-20 | 2009-03-20 | 一种身份认证及共享密钥产生方法 |
CN200910300983.X | 2009-03-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010105479A1 true WO2010105479A1 (zh) | 2010-09-23 |
Family
ID=40946800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/075132 WO2010105479A1 (zh) | 2009-03-20 | 2009-11-25 | 一种身份认证及共享密钥产生方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US8526607B2 (zh) |
EP (1) | EP2410691B1 (zh) |
JP (1) | JP5330591B2 (zh) |
KR (1) | KR101634158B1 (zh) |
CN (1) | CN101499908B (zh) |
WO (1) | WO2010105479A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553419A (zh) * | 2022-03-24 | 2022-05-27 | 上海循态量子科技有限公司 | 基于连续变量量子密钥分发的量子身份认证方法及系统 |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101499908B (zh) * | 2009-03-20 | 2011-06-22 | 四川长虹电器股份有限公司 | 一种身份认证及共享密钥产生方法 |
CN102916814B (zh) * | 2012-11-06 | 2016-04-13 | 四川虹微技术有限公司 | 一种基于矩阵运算的双向认证方法 |
US9367676B2 (en) | 2013-03-22 | 2016-06-14 | Nok Nok Labs, Inc. | System and method for confirming location using supplemental sensor and/or location data |
US9887983B2 (en) | 2013-10-29 | 2018-02-06 | Nok Nok Labs, Inc. | Apparatus and method for implementing composite authenticators |
US10270748B2 (en) | 2013-03-22 | 2019-04-23 | Nok Nok Labs, Inc. | Advanced authentication techniques and applications |
CN105684344B (zh) * | 2013-10-28 | 2019-06-11 | 华为终端有限公司 | 一种密钥配置方法和装置 |
US9654469B1 (en) | 2014-05-02 | 2017-05-16 | Nok Nok Labs, Inc. | Web-based user authentication techniques and applications |
CN106470104B (zh) | 2015-08-20 | 2020-02-07 | 阿里巴巴集团控股有限公司 | 用于生成共享密钥的方法、装置、终端设备及系统 |
US10637853B2 (en) | 2016-08-05 | 2020-04-28 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10769635B2 (en) | 2016-08-05 | 2020-09-08 | Nok Nok Labs, Inc. | Authentication techniques including speech and/or lip movement analysis |
US10237070B2 (en) * | 2016-12-31 | 2019-03-19 | Nok Nok Labs, Inc. | System and method for sharing keys across authenticators |
US11868995B2 (en) | 2017-11-27 | 2024-01-09 | Nok Nok Labs, Inc. | Extending a secure key storage for transaction confirmation and cryptocurrency |
US11831409B2 (en) | 2018-01-12 | 2023-11-28 | Nok Nok Labs, Inc. | System and method for binding verifiable claims |
CN108737400A (zh) * | 2018-05-09 | 2018-11-02 | 深圳市汇星数字技术有限公司 | 流媒体数据授权播放及终端确认方法 |
US12041039B2 (en) | 2019-02-28 | 2024-07-16 | Nok Nok Labs, Inc. | System and method for endorsing a new authenticator |
US11792024B2 (en) | 2019-03-29 | 2023-10-17 | Nok Nok Labs, Inc. | System and method for efficient challenge-response authentication |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007085779A1 (en) * | 2006-01-24 | 2007-08-02 | British Telecommunications Public Limited Company | Method and system for recursive authentication in a mobile network |
CN101064610A (zh) | 2007-05-25 | 2007-10-31 | 四川长虹电器股份有限公司 | 一种身份认证方法 |
CN101272251A (zh) * | 2007-03-22 | 2008-09-24 | 华为技术有限公司 | 鉴权和密钥协商方法、认证方法、系统及设备 |
CN101499908A (zh) * | 2009-03-20 | 2009-08-05 | 四川长虹电器股份有限公司 | 一种身份认证及共享密钥产生方法 |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7904722B2 (en) * | 1994-07-19 | 2011-03-08 | Certco, Llc | Method for securely using digital signatures in a commercial cryptographic system |
US5761305A (en) * | 1995-04-21 | 1998-06-02 | Certicom Corporation | Key agreement and transport protocol with implicit signatures |
US6154841A (en) * | 1996-04-26 | 2000-11-28 | Canon Kabushiki Kaisha | Digital signature method and communication system |
US6788788B1 (en) * | 1998-09-16 | 2004-09-07 | Murata Kikai Kabushiki Kaisha | Cryptographic communication method, encryption method, and cryptographic communication system |
US7415110B1 (en) * | 1999-03-24 | 2008-08-19 | Intel Corporation | Method and apparatus for the generation of cryptographic keys |
EP1271875A1 (en) * | 2001-06-21 | 2003-01-02 | Koninklijke Philips Electronics N.V. | Device arranged for exchanging data, and method of manufacturing |
US20040029562A1 (en) * | 2001-08-21 | 2004-02-12 | Msafe Ltd. | System and method for securing communications over cellular networks |
ATE314763T1 (de) * | 2002-03-13 | 2006-01-15 | Koninkl Philips Electronics Nv | Mehrbenutzerschlüsselerzeugung auf polynombasis und authentisierungsverfahren uns system |
JP3791464B2 (ja) * | 2002-06-07 | 2006-06-28 | ソニー株式会社 | アクセス権限管理システム、中継サーバ、および方法、並びにコンピュータ・プログラム |
US9602275B2 (en) * | 2003-10-28 | 2017-03-21 | Intel Corporation | Server pool kerberos authentication scheme |
EP1797667A1 (en) * | 2004-09-30 | 2007-06-20 | Koninklijke Philips Electronics N.V. | Polynomial-based key distribution system and method |
US20060236116A1 (en) * | 2005-04-18 | 2006-10-19 | Lucent Technologies, Inc. | Provisioning root keys |
CN101374043B (zh) * | 2007-08-24 | 2010-09-22 | 管海明 | 密钥协商的方法、加/解密的方法及签名/验证的方法 |
CN101150399B (zh) * | 2007-10-12 | 2011-01-19 | 四川长虹电器股份有限公司 | 共享密钥生成方法 |
US20090136043A1 (en) * | 2007-11-26 | 2009-05-28 | Motorola, Inc. | Method and apparatus for performing key management and key distribution in wireless networks |
JP5297688B2 (ja) * | 2008-05-09 | 2013-09-25 | 株式会社日立製作所 | ベクトル秘匿型内積計算システム、ベクトル秘匿型内積計算方法及び暗号鍵共有システム |
-
2009
- 2009-03-20 CN CN200910300983XA patent/CN101499908B/zh active Active
- 2009-11-25 WO PCT/CN2009/075132 patent/WO2010105479A1/zh active Application Filing
- 2009-11-25 EP EP09841762.9A patent/EP2410691B1/en not_active Not-in-force
- 2009-11-25 KR KR1020117024559A patent/KR101634158B1/ko active IP Right Grant
- 2009-11-25 JP JP2012500039A patent/JP5330591B2/ja not_active Expired - Fee Related
- 2009-11-25 US US13/257,779 patent/US8526607B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007085779A1 (en) * | 2006-01-24 | 2007-08-02 | British Telecommunications Public Limited Company | Method and system for recursive authentication in a mobile network |
CN101272251A (zh) * | 2007-03-22 | 2008-09-24 | 华为技术有限公司 | 鉴权和密钥协商方法、认证方法、系统及设备 |
CN101064610A (zh) | 2007-05-25 | 2007-10-31 | 四川长虹电器股份有限公司 | 一种身份认证方法 |
CN101499908A (zh) * | 2009-03-20 | 2009-08-05 | 四川长虹电器股份有限公司 | 一种身份认证及共享密钥产生方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114553419A (zh) * | 2022-03-24 | 2022-05-27 | 上海循态量子科技有限公司 | 基于连续变量量子密钥分发的量子身份认证方法及系统 |
CN114553419B (zh) * | 2022-03-24 | 2024-05-17 | 上海循态量子科技有限公司 | 基于连续变量量子密钥分发的量子身份认证方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
JP5330591B2 (ja) | 2013-10-30 |
EP2410691A1 (en) | 2012-01-25 |
CN101499908A (zh) | 2009-08-05 |
US20120027205A1 (en) | 2012-02-02 |
EP2410691B1 (en) | 2019-04-24 |
CN101499908B (zh) | 2011-06-22 |
KR101634158B1 (ko) | 2016-06-28 |
JP2012521109A (ja) | 2012-09-10 |
US8526607B2 (en) | 2013-09-03 |
KR20120007509A (ko) | 2012-01-20 |
EP2410691A4 (en) | 2015-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010105479A1 (zh) | 一种身份认证及共享密钥产生方法 | |
JP7119040B2 (ja) | データ伝送方法、装置およびシステム | |
US20240007308A1 (en) | Confidential authentication and provisioning | |
US10015154B2 (en) | Un-password: risk aware end-to-end multi-factor authentication via dynamic pairing | |
CN103124269B (zh) | 云环境下基于动态口令与生物特征的双向身份认证方法 | |
CN108599925B (zh) | 一种基于量子通信网络的改进型aka身份认证系统和方法 | |
US7607012B2 (en) | Method for securing a communication | |
AU2011305477B2 (en) | Shared secret establishment and distribution | |
US20220327530A1 (en) | Digital signature generation using a cold wallet | |
EP1383265A1 (en) | Method for generating proxy signatures | |
CN110959163A (zh) | 能够在多个存储节点上安全存储大型区块链的计算机实现的系统和方法 | |
CN103905384A (zh) | 基于安全数字证书的嵌入式终端间会话握手的实现方法 | |
CN113507372A (zh) | 一种接口请求的双向认证方法 | |
CN111416712B (zh) | 基于多个移动设备的量子保密通信身份认证系统及方法 | |
Jain et al. | A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography | |
JP6758476B2 (ja) | デバイス間の共通セッション鍵を取得するシステムおよび方法 | |
KR100456624B1 (ko) | 이동 통신망에서의 인증 및 키 합의 방법 | |
KR100542652B1 (ko) | 무선 통신 환경을 위한 키 분배 프로토콜 방법 | |
EP3185504A1 (en) | Security management system for securing a communication between a remote server and an electronic device | |
İşler et al. | Distributed single password protocol framework | |
WO2022135418A1 (zh) | 一种身份鉴别方法和装置 | |
Chattaraj et al. | An efficient two-server authentication and key exchange protocol | |
CN118540056A (zh) | 基于密钥中心和口令的公钥认证和密钥协商方法和系统 | |
CN113507379A (zh) | 一种基于Mesh网络数字证书认证方法 | |
Serb et al. | A Certificate–Based Signature Scheme for Secure Mobile Communications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09841762 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2012500039 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009841762 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 20117024559 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13257779 Country of ref document: US |