WO2011009317A1 - 认证方法、认证系统及认证服务器 - Google Patents

认证方法、认证系统及认证服务器 Download PDF

Info

Publication number
WO2011009317A1
WO2011009317A1 PCT/CN2010/072138 CN2010072138W WO2011009317A1 WO 2011009317 A1 WO2011009317 A1 WO 2011009317A1 CN 2010072138 W CN2010072138 W CN 2010072138W WO 2011009317 A1 WO2011009317 A1 WO 2011009317A1
Authority
WO
WIPO (PCT)
Prior art keywords
certificate
sub
authentication
module
server
Prior art date
Application number
PCT/CN2010/072138
Other languages
English (en)
French (fr)
Inventor
周伟
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011009317A1 publication Critical patent/WO2011009317A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority

Definitions

  • the present invention relates to network communication security technologies, particularly authentication methods, authentication systems, and authentication servers. Background technique
  • WLAN Authentication and Privacy Infrastructure is a security protocol applied to WLAN. It is a standard of innovative technology proposed by China, which solves the existing vulnerabilities and hidden dangers of wireless LAN security mechanisms. .
  • the WAPI security mechanism consists of two parts: the WLAN Authentication Infrastructure (WAI) and the Wireless Office i or WLAN Privacy Infrastructure (WPI).
  • WAI is used to authenticate the user's identity, ensuring that legitimate users access the legitimate network; WPI is used to encrypt the transmitted data, ensuring the confidentiality of the communication.
  • WAI uses a public key cryptosystem to use digital certificates to perform mutual authentication between a mobile terminal (MT) and an access point (AP) of a WLAN system.
  • WAI defines a type of authentication service unit ( An entity of the Authentication Service Unit (ASU) that manages the certificates required by the parties involved in the information exchange, including the generation, issuance, revocation, and renewal of certificates.
  • the certificate contains the public key and signature of the certificate issuer (ASU) and the certificate holder's public key and signature (the signature is a WAPI-specific elliptic curve digital signature algorithm), which is the digital identity certificate of the network device terminal MT. .
  • the specific implementation of the WAPI protocol includes the following processes:
  • Access authentication request The MT sends an authentication request to the AP, and sends its own certificate and access authentication request time to the AP;
  • Certificate authentication request After receiving the MT access authentication request, the AP sends an authentication request to the ASU, and the MT certificate, the access authentication request time, the AP certificate, and the signature of the AP private key. Forming a certificate authentication request 4 message information is sent to the ASU;
  • Certificate authentication response After receiving the AP authentication request, the ASU verifies the signature of the AP and the legality of the AP and the MT certificate. After the verification is completed, the ASU will verify the result of the MT certificate (including the MT certificate, the authentication result, and the access authentication). The request time and the signature of the ASU to them), the AP certificate authentication result information (including the AP certificate, the authentication result, the access authentication request time, and the signature of the ASU) constitute a certificate response, and the message is sent back to the AP;
  • Access authentication response The AP verifies the certificate response returned by the ASU, and obtains the MT certificate authentication result.
  • the AP sends the MT certificate authentication information, the AP certificate authentication result information, and the AP's signature to form an access authentication response message.
  • the authentication result of the AP certificate is obtained, and the MT determines whether to access the AP according to the authentication result;
  • the signature private key of the certificate is kept by a single ASU. If the ASU rights are too large, the signature private key will be abused. If the signature private key is leaked, lost or damaged, it will cause great losses.
  • the certification of the certificate is completed by a single ASU. If the ASU is controlled by the attacker or becomes untrustworthy, the ASU causes the illegal MT to access the network through authentication, and the legitimate MT cannot access the network. ASU performs malicious authentication response behavior, and any MT cannot access the network, which causes the network to fall into paralysis.
  • the technical problem to be solved by the present invention is to provide an authentication method, an authentication system, and an authentication server to improve the security of certificate authentication.
  • the present invention provides an authentication method, the method comprising: a certificate authentication server selecting step, the access point (AP) randomly selecting nl authentication servers from the N candidate authentication servers as the certificate authentication server And notifying the selected authentication server, where t ⁇ nl ⁇ N, t is a preset threshold;
  • each credential authentication server uses the respective sub-keys to generate an AP sub-certificate and a MT sub-certificate for the public key information of the AP and the mobile terminal (MT);
  • the first sub-certificate validity verification step the AP sub-certificate and the MT sub-certificate generated by each certificate authentication server and other certificate authentication servers, and verifying the validity of each AP sub-certificate and the MT sub-certificate;
  • the first sub-certificate merge step when the valid number of the AP sub-certificate and the effective number of the MT sub-certificate are greater than or equal to the threshold t, each certificate authentication server merges the valid AP sub-certificate into an AP certificate and will be effective.
  • the MT sub-certificates are merged into an MT certificate;
  • the certificate legality verification step the certificate authentication server verifies the legality of the AP certificate and the MT certificate.
  • the public key information of the AP and the MT is included in the AP certificate and the MT certificate.
  • the method further includes the step of generating an AP certificate or an MT certificate, and the step of generating the AP certificate or the MT certificate includes:
  • the certificate generation server selecting step the AP or the MT randomly selects n2 authentication servers from the N candidate authentication servers as the certificate generation server and notifies the selected authentication server, where l ⁇ t ⁇ n2 ⁇ N,
  • each certificate generating server uses a respective sub-key pair AP or MT second sub-certificate validity verification step, and the AP or the MT performs validity verification on each sub-certificate received;
  • the second sub-certificate merge step the effective number of the AP sub-certificate or the MT sub-certificate is greater than or equal to the AP certificate or the MT certificate.
  • the generated MT sub-certificate or the AP sub-certificate is (m SIGO, where m is the public key information of the MT or the public key information of the AP, +3 ⁇ 4) mod ⁇ , G is the base point of the elliptic curve, a random integer randomly chosen by the authentication server AS, ⁇ ( ⁇ , ⁇ ), N is the number of elliptic curve points, ⁇ is a single function, 810 1 Subkey; the first sub-certificate validity verification step or the second sub-certificate validity verification step, the authentication server, ⁇ or ⁇ through the AS public key verification equation: SIGi G PiH m) ⁇ +Q whether If it is not established, the AP sub-certificate or the MT sub-certificate is considered invalid;
  • the synthesized certificate is (m, C, SIG), where:
  • the report is generated by the trusted center (TC) to generate the AP sub-certificate or the MT sub-protocol.
  • the certificate authentication server of the certificate has a fraudulent behavior;
  • the n3 certificate authentication servers are selected to perform the above sub-certificate generation step and the sub-certificate validity verification step, where n3 is the number of certificate authentication servers in which fraudulent behavior occurs, until a valid sub-certificate The number ⁇ t, and then the sub-certificate merge step.
  • the present invention also provides an authentication system, which includes interconnecting Connected access point (AP) and N alternate authentication servers;
  • AP Connected access point
  • N alternate authentication servers N alternate authentication servers
  • the AP includes a server selection module, and the server selection module is configured to: randomly select nl authentication servers from the N candidate authentication servers as the certificate authentication server and notify the selected authentication server, where t ⁇ nl ⁇ N, t is a preset threshold;
  • the authentication server includes a sub-certificate generation module, a sub-certificate validity verification module, a sub-certificate merge module, and a legality verification module, wherein:
  • the sub-certificate generation module is configured to: when the authentication server is selected as the certificate authentication server, use the authentication server subkey to authenticate the public key information of the AP and the mobile terminal MT;
  • the sub-certificate validity verification module is configured to: an AP sub-certificate and an MT sub-certificate generated by interaction with other participating authentication servers other than the authentication server, and verify validity of each AP sub-certificate and the MT sub-certificate;
  • the sub-certificate merge module is configured to: when the effective number of the AP sub-certificate and the effective number of the MT sub-certificate are greater than or equal to the threshold, combine the valid AP sub-certificates into the AP certificate and merge the valid MT sub-certificates. For the MT certificate;
  • the legality verification module is configured to: verify the legality of the AP certificate and the MT certificate.
  • the system also includes an MT,
  • the MT includes a server selection module, a sub-certificate validity verification module, and a sub-certificate merge module connected to each other.
  • the server selection module is configured to: randomly select n2 authentication servers from the N candidate authentication servers as the certificate generation server and notify the selected authentication server, where Kt ⁇ n2 ⁇ N;
  • the sub-certificate validity verification module of the MT is configured to: perform a validity insurance certificate on the MT sub-certificate sent by the certificate generation server;
  • the sub-certificate merge module of the MT is configured to: when all the valid numbers of the MT sub-certificates are greater than or equal to the threshold, combine all valid MT sub-certificates to generate an MT certificate;
  • the AP further includes a sub-certificate that is interconnected with the server selection module of the AP.
  • Sexual verification module and sub-certificate merge module :
  • the server selection module of the AP is configured to: randomly select n2 authentication servers from the N candidate authentication servers as the certificate generation server and notify the selected authentication server, where Kt ⁇ n2 ⁇ N;
  • the sub-certificate validity verification module of the AP is configured to: perform validity verification on the AP sub-certificate sent by the certificate generation server;
  • the sub-certificate merge module of the AP is configured to: when all the valid numbers of the AP sub-certificates are greater than or equal to the threshold, combine all valid AP sub-certificates to generate an AP certificate;
  • the sub-certificate generation module of the authentication server is further configured to: when the authentication server is selected to generate an authentication server, send the generated MT sub-certificate to the sub-certificate of the MT to verify that the sub-certificate generation module generates
  • the MT sub-certificate or AP sub-certificate is (m SIGO, where m is the public key information of the MT or AP, +3 ⁇ 4) mod N,
  • G is the base point of the elliptic curve, is a random integer randomly selected by the authentication server AS, £ (1, ⁇ ), ⁇ is the number of elliptic curve points, and ⁇ is a single function, which is a subkey of 810 1 ;
  • the system also includes a TC connected to the AP, the MT, and the authentication server.
  • Sub-certificate validity verification module of the authentication server, or sub-certificate validity verification of the AP The sub-certificate validity verification module of the module or the MT is further configured to: when verifying that an AP sub-certificate or the MT sub-certificate is invalid, reporting the fraudulent behavior of the authentication server that generates the AP sub-certificate or the MT sub-certificate to the TC; The number of certificates is less than the threshold value t, and the corresponding server selection module is notified to select n3 authentication servers as the certificate authentication server.
  • the present invention further provides an authentication server, where the authentication server includes a sub-certificate generation module, a sub-certificate validity verification module, a sub-certificate merge module, and a legality verification module, wherein:
  • the sub-certificate generation module is configured to: when the authentication server is selected as a certificate authentication server, generate a public key information signature of an access point (AP) and a mobile terminal (MT) by using a subkey of the authentication server
  • the AP sub-certificate and the MT sub-certificate are sent to the sub-certificate validity verification module;
  • the sub-certificate validity verification module is configured to: interact with an AP sub-certificate and a MT sub-certificate generated by a certificate authentication server other than the authentication server, and verify validity of each AP sub-certificate and the MT sub-certificate;
  • the sub-certificate merge module is configured to: when the effective number of the AP sub-certificate and the effective number of the MT sub-certificate are greater than or equal to the threshold t, the method is used to merge each valid AP sub-certificate into an AP certificate and each valid MT Sub-certificates are merged into MT certificates;
  • the legality verification module is configured to: verify the legality of the AP certificate and the MT certificate.
  • the sub-certificate validity verification module is further configured to: if it is determined that the number of valid sub-certificates is less than the threshold value t, notify the corresponding server selection module to select n3 authentication servers as the certificate authentication server.
  • the invention also provides an access point (AP), which is applied to an authentication system,
  • the AP includes a server selection module, and the server selection module is configured to: randomly select nl authentication servers from the N candidate authentication servers as the certificate authentication server and notify the selected authentication server, where t ⁇ nl ⁇ N, t is a preset threshold.
  • the AP further includes a sub-certificate validity verification module and a sub-certificate merge module that are interconnected with the server selection module:
  • the server selection module is configured to: randomly select n2 from N candidate authentication servers
  • the authentication server acts as a certificate generation server and notifies the selected authentication server, where l ⁇ t ⁇ n2 ⁇ N;
  • the sub-certificate validity verification module is configured to: perform validity verification on the AP sub-certificate sent by the certificate generation server; and the AP sub-certificate is when the authentication server is selected to generate an authentication server, to the sub-certificate Sent by the certificate validity verification module;
  • the sub-certificate merge module is configured to: when all the valid sub-certificates of the AP sub-certificate are greater than or equal to the threshold, combine all valid AP sub-certificates to generate an AP certificate.
  • the AP sub-certificate is (X SIGO, where m is the public key information of the AP, CfRC
  • G is the base point of the elliptic curve, is a random integer randomly selected by the authentication server ASUi, £ (1, ⁇ ), ⁇ is the number of elliptic curve points, ⁇ is a single item Function, a subkey of SIGi;
  • the sub-certificate validity verification module is further configured to: when verifying that an AP sub-certificate is invalid, report the fraudulent behavior of the authentication server that generates the AP sub-certificate to the trusted center; if the number of valid sub-certificates is less than the gate The limit value t, the notification server selection module selects n3 authentication servers as the certificate authentication server.
  • a mobile terminal includes a server selection module, a sub-certificate validity verification module, and a sub-certificate merge module:
  • the server selection module is configured to: randomly select n2 from N candidate authentication servers
  • the authentication server acts as a certificate generation server and notifies the selected authentication server, where l ⁇ t ⁇ n2 ⁇ N;
  • the sub-certificate validity verification module is configured to: perform validity verification on the MT sub-certificate sent by the certificate generation server; and the MT sub-certificate is when the authentication server is selected to generate an authentication server, to the sub- Sent by the certificate validity verification module;
  • the sub-certificate merge module is configured to: when all the valid numbers of the MT sub-certificates are greater than or equal to the threshold, merge all valid MT sub-certificates to generate an MT certificate.
  • the MT sub-certificate is
  • G is the base point of the elliptic curve, is a random integer randomly selected by the authentication server ASUi, £ (1, ⁇ ), ⁇ is the number of elliptic curve points, ⁇ is a single item Function, a subkey of SIGi;
  • the sub-certificate validity verification module is set to: verify the equation by the public key of the AS: SIGi G PiH m) ⁇ - ID] +Q is established, if not, the sub-certificate is considered invalid;
  • the sub-certificate validity verification module is further configured to: when verifying that a certain MT sub-certificate is invalid, report the fraudulent behavior of the authentication server that generates the MT sub-certificate to the trusted center; if the number of valid sub-certificates is less than the gate
  • the limit value t is notified to the corresponding server selection module to select n3 authentication servers as the certificate authentication server.
  • the authentication method, the authentication system and the authentication server of the present invention introduce the basic idea of threshold cryptography, and the signature private key is divided, and each ASU only has a part of the signature private key, and the number of ASUs must be
  • the MT certificate must be completed at least when the threshold is reached, effectively preventing the abuse of the signed private key and ensuring the security of the signed private key; any subkeys less than the threshold number are not Any information about the signature private key will be obtained, which overcomes the security problem that the existing signature private key is stored by a single ASU, and decentralizes the rights of the ASU.
  • the invention also provides a verification mechanism, which can effectively detect the information exchange process.
  • the fraudulent behavior of the ASU or the trusted center TC overcomes the shortcomings of the prior art and improves the security.
  • the AP can select a threshold server, and the authentication of the certificate is completed by multiple ASUs, and multiple ASUs are completed.
  • the identification overcomes the shortcomings of the single ASU authentication and improves the security and efficiency of the authentication mechanism.
  • FIG. 1 is a schematic diagram of a WAPI-based authentication method of the present invention
  • FIG. 2 is a schematic diagram of a certificate generation process of the present invention
  • FIG. 3 is a schematic diagram of an MT certificate generated by an application example of the present invention.
  • FIG. 4 is a schematic diagram of a certificate authentication process of an application instance of the present invention.
  • Fig. 5 is a schematic structural view of an application system of the present invention.
  • the authentication method of the present invention includes:
  • Step 101 an authentication server selecting step, the access point AP randomly selects nl authentication servers from the N candidate authentication servers as the certificate authentication server, and notifies the selected authentication server, where Kt ⁇ nl ⁇ N, t is preset Fixed threshold
  • the threshold value is set according to the level of security required, ease of use, and the like.
  • Step 102 a sub-certificate generation step, each certificate authentication server uses the respective sub-keys to generate an AP sub-certificate and a MT sub-certificate for the public key information of the AP and the mobile terminal MT;
  • Step 103 The sub-certificate validity verification step, the AP sub-certificate and the MT sub-certificate generated by each certificate authentication server and other certificate authentication servers, and verify the validity of each AP sub-certificate and the MT sub-certificate;
  • the authentication of the certificate is completed by multiple authentication servers, and the multiple authentication server authentication overcomes the shortcomings of the single authentication server authentication.
  • Step 104 The sub-certificate combining step, when the valid number of the AP sub-certificate and the effective number of the MT sub-certificate are greater than or equal to the threshold t, each certificate authentication server merges the valid AP sub-certificate into an AP certificate and A valid MT sub-certificate is merged into an MT certificate;
  • Step 105 Verify the validity of the certificate, and the authentication server verifies the legality of the AP certificate and the MT certificate.
  • the public key information of the AP and the MT is included in the AP certificate and the MT certificate, and the process of generating the AP certificate or the MT certificate includes:
  • Step 201 Generate a server selection step, the AP or the MT randomly selects n2 authentication servers from the N candidate authentication servers as the certificate generation server and notifies the selected authentication server, where l ⁇ t ⁇ n2 ⁇ N, n2 can be Nl is different;
  • Step 202 Sub-certificate generation step, each certificate generation server uses the respective sub-key pair AP
  • Step 203 The sub-certificate validity verification step, the AP or the MT validating the received sub-certificates;
  • Step 204 The sub-certificate merge step, where the effective number of the AP sub-certificate or the MT sub-certificate is greater than the generated AP certificate or the MT certificate.
  • step 103 and step 203 if it is verified that an AP sub-certificate or a MT sub-certificate is invalid, the certificate authentication server that generates the AP sub-certificate or the MT sub-certificate occurs on the trusted center TC.
  • n3 is the certificate authentication server that has fraudulent behavior Number, until the number of valid sub-certificates ⁇ t.
  • the sub-certificate merge step is performed, and the certificate authentication server that performs the certificate legality verification step is a certificate authentication server that does not have fraudulent behavior.
  • nl ⁇ N, so that when the authentication finds that the authentication server is spoofing, it is guaranteed that there is room for selecting another authentication server to complete the authentication process as soon as possible.
  • the process of generating, verifying, and merging sub-certificates is described in detail below in conjunction with the formula:
  • m be the MT or AP public key information
  • G be the base point of the elliptic curve
  • N be the number of elliptic curve points
  • H be a single function
  • eight 811 1 be the authentication server
  • is the public identity of the AS
  • AS randomly chooses a random integer R l £ (l, N), confidential, calculated
  • the signature information SIG ⁇ dH m) f] + ) mod N is calculated.
  • (mA ⁇ IGO is the MT sub-certificate generated by the AS using its own subkey.
  • SIG 1 G P 1 H(m) ⁇ — ID] Whether +Q is true. If it is not established, there is deception. Otherwise, there is no deception.
  • the C sub-certificate is set to ASU ASU 2 , and the sub-certificate of the MT generated by ASU t is: (n ⁇ C ⁇ SIGO,
  • the synthesized certificate is (m, C, SIG).
  • the authentication server obtains the subkey in this way:
  • N authentication servers register identity with the trusted center TC
  • the TC generates a signature private key, and divides the signature private key into N subkeys according to the identity of the N authentication servers, and distributes the signature to the authentication server corresponding to the identity identifier;
  • the N authentication servers receive the subkeys of the TC distribution, and verify the validity of the subkeys. If the verification fails, the TC is audited or the TC is reselected.
  • the AP, the MT, or the authentication server uses the verification information to verify the validity of the sub-certificate of the AP or the MT, or the validity of the sub-key, and the verification information is generated by the TC calculation and sent to the AP, MT, or Authentication server.
  • the invention can effectively detect the fraudulent behavior of the trusted third party and the ASU by using the public verification information, thereby improving the security.
  • the key is PfSiGn
  • Step A ASUi, ASU 2 , ASU 3 , ASU 4 , ASU 5 first register their identity with the trusted center TC;
  • Step B The trusted center TC generates a signature private key, calculates a public key corresponding to the signature private key, and then uses the Lagrangian interpolation theorem to sign the signature according to the public identity of ASU ⁇ ASU 2 , ASU 3 , ASU 4 , and ASU 5 .
  • the private key is divided into five sub-keys, and the verification information is calculated, and the sub-key message information is sent to the corresponding ASU of the identity identifier;
  • Step C After receiving the subkey message information, the ASUi, the ASU 2 , the ASU 3 , the ASU 4 , and the ASU 5 verify the correctness of the subkey by verifying the information;
  • Each ASU obtains the authentication information by actively accessing the TC or the TC carries the verification information to each ASU when sending the subkey information. Each ASU only needs to obtain the verification information once, and multiple validity verifications can be completed.
  • Step D If the subkey verification fails, send a message message to notify other ASUs, the protocol terminates immediately, audit the trusted center TC or reselect the trusted center TC, and go to step 1.
  • the process of generating the MT certificate includes the following steps:
  • Step 301 The MT randomly selects three AS1 ⁇ ASU ⁇ ASU 3 and ASU 5 ) to register their own public key information;
  • Step 302 ASUi, ASU 3 , and ASU 5 use their own subkeys to generate the MT sub-certificate, and send the sub-certificate message information to the MT, and the MT verifies the validity of the sub-certificate through the verification information on the trusted center TC, MT. All sub-certificates are verified, and MT obtains its own certificate according to the use of Lagrange interpolation theorem to merge the sub-certificates;
  • Step 303 ASUi, ASU 3 , and ASU 5 send the sub-certificate message information to the trusted center TC, and the MT verifies the validity of the sub-certificate through the verification information on the trusted center TC, and the trusted center TC checks the authentication information according to the ASU ⁇ The sub-certificates sent by ASU 3 and ASU 5 are verified. If all the sub-certificates are verified, the MT certificate is obtained according to the sub-certificate by using the Lagrangian interpolation theorem, and then the MT certificate is released into the certificate library;
  • Step 304 If the sub-certificate verification fails, the MT sends a rejection to accept the message to the trusted center. TC, the trusted center TC adds the fraudulent ASU to the bad record table for auditing, and notifies the corresponding ASU.
  • the trusted center TC can manage the saved MT certificate, including directly sending the saved MT certificate to the MT and revoking the MT certificate when the MT loses or damages the MT certificate.
  • the above is an example of the generation of an MT certificate.
  • the process for generating an AP certificate is the same.
  • the authentication process includes the following processes:
  • Step 401 The MT logs in to the AP, and the AP sends an authentication activation to the MT to start the authentication process.
  • Step 402 The MT sends an authentication request to the AP, and sends the MT certificate and the MT access authentication request time to the AP.
  • Step 403 After receiving the access authentication request of the MT, the AP randomly selects three ASUs (ASUi, ASU 3 , and ASU 5 ), and uses the MT certificate, the access authentication request time, and the AP certificate to utilize the AP's private key to the MT.
  • the certificate, the access authentication request time, and the AP certificate are signed to form a certificate authentication request, and are sent to ASU ⁇ ASU 3 and ASU 5 ;
  • Step 404 ASUi, ASU 3 , and ASU 5 use their own subkey to sign the AP public key information in the AP certificate and the MT public key information in the MT certificate to generate a sub-certificate, and ASU ⁇ ASU 3 and ASU 5 exchange sub-certificates with each other. After that, verify the validity of the sub-certificate according to the verification information;
  • Step 405 If the sub-certificate verification fails, the trusted center TC adds the fraudulent server to the bad behavior record table for auditing. If one ASU is spoofed, the AP needs to select another ASU (such as ASU 2 ). Sending a certificate authentication request message to the ASU 2 , until no ASU is selectable, the authentication fails, the process ends, or the number of sub-certificate verification passes is greater than or equal to 3 (threshold value) to step 406;
  • Example 1 ASU need for sub 3 and AP certificate and MT ASU. 5 generates sub ASU certificates for validation, if the sub-AP certificate or MT ASU 3 provides the sub-certificate is not verified, that the occurrence of fraud ASU 3, further Reported to TC.
  • Example 2 If the AS verifies that the AP sub-certificate generated by the ASU 3 is invalid, and the ASU 3 verifies that the AP sub-certificate generated by the ASU 5 is invalid, the TC records both the ASU 3 and the ASU 5 to be fraudulent.
  • Step 406 ASUi, ASU 3 , and ASU 5 merge the sub-certificate, and compare with the MT certificate and the AP certificate in the authentication request packet to obtain an authentication result, and then send an authentication request response message to the AP;
  • Step 407 After receiving the authentication response message sent by the ASU ⁇ ASU 3 and the ASU 5 , the AP determines whether to allow the MT to access the network according to the certificate verification result of the ASUi, the ASU 3 , and the ASU 5 ; if all the certificate verification requests are received If the packet authentication of the MT is passed, the MT is allowed to access the network, and the AP sends an access authentication response message to the MT. The MT determines whether to access the AP according to the verification result of the AP certificate by the ASU ⁇ ASU 3 and the ASU 5 . If all the access authentication request packets pass the certificate of the AP, the MT decides to access the AP;
  • Step 408 If the certificate authentication is passed, the AP and the MT perform key negotiation and communicate with the negotiated key.
  • the present invention also provides a WAPI-based authentication system.
  • the system includes an interconnected mobile terminal MT, an access point AP, N alternative authentication servers, and a trusted center.
  • TC trusted center
  • the AP includes a server selection module, configured to randomly select n1 authentication servers from the N candidate authentication servers as the participating authentication server and notify the selected authentication server, where Kt ⁇ nl ⁇ N, t is preset Threshold value;
  • the MT and the AP each include an interconnected server selection module, a sub-certificate validity verification module, and a sub-certificate merge module, wherein the server selection module is configured to randomly select n2 authentication servers from the N candidate authentication servers as certificate generation.
  • the server notifies the selected authentication server, wherein: l ⁇ t ⁇ n2 ⁇ N; the sub-certificate validity verification module is further configured to perform validity verification on the MT or AP sub-certificate sent by the certificate generation server; a merging module, where the AP or the MT combines all valid AP sub-certificates or MT sub-certificates to generate an AP certificate or an MT certificate when the number of valid AP sub-certificates or the MT sub-certificates is greater than or equal to the threshold;
  • the authentication server includes a sub-certificate generation module and a sub-certificate validity verification module that are connected to each other. a block, a sub-certificate merge module, a legality verification module, and a sub-key acquisition module, where the sub-certificate generation module is configured to use the sub-density when the authentication server is selected to participate in the authentication server or the certificate generation server.
  • the key signature s the public key information of the AP and the mobile terminal MT to generate an AP sub-certificate and an MT sub-certificate, and sends the generated sub-certificate to the sub-certificate validity verification module of the authentication server during the authentication process, in the certificate generation process. Sending the generated sub-certificate to the sub-certificate validity verification module of the AP or the MT;
  • the sub-certificate validity verification module is configured to interact with other AP sub-certificates and MT sub-certificates generated by the participating authentication servers, and verify the validity of each AP sub-certificate and the MT sub-certificate;
  • the sub-certificate merge module is configured to merge each valid AP sub-certificate into an AP certificate and each valid MT sub-initial when the number of valid AP sub-certificates and the effective number of the MT sub-certificates are greater than or equal to the threshold value.
  • the certificate is merged into an MT certificate;
  • the legality verification module is configured to verify the legality of the AP certificate and the MT certificate.
  • the sub-certificate validity verification module of the authentication server is further configured to: when verifying that an AP sub-certificate or the MT sub-certificate is invalid, generating a fraudulent behavior on the authentication server that generates the AP sub-certificate or the MT sub-certificate on the trusted center TC ;
  • the sub-certificate validity verification module of the authentication server or the AP or the MT determines that the number of valid sub-certificates is less than the threshold t, it is also used to notify the corresponding server selection module to select n3 certificate authentication servers.
  • the sub-certificate of the MT or AP generated by the sub-certificate generation module is
  • a sub-key obtaining module configured to register an identity with the trusted center, and receive the sub-key distributed by the TC and verify the validity of the sub-key
  • the trusted center TC includes an authentication and monitoring module and a sub-key distribution module that are connected to each other.
  • the authentication and monitoring module is configured to receive and record an authentication server that generates a fraudulent behavior.
  • a sub-key distribution module configured to register an identity of the authentication server, and generate a signature private key, and divide the signature private key into a corresponding sub-key according to an identity of each authentication server and distribute the identifier to an authentication server corresponding to the identity identifier.
  • the AP, the MT, or the authentication server uses the verification information to verify the validity of the sub-certificate of the AP or the MT, or the validity of the sub-key, and the verification information is generated by the TC calculation and sent to the AP, MT, or Authentication server.
  • the present invention further provides an authentication server, where the authentication server includes a sub-certificate generation module, a sub-certificate validity verification module, a sub-certificate merge module, and a legality verification module, wherein:
  • the sub-certificate generating module when the authentication server is selected to participate in the authentication server, is configured to generate an AP sub-certificate and the sub-certificate by using the sub-key to sign the public key information of the AP and the mobile terminal MT
  • the verification module is configured to interact with other AP sub-certificates and MT sub-certificates generated by the participating authentication server, and verify the validity of each AP sub-certificate and the MT sub-certificate;
  • the sub-certificate validity verification module of the authentication server determines that the number of valid sub-certificates is less than the threshold t, it is further used to notify the corresponding server selection module to select n3 certificate authentication servers.
  • the sub-certificate merge module is configured to combine each valid AP sub-certificate into an AP certificate and each valid MT when the number of valid AP sub-certificates and the effective number of the MT sub-certificates are greater than or equal to the threshold value t. Sub-certificates are merged into MT certificates;
  • the legality verification module is configured to verify the legality of the AP certificate and the MT certificate.
  • the present invention also provides an access point (AP), which is applied to an authentication system, the AP includes a server selection module, and the server selection module is configured to: randomly select nl authentication servers from N candidate authentication servers. As the certificate authentication server and notifying the selected authentication server, where t ⁇ nl ⁇ N, t is a preset threshold.
  • the AP further includes a sub-certificate validity verification module and a sub-certificate merge module that are interconnected with the server selection module:
  • the server selection module is configured to: randomly select n2 authentication servers from the N candidate authentication servers as the certificate generation server and notify the selected authentication server, where l ⁇ t ⁇ n2 ⁇ N;
  • the sub-certificate validity verification module is configured to: perform validity verification on the AP sub-certificate sent by the certificate generation server; and the AP sub-certificate is when the authentication server is selected to generate an authentication server, to the sub-certificate Sent by the certificate validity verification module;
  • the sub-certificate merge module is configured to: when all the valid sub-certificates of the AP sub-certificate are greater than or equal to the threshold, combine all valid AP sub-certificates to generate an AP certificate.
  • the AP sub-certificate is (X SIGO, where m is the public key information of the AP, CfRC
  • G is the base point of the elliptic curve, which is the authentication server
  • the sub-certificate validity verification module is further configured to: when verifying that an AP sub-certificate is invalid, report the fraudulent behavior of the authentication server that generates the AP sub-certificate to the trusted center; if the number of valid sub-certificates is less than the threshold value t
  • the notification server selects the module and selects n3 authentication servers as the certificate authentication server.
  • a mobile terminal includes a server selection module, a sub-certificate validity verification module, and a sub-certificate merge module:
  • the server selection module is configured to: randomly select n2 authentication servers from the N candidate authentication servers as the certificate generation server and notify the selected authentication server, where l ⁇ t ⁇ n2 ⁇ N;
  • the sub-certificate validity verification module is configured to: perform validity verification on the MT sub-certificate sent by the certificate generation server; and the MT sub-certificate is when the authentication server is selected to generate an authentication server, to the sub- Sent by the certificate validity verification module;
  • the sub-certificate merge module is configured to: when all the valid numbers of the MT sub-certificates are greater than or equal to the threshold, merge all valid MT sub-certificates to generate an MT certificate.
  • the MT sub-certificate is (X SIGO, where m is the public key information of the MT, C ⁇ G, SiH m) ⁇ — m] + R mod N, G is the base point of the elliptic curve, and is an authentication server.
  • the sub-certificate validity verification module is set to: verify the equation by the public key of the AS: SIGi G PiH m) ⁇ - ID] +Q is established, if not, the sub-certificate is considered invalid;
  • the sub-certificate validity verification module is further configured to: when verifying that a certain MT sub-certificate is invalid, report the fraudulent behavior of the authentication server that generates the MT sub-certificate to the trusted center; if the number of valid sub-certificates is less than the threshold value
  • the corresponding server selection module is notified to select n3 authentication servers as the certificate authentication server.
  • the authentication method, the authentication system and the authentication server of the present invention introduce the basic idea of threshold cryptography, and the signature private key is divided.
  • Each ASU only has a part of the signature private key, and the number of ASUs must be at least the threshold value to complete.
  • the generation of the MT certificate effectively prevents the abuse of the signed private key and ensures the security of the signed private key; any subkey that is less than the threshold will not receive any information about the signed private key.
  • the invention also provides a verification mechanism, which can effectively detect the fraudulent behavior of the ASU or the trusted center TC during the information exchange process.
  • the AP can select a threshold server, the authentication of the certificate is completed by multiple ASUs, and the multiple ASU authentication overcomes the shortcomings of the single ASU authentication. Improve the security and efficiency of the authentication mechanism.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明认证方法包括: 接入点(AP)从N个备选的认证服务器中随机选 择n1个认证服务器作为证书认证服务器并通知所选择的认证服务器;各证书认证服务器利用各自的子密钥对AP和移动终端(MT)的公钥信息签名生成AP子证书及MT子证书,与其他证书认证服务器交互生成的AP子证书及MT子证书,并验证各AP子证书及MT子证书的有效性;在AP子证书的有效个数及MT子证书的有效个数均大于或等于门限值t时,各证书认证服务器将有效的AP子证书合并为AP证书以及将有效的MT子证书合并为MT证书;所述证书认证服务器验证AP证书及MT证书的合法性。本发明认证方 法、认证系统及认证服务器可以提高证书认证的安全性。

Description

认证方法、 认证系统及认证服务器
技术领域
本发明涉及网络通信安全技术, 尤其是认证方法、 认证系统及认证服务 器。 背景技术
无线局域网鉴别与保密基础架构 ( WLAN Authentication and Privacy Infrastructure , WAPI )是一种应用于 WLAN的安全协议, 是由中国提出的具 有创新性技术的标准, 解决了目前无线局域网安全机制存在的漏洞和隐患。
WAPI 安全机制由两个部分组成: 无线局域网鉴别基础结构 (WLAN Authentication Infrastructure, WAI)和无线局 i或网保密基础架构( WLAN Privacy Infrastructure, WPI ) 。 WAI用于对用户身份的鉴别, 保证了合法用户访问合 法的网络; WPI用于对传输数据的加密, 保证了通信的保密性。 WAI利用公 钥密码体制,利用数字证书来完成 WLAN系统的移动终端( Mobile Terminal, MT )和接入点 ( Access Point, AP )之间的相互认证, WAI定义了一种名为 认证服务单元 (Authentication Service Unit, ASU)的实体, 用于管理参与信息 交换各方所需要的证书, 包括证书的产生、 颁发、 吊销和更新。 证书内容包 含证书颁发者 (ASU)的公钥和签名以及证书持有者的公钥和签名 (签名釆用的 是 WAPI特有的椭圓曲线数字签名算法), 是网络设备终端 MT的数字身份凭 证。
WAPI协议具体的实现包括以下几个过程:
(1)认证激活: 当 MT登陆到 AP时, AP向 MT发送认证激活, 以启动 认证过程;
(2)接入认证请求: MT向 AP发出认证请求, 将自己的证书和接入认证 请求时间发往 AP;
(3)证书认证请求: AP收到 MT接入认证请求后,向 ASU发出认证请求, 将 MT证书、接入认证请求时间和 AP的证书以及利用 AP私钥对它们的签名 构成证书认证请求 4艮文信息发送给 ASU;
(4)证书认证响应: ASU收到 AP的认证请求后, 验证 AP的签名以及 AP和 MT证书的合法性, 验证完毕后 ASU将 MT证书认证结果信息 (包括 MT证书、 认证结果、 接入认证请求时间和 ASU对它们的签名) 、 AP证书 认证结果信息(包括 AP证书、 认证结果、 接入认证请求时间和 ASU对它们 的签名)构成证书响应 ^艮文发回给 AP;
(5)接入认证响应: AP对 ASU返回的证书响应进行验证,得到 MT证书 认证结果, AP将 MT证书认证信息、 AP证书认证结果信息以及 AP对它们 的签名构成接入认证响应报文发送至 MT, MT验证 ASU的签名后, 得到 AP 证书的认证结果, MT根据认证结果决定是否接入该 AP;
(6) 密钥协商: 当 MT和 AP的证书都鉴别成功之后, 双方将会进行密钥 协商, 然后用协商的密钥进行通信。
在 WAPI中釆用了集中化的管理,由单一 ASU统一完成证书有效性验证, 同时还担任了权威中心的角色, 完成对 MT、 AP等实体证书的发放、 撤销和 管理等, 没有考虑到 ASU的权威欺诈、 私钥被泄露的安全性问题和 ASU可 能会成为系统的瓶颈问题。 现有基于可信第三方的方法中, 没有考虑到可信 第三方发生欺骗的行为,而且没有提供一种很好的对可信第三方和 ASU信息 验证机制。 现有技术存在以下安全隐患:
(1)证书的签名私钥由单个 ASU保管。 ASU权利过大使签名私钥遭到滥 用, 签名私钥一旦泄露、 丟失或者损害, 就会带来很大的损失。
(2)证书的签发由单个 ASU完成。 ASU向 MT发放伪造的证书, 产生了 ASU权威欺诈行为, 造成合法的 MT无法接入网络。
(3)证书的认证由单个 ASU完成。如果 ASU被攻击者控制或者变的不可 信, ASU使非法的 MT通过认证接入网络,而合法的 MT无法接入网络。 ASU 进行恶意的认证响应行为, 任何 MT都无法接入网络, 从而使网络陷入瘫痪。
(4)存在可信第三方的技术。 如果可信第三方或者 ASU发生了欺骗的行 为, 无法用有效的方法检测出来, 从而带来很大的损失。 发明内容
本发明要解决的技术问题是提供一种认证方法、认证系统及认证服务器, 以提高证书认证的安全性。
为解决以上技术问题, 本发明提供了一种认证方法, 该方法包括: 证书认证服务器选择步骤, 接入点(AP )从 N个备选的认证服务器中随 机选择 nl个认证服务器作为证书认证服务器并通知所选择的认证服务器,其 中 t^nl ^N, t为预先设定的门限值;
第一子证书生成步骤, 各证书认证服务器利用各自的子密钥对 AP和移 动终端 (MT ) 的公钥信息签名生成 AP子证书及 MT子证书;
第一子证书有效性验证步骤, 各证书认证服务器与其他证书认证服务器 交互生成的 AP子证书及 MT子证书,并验证各 AP子证书及 MT子证书的有 效性;
第一子证书合并步骤, 在 AP子证书的有效个数及 MT子证书的有效个 数均大于或等于门限值 t时, 各证书认证服务器将有效的 AP子证书合并为 AP证书以及将有效的 MT子证书合并为 MT证书;
证书合法性验证步骤, 所述证书认证服务器验证 AP证书及 MT证书的 合法性。
所述 AP和 MT的公钥信息包含在 AP证书和 MT证书中,
所述第一子证书生成步骤中之前, 该方法还包括 AP证书或 MT证书生 成的步骤, 所述 AP证书或 MT证书生成的步骤包括:
证书生成服务器选择步骤, AP或 MT从 N个备选的认证服务器中随机 选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器, 其 中, 其中 l<t^ n2<N,
第二子证书生成步骤,各证书生成服务器利用各自的子密钥对 AP或 MT 第二子证书有效性验证步骤, 所述 AP或 MT对收到的各子证书进行有 效性验证; 以及 第二子证书合并步骤, 在 AP子证书或 MT子证书的有效个数大于或等 AP证书或 MT证书。
所述第一子证书生成步骤或第二子证书生成步骤中, 生成的 MT子证书 或 AP子证书为 (m SIGO, 其中, m为 MT的公钥信息或 AP的公钥信息,
Figure imgf000006_0001
+¾) mod Ν, G为椭圓曲线的基点, 为认证服务器 AS 随机选择的随机整数, Κ^ (Ι,Ν), N为椭圓曲线点的个数, Η为单项函数, 为 8101的子密钥; 所述第一子证书有效性验证步骤或第二子证书有效性验证步骤中, 认证 服务器、 ΜΤ 或 ΑΡ 通过 AS 的公钥 验证等式: SIGi G PiH m) Π +Q是否成立, 如果不成立, 则认为所述 AP子证书或 MT子证 书无效;
所述第一子证书合并步骤或第二子证书合并步骤中,若 ASl^ , ASU2, ... , ASUt产生的 MT的子证书为: (m,Ci,SIGi), (m,C2,SIG2), . . . ,( m,Ct,SIGt), 则合 成后的证书为 (m,C,SIG), 其中:
+S2H(m)
Figure imgf000006_0002
所述第一子证书有效性验证步骤或第二子证书有效性验证步骤中, 若验证某 AP子证书或 MT子证书无效, 则向可信中心 (TC )上报生成 该 AP子证书或 MT子证书的证书认证服务器发生欺骗行为;
若有效子证书个数小于 t, 则再选择 n3个证书认证服务器执行以上的子 证书生成步骤及子证书有效性验证步骤,其中 n3为发生欺骗行为的证书认证 服务器的个数, 直到有效子证书个数 ^t, 再执行子证书合并步骤。
为解决以上技术问题, 本发明还提供一种认证系统, 该系统包括相互连 接的接入点 (AP )及 N个备选的认证服务器;
所述 AP包括服务器选择模块, 所述服务器选择模块设置为: 从 N个备 选的认证服务器中随机选择 nl 个认证服务器作为证书认证服务器并通知所 选择的认证服务器, 其中 t^nl ^N, t为预先设定的门限值;
所述认证服务器包括相互连接的子证书生成模块、 子证书有效性验证模 块、 子证书合并模块及合法性验证模块, 其中:
所述子证书生成模块设置为: 当所述认证服务器被选为证书认证服务器 时, 利用所述认证服务器子密钥对所述 AP及移动终端 MT的公钥信息签名 证模块;
所述子证书有效性验证模块设置为: 与所述认证服务器之外的其他参与 认证服务器交互生成的 AP子证书及 MT子证书, 并验证各 AP子证书及 MT 子证书的有效性; 所述子证书合并模块设置为: 在 AP子证书的有效个数及 MT子证书的 有效个数均大于或等于门限值时,将各有效 AP子证书合并为 AP证书以及将 各有效 MT子证书合并为 MT证书;
所述合法性验证模块设置为: 验证 AP证书及 MT证书的合法性。
所述系统还包括 MT,
所述 MT包括相互连接的服务器选择模块、 子证书有效性验证模块及子 证书合并模块,
所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器, 其中, 其中 Kt≤n2≤N;
所述 MT的所述子证书有效性验证模块设置为: 对所述证书生成服务器 发送的 MT子证书进行有效性险证;
所述 MT的所述子证书合并模块设置为: 在 MT子证书的有效个数大于 或等于门限值时, 合并所有有效的 MT子证书生成 MT证书;
所述 AP还包括与所述 AP的所述服务器选择模块相互连接的子证书有效 性验证模块和子证书合并模块:
所述 AP的服务器选择模块设置为: 从 N个备选的认证服务器中随机选 择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器, 其中 Kt≤n2≤N;
所述 AP 的子证书有效性验证模块设置为: 对所述证书生成服务器发送 的 AP子证书进行有效性验证;
所述 AP的子证书合并模块设置为:在 AP子证书的有效个数大于或等于 门限值时, 合并所有有效的 AP子证书生成 AP证书;
所述认证服务器的子证书生成模块还设置为: 当所述认证服务器被选为 生成认证服务器时, 将生成的 MT子证书发送给所述 MT的子证书有效性验 所述子证书生成模块生成的 MT子证书或 AP子证书为 (m SIGO,其中, m为 MT或 AP的公钥信息, +¾) mod N,
Figure imgf000008_0001
G为椭圓曲线的基点, 为认证服务器 AS 随机选择的随机整数, £ (1,Ν), Ν为椭圓曲线点的个数, Η为单项函数, 为 8101的子密钥;
所述 ΑΡ子证书有效性验证模块或 ΜΤ的子证书有效性验证模块是设置 为:通过 ASUi的公钥 验证等式: SIG1 G=P1H(m) ΓΤ —ID] 是否成立, 如果不成立, 则认为所述子证书无效;
所述 MT子证书合并模块或 AP的子证书合并模块是设置为: 若 ASl^ , ASU2 , ASUt产生的 MT 子证书或 AP 子证书分别为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 MT证书或 AP证书为 (m,C,SIG), 其中: C = d + C2 +...+ Ct , SIG SIGi + SIG2+... + SIGt ≡(SiH(m)
Π ~ ID] +S2H(m) FT —ID] + ...+StH(m) ΤΊ ~ ID] )+(Ri+R2
+ ...+Rt)mod N。 所述系统还包括与所述 AP、 MT及认证服务器连接的 TC,
所述认证服务器的子证书有效性验证模块、 或 AP 的子证书有效性验证 模块或 MT的子证书有效性验证模块还设置为: 在验证某 AP子证书或 MT 子证书无效时,向 TC上报生成该 AP子证书或 MT子证书的认证服务器发生 欺骗行为; 若判断有效子证书个数小于门限值 t, 通知对应服务器选择模块再 选择 n3个认证服务器作为证书认证服务器。
为解决上述技术问题, 本发明还提供一种认证服务器, 所述认证服务器 包括相互连接的子证书生成模块、 子证书有效性验证模块、 子证书合并模块 及合法性验证模块, 其中:
所述子证书生成模块设置为: 当所述认证服务器被选为证书认证服务器 时, 利用所述认证服务器的子密钥对接入点 (AP )及移动终端 (MT ) 的公 钥信息签名生成 AP子证书及 MT子证书, 并发送给所述子证书有效性验证 模块;
所述子证书有效性验证模块设置为: 与所述认证服务器之外的其他证书 认证服务器交互生成的 AP子证书及 MT子证书, 并验证各 AP子证书及 MT 子证书的有效性; 所述子证书合并模块设置为: 在 AP子证书的有效个数及 MT子证书的 有效个数均大于或等于门限值 t时, 用于将各有效 AP子证书合并为 AP证书 以及将各有效 MT子证书合并为 MT证书;
所述合法性验证模块设置为: 验证 AP证书及 MT证书的合法性。
所述子证书有效性验证模块还设置为: 若判断有效子证书个数小于门限 值 t,通知对应服务器选择模块再选择 n3个认证服务器作为证书认证服务器。 本发明还提供了一种接入点 (AP ) , 应用于认证系统,
所述 AP包括服务器选择模块, 所述服务器选择模块设置为: 从 N个备 选的认证服务器中随机选择 nl 个认证服务器作为证书认证服务器并通知所 选择的认证服务器, 其中 t^nl ^N, t为预先设定的门限值。 所述 AP还包括与所述服务器选择模块相互连接的子证书有效性验证模 块和子证书合并模块:
所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器,其中 l<t^n2 ≤N;
所述子证书有效性验证模块设置为: 对所述证书生成服务器发送的 AP 子证书进行有效性验证; 所述 AP子证书是当所述认证服务器被选为生成认 证服务器时, 向所述子证书有效性验证模块发送的;
所述子证书合并模块设置为: 在 AP子证书的有效个数大于或等于门限 值时, 合并所有有效的 AP子证书生成 AP证书。
所述 AP子证书为 (X SIGO, 其中, m为 AP的公钥信息, CfRC
SiH m) Π —m] +R mod N, G为椭圓曲线的基点, 为认证服务器 ASUi随机选择的随机整数, £ (1,Ν), Ν为椭圓曲线点的个数, Η为单项函 数, 为 SIGi的子密钥;
所述子证书有效性验证模块是设置为: 通过 AS 的公钥 验证等式: SIG1 G=P1H(m) ΤΊ —ID] +Q是否成立, 如果不成立, 则认为所述 AP子证 书无效;
所述子证书合并模块是设置为: 若 ASl^ , ASU2, ASUt产生的 AP 子证书为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 AP证书 为 (m,C,SIG), 其中: C = d + C2 +...+ Ct, SIG ≡ SIGi + SIG2+... + SIGt
≡ (SiH(m) Π— +S2H(m) + -+SW
Figure imgf000010_0001
Π— ¾ -) +(Ri+R2 + · · .+Rt)mod N0
j=lj 所述子证书有效性验证模块还设置为: 在验证某 AP子证书无效时, 向 可信中心上报生成该 AP子证书的认证服务器发生欺骗行为; 若判断有效子 证书个数小于门限值 t, 通知服务器选择模块再选择 n3个认证服务器作为证 书认证服务器。
一种移动终端(MT ) , 其包括相互连接的服务器选择模块、 子证书有效 性验证模块及子证书合并模块:
所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器,其中 l<t^n2 ≤N;
所述子证书有效性验证模块设置为: 对所述证书生成服务器发送的 MT 子证书进行有效性验证; 所述 MT子证书是当所述认证服务器被选为生成认 证服务器时, 向所述子证书有效性验证模块发送的;
所述子证书合并模块设置为: 在 MT子证书的有效个数大于或等于门限 值时, 合并所有有效的 MT子证书生成 MT证书。
所述 MT子证书为
Figure imgf000011_0001
SiH m) Π —m] +R mod N, G为椭圓曲线的基点, 为认证服务器 ASUi随机选择的随机整数, £ (1,Ν), Ν为椭圓曲线点的个数, Η为单项函 数, 为 SIGi的子密钥;
所述子证书有效性验证模块是设置为: 通过 AS 的公钥 验证等式: SIGi G PiH m) ΤΊ —ID] +Q是否成立, 如果不成立, 则认为所述子证书 无效;
所述子证书合并模块是设置为: 若 ASl^ , ASU2, ASUt产生的 MT 子证书为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 MT证书 为 (m,C,SIG), 其中: C = d + C2 +...+ Ct, SIG ≡ SIGi + SIG2+... + SIGt
≡ (SiH(m) Π— +S2H(m) + -+SW
Figure imgf000011_0002
Π— ¾ -) +(Ri+R2 + · · .+Rt)mod N0
j=lj 所述子证书有效性验证模块还设置为: 在验证某 MT子证书无效时, 向 可信中心上报生成该 MT子证书的认证服务器发生欺骗行为; 若判断有效子 证书个数小于门限值 t, 通知对应服务器选择模块再选择 n3个认证服务器作 为证书认证服务器。
本发明认证方法、 认证系统及认证服务器引入门限密码学的基本思想, 对签名私钥进行了分割,每个 ASU只拥有签名私钥的一部分, ASU的个数必 须至少达到门限值时才能完成 MT证书的产生, 有效的防止了签名私钥遭到 滥用的行为和保证了签名私钥的安全性; 任何少于门限值个数的子密钥都不 会得到有关签名私钥的任何信息,克服了现有签名私钥由单一 ASU保管存在 的安全性问题, 分散了 ASU的权利; 发明还提供了验证机制, 可以有效的检 测出在信息交换过程中 ASU或者可信中心 TC的欺骗行为, 克服了现有技术 的缺点, 提高了安全性; 在认证阶段, AP可以选择门限值个服务器, 证书的 鉴别由多个 ASU相互合作完成,多个 ASU鉴别克服了单个 ASU鉴别的缺点, 提高了认证机制的安全性和效率。 附图概述
图 1 是本发明基于 WAPI的认证方法的示意图;
图 2是本发明证书生成过程的示意图;
图 3是本发明应用实例 MT证书生成的示意图;
图 4 是本发明应用实例证书认证过程的示意图;
图 5是本发明应用系统结构示意图。
本发明的较佳实施方式
如图 1所示, 本发明认证方法包括:
步骤 101 : 认证服务器选择步骤, 接入点 AP从 N个备选的认证服务器 中随机选择 nl 个认证服务器作为证书认证服务器并通知所选择的认证服务 器, 其中 Kt^ nl ^N, t为预先设定的门限值;
门限值根据安全级别需要、 使用方便性等设定。
步骤 102: 子证书生成步骤, 各证书认证服务器利用各自的子密钥对 AP 和移动终端 MT的公钥信息签名生成 AP子证书及 MT子证书;
步骤 103: 子证书有效性验证步骤, 各证书认证服务器与其他证书认证 服务器交互生成的 AP子证书及 MT子证书,并验证各 AP子证书及 MT子证 书的有效性; 证书的鉴别由多个认证服务器相互合作完成, 多个认证服务器鉴别克服 了单个认证服务器鉴别的缺点。
步骤 104: 子证书合并步骤, 在 AP子证书的有效个数及 MT子证书的有 效个数均大于或等于门限值 t时,各证书认证服务器将有效的 AP子证书合并 为 AP证书以及将有效的 MT子证书合并为 MT证书;
步骤 105: 证书合法性验证, 认证服务器验证 AP证书及 MT证书的合法 性。
所述子证书生成步骤中, 所述 AP和 MT的公钥信息包含在 AP证书和 MT证书中的, AP证书或 MT证书生成的过程包括:
步骤 201 : 生成服务器选择步骤, AP或 MT从 N个备选的认证服务器中 随机选择 n2个认证服务器作为证书生成服务器并通知所选择的认证服务器, 其中 l<t^n2 ^N, n2可以与 nl不同;
步骤 202: 子证书生成步骤, 各证书生成服务器利用各自的子密钥对 AP
MT;
步骤 203: 子证书有效性验证步骤, 所述 AP或 MT对收到的各子证书进 行有效性验证;
步骤 204: 子证书合并步骤, 在 AP子证书或 MT子证书的有效个数大于 生成 AP证书或 MT证书。
在步骤 103和步骤 203的子证书有效性验证步骤中, 若验证某 AP子证 书或 MT子证书无效,则向可信中心 TC上^艮生成该 AP子证书或 MT子证书 的证书认证服务器发生欺骗行为, 若有效子证书个数小于门限值 t, 则再选择 n3个证书认证服务器执行以上的子证书生成步骤及子证书有效性验证步骤, 其中 n3为发生欺骗行为的证书认证服务器的个数, 直到有效子证书个数 ^t, 再执行子证书合并步骤, 且执行证书合法性验证步骤的证书认证服务器是没 有发生欺骗行为的证书认证服务器。
优选的, nl<N, 这样当验证发现认证服务器发生欺骗时, 保证还有选 择其他认证服务器的空间, 以尽快地完成认证过程。 以下结合公式对生成、 验证及合并子证书的过程进行详细说明:
A生成子证书
设 m为 MT或 AP公钥信息, G为椭圓曲线的基点, N为椭圓曲线点的 个数, H为单项函数,八8111为认证服务器,:!^为 AS 的公开身份标识, AS 随机选择一个随机整数 R (l,N), 保密, 计算
Figure imgf000014_0001
为 与 G点乘 的结果)和 H(m), 计算签名信息 SIG^dH m) f] + ) mod N, 则
(mA^IGO为 AS 利用自己子密钥 产生的 MT子证书。
B验证子证书
MT、 AP或 ASUj通过 AS 的公钥 验证等式:
SIG1 G=P1H(m) \ —ID] +Q是否成立, 如果不成立, 存在欺骗行为, 否则, 不存在欺骗行为。
C合并子证书 设 ASU ASU2 , ASUt产生的 MT 的子证书为: (n^C^SIGO,
(m,C2,SIG2), ...,( m,Ct,SIGt),
计算 C = d + C2 +...+ Ct , SIG ≡ SIGi + SIG2+... + SIGt ≡ (SiH(m)n— +Rl)+(S2H(m) Π +
Rt) ≡ (SlH(m) Π— +S2H(m)
Figure imgf000014_0002
Π— ¾ -) +(Ri+R2 + · · .+Rt)mod N
SIG≡ SH(m)≡ S!HCm) Π— ¾- +S2H(m) Π — + ...+StH(m) + ... +Rt)modN是有拉格朗日插值定理得到的 (S为群签名
Figure imgf000015_0001
私钥);
则合成后的证书为 (m,C, SIG)。
所述认证服务器的这样获取子密钥的:
N个认证服务器向可信中心 TC注册身份标识;
所述 TC产生签名私钥, 并根据 N个认证服务器的身份标识将所述签名 私钥利用拉格朗日插值定理分割为 N个子密钥分发给身份标识对应的认证服 务器;
N个认证服务器接收所述 TC分发的子密钥, 并验证所述子密钥的有效 性, 若验证不通过, 则对所述 TC进行审计或重新选择 TC。
所述 AP、 MT或认证服务器釆用验证信息验证 AP或 MT的子证书的有 效性、 或子密钥的有效性, 所述验证信息由所述 TC计算生成并发送给所述 AP、 MT或认证服务器。 本发明釆用公开的验证信息, 可以有效的检测出可 信第三方和 ASU的欺骗行为, 提高了安全性。
具体地可釆用椭圓曲线密码体制,基点为 G, 点的个数为 N,:!^为 !^ 的公开身份标识, 可信中心 TC在(1 , N )上随机选择 S作为签名私钥, 然 后随机选择一个 t-1次多项式: f(x) = S + alx + a2x2 + ... + at_x M mod N;
根据 AS 的公开身份 I 计算 ASU 々子密钥 Sff ( IDJ , 计算验证信 息 SG, G(i=l,...,t-l);
ASUi通过等式: Sfi = SG + a <3{IDt ) + a2G(ID + ... + at_ <3{IDt广1验证子密钥 的有效性, 另外, AS 的公钥为 PfSiGn
下面结合附图对本发明基于 WAPI的证书产生和认证方法进行说明, 以 N为 5, 门限值 t为 3为例进行说明, 其中 AS 表示第 i个 ASU:
1、 子密钥分发 步骤 A: ASUi , ASU2、 ASU3、 ASU4、 ASU5首先向可信中心 TC注册自 己的身份标识;
步骤 B: 可信中心 TC产生签名私钥, 计算签名私钥对应的公钥, 然后根 据 ASU^ ASU2、 ASU3、 ASU4、 ASU5的公开的身份标识利用拉格朗日插值 定理将签名私钥分割为 5个子密钥, 计算验证信息, 将子密钥报文信息发送 给身份标识相应的 ASU;
步骤 C : ASUi , ASU2、 ASU3、 ASU4、 ASU5收到子密钥报文信息后, 通过验证信息验证子密钥的正确性;
各 ASU通过主动访问 TC获取验证信息或由 TC在发送子密钥 信息 时携带验证信息给各 ASU,各 ASU只需要获取一次验证信息, 即可完成多次 有效性验证。
步骤 D: 如果子密钥验证不通过, 则发送报文信息通知其他 ASU, 协议 立即终止,对可信中心 TC进行审计或者重新选择可信中心 TC, 转到步骤 1。
2、 证书的产生
2.1 MT证书产生
如图 3所示, MT证书产生的流程包括以下步骤:
步骤 301 : MT随机选择 3个 ASl^ASU^ ASU3、 ASU5)注册自己的公 钥信息;
步骤 302: ASUi , ASU3、 ASU5利用自己的子密钥产生 MT子证书, 并 将子证书报文信息发送给 MT , MT通过可信中心 TC上的验证信息验证子证 书的有效性, MT所有的子证书验证通过, MT根据利用拉格朗日插值定理将 子证书进行合并得到自己的证书;
步骤 303 : ASUi , ASU3、 ASU5将子证书报文信息发送给可信中心 TC, MT通过可信中心 TC上的验证信息验证子证书的有效性, 可信中心 TC根据 验证信息对 ASU^ ASU3、 ASU5发来的子证书进行验证, 如果所有的子证书 验证通过, 根据利用拉格朗日插值定理合并子证书得到 MT证书, 然后将该 MT证书放人证书库;
步骤 304 : 存在子证书验证不通过, MT发送拒绝接受报文给可信中心 TC, 可信中心 TC将发生欺骗行为的 ASU加入不良记录表进行审计, 同时通 知相应的 ASU。
可信中心 TC可以对保存的 MT证书进行管理, 包括在 MT丟失或损毁 MT证书时,直接将保存的 MT证书发送给 MT ,以及对 MT证书进行吊销等。
以上是以 MT证书产生为例进行说明的, AP证书的产生流程与此相同。
3、 认证过程
如图 4所示, 认证过程包括以下流程:
步骤 401 : MT登陆到 AP, AP向 MT发送认证激活, 以启动认证过程; 步骤 402: MT向 AP发出认证请求, 将 MT证书和 MT接入认证请求时 间发往 AP;
步骤 403: AP收到 MT的接入认证请求后, 随机选择 3个 ASU ( ASUi、 ASU3、 ASU5 ) , 并将 MT证书、 接入认证请求时间、 AP证书并利用 AP的 私钥对 MT证书、接入认证请求时间、 AP证书进行签名构成证书认证请求才艮 文, 发送给 ASU^ ASU3、 ASU5;
步骤 404: ASUi、 ASU3、 ASU5用自己的子密钥对 AP证书中的 AP公钥 信息以及 MT证书中的 MT公钥信息签名生成子证书, ASU^ ASU3、 ASU5 相互交换子证书后, 根据验证信息验证子证书的有效性;
步骤 405: 如果存在子证书验证不通过, 可信中心 TC将发生欺骗行为的 服务器加入不良行为记录表进行审计, 如果有 1个 ASU发生欺骗, 则 AP需 要再选择一个 ASU (如 ASU2 )并向 ASU2发送证书认证请求报文, 直到没有 ASU可选择, 认证失败, 流程结束, 或者子证书验证通过的个数大于或者等 于 3 (门限值)转步骤 406;
例 1 : ASU需要对 ASU3及 ASU5生成的 AP子证书及 MT子证书进行有 效性验证,若 ASU3提供的 AP子证书或 MT子证书未通过验证,则认为 ASU3 发生欺骗行为, 进而上报 TC。 例 2: 如果 AS 验证 ASU3生成的 AP子证书无效, ASU3验证 ASU5生 成的 AP子证书无效, 则 TC记录 ASU3和 ASU5都发生欺骗行为
步骤 406: ASUi , ASU3、 ASU5合并子证书, 并与认证请求报文中的 MT 证书和 AP证书比较得出验证结果后, 向 AP发送认证请求响应报文;
步骤 407: AP收到 ASU^ ASU3、 ASU5发来的认证响应报文后, 根据 ASUi , ASU3、 ASU5对 MT的证书验证结果决定是否允许 MT接入网络; 如 果所有的证书验证请求报文对 MT的证书验证都通过,则允许 MT接入网络 , AP向 MT发送接入认证响应报文, MT根据 ASU^ ASU3、 ASU5对 AP证书 的验证结果决定是否接入该 AP, 如果所有的接入认证请求报文对 AP的证书 马全证通过, 则 MT决定接入该 AP;
步骤 408 如果证书认证通过, 则 AP和 MT之间进行密钥协商, 用协商 的密钥进行通信。
为实现以上方法, 本发明还提供了一种基于 WAPI的认证系统, 如图 5 所示, 该系统包括相互连接的移动终端 MT、 接入点 AP、 N个备选的认证服 务器及可信中心 TC;
所述 AP, 包括服务器选择模块, 用于从 N个备选的认证服务器中随机 选择 nl个认证服务器作为参与认证服务器并通知所选择的认证服务器,其中 Kt≤nl≤N, t为预先设定的门限值;
MT和 AP均包括相互连接的服务器选择模块、子证书有效性验证模块及 子证书合并模块, 其中所述服务器选择模块用于从 N个备选的认证服务器中 随机选择 n2个认证服务器作为证书生成服务器并通知所选择的认证服务器, 其中, l<t^n2 ^N; 所述子证书有效性验证模块还用于对证书生成服务器发 送的 MT或 AP子证书进行有效性验证; 所述子证书合并模块, 用于在 AP子 证书或 MT子证书的有效个数大于或等于门限值时, 所述 AP或 MT合并所 有有效的 AP子证书或 MT子证书生成 AP证书或 MT证书;
所述认证服务器包括相互连接的子证书生成模块、 子证书有效性验证模 块、 子证书合并模块及合法性验证模块及子密钥获取模块, 其中, 所述子证书生成模块, 当所述认证服务器被选为参与认证服务器或证书 生成服务器时, 用于利用其子密钥对所述 AP及移动终端 MT的公钥信息签 名生成 AP子证书及 MT子证书, 并在认证过程中将生成的子证书发送给认 证服务器的子证书有效性验证模块, 在证书生成过程中将生成的子证书发送 给 AP或 MT的子证书有效性验证模块;
所述子证书有效性验证模块,用于与其他参与认证服务器交互生成的 AP 子证书及 MT子证书, 并验证各 AP子证书及 MT子证书的有效性;
所述子证书合并模块, 在 AP子证书的有效个数及 MT子证书的有效个 数均大于或等于门限值时,用于将各有效 AP子证书合并为 AP证书以及将各 有效 MT子证书合并为 MT证书;
所述合法性验证模块, 用于验证 AP证书及 MT证书的合法性。
所述认证服务器的子证书有效性验证模块还用于在验证某 AP子证书或 MT子证书无效时, 向可信中心 TC上^艮生成该 AP子证书或 MT子证书的认 证服务器发生欺骗行为;
若认证服务器或 AP或 MT的子证书有效性验证模块判断有效子证书个 数小于门限值 t, 还用于通知对应的服务器选择模块再选择 n3个证书认证服 务器。
如上所述,所述子证书生成模块生成的 MT或 AP的子证书为
Figure imgf000019_0001
Figure imgf000019_0002
RlG (l,N), N为椭圓曲线点的个数, H为单项函数, Si为 SIGi的子密钥; 所述子证书有效性验证模块通过 AS 的公钥 验证等式: SIG1 G=P1H(m)
Π ~IDj +Q是否成立, 如果不成立, 则认为所述子证书无效;
1 ID1 -IDJ 若 AS , ASU2 , ... , ASUt产生的 MT或 AP的子证书分别为: (m,Ci,SIGi),
(m,C2,SIG2) , ...,( m,Ct,SIGt) , 则所述子证书合并模块合并所得的证书为 (m,C,SIG),其中: C : ^— ^— ...— ^, SIG ≡ SIGi + SIG2+... + SIGt≡(SiH(m)
Figure imgf000020_0001
+ ...+Rt)mod N。
子密钥获取模块, 用于向可信中心注册身份标识, 以及接收所述 TC分 发的子密钥并验证所述子密钥的有效性;
可信中心 TC包括相互连接的认证监督模块及子密钥分发模块, 其中, 所述认证监督模块, 用于接收并记录发生欺骗行为的认证服务器。
子密钥分发模块, 用于注册认证服务器的身份标识, 以及产生签名私钥 并根据各认证服务器的身份标识将所述签名私钥分割为对应的子密钥分发给 身份标识对应的认证服务器。
所述 AP、 MT或认证服务器釆用验证信息验证 AP或 MT的子证书的有 效性、 或子密钥的有效性, 所述验证信息由所述 TC计算生成并发送给所述 AP、 MT或认证服务器。
另外本发明还提供了一种认证服务器, 所述认证服务器包括相互连接的 子证书生成模块、 子证书有效性验证模块、 子证书合并模块及合法性验证模 块, 其中:
所述子证书生成模块, 当所述认证服务器被选为参与认证服务器时, 用 于利用其子密钥对所述 AP及移动终端 MT的公钥信息签名生成 AP子证书及 所述子证书有效性验证模块,用于与其他参与认证服务器交互生成的 AP 子证书及 MT子证书, 并验证各 AP子证书及 MT子证书的有效性;
若所述认证服务器的子证书有效性验证模块判断有效子证书个数小于门 限值 t, 还用于通知对应服务器选择模块再选择 n3个证书认证服务器。
所述子证书合并模块, 在 AP子证书的有效个数及 MT子证书的有效个 数均大于或等于门限值 t时, 用于将各有效 AP子证书合并为 AP证书以及将 各有效 MT子证书合并为 MT证书;
所述合法性验证模块, 用于验证 AP证书及 MT证书的合法性。 本发明还提供了一种接入点 (AP ) , 应用于认证系统, 所述 AP包括服 务器选择模块, 所述服务器选择模块设置为: 从 N个备选的认证服务器中随 机选择 nl个认证服务器作为证书认证服务器并通知所选择的认证服务器,其 中 t^nl ^N, t为预先设定的门限值。 所述 AP还包括与所述服务器选择模块相互连接的子证书有效性验证模 块和子证书合并模块:
所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器,其中 l<t^n2 ≤N;
所述子证书有效性验证模块设置为: 对所述证书生成服务器发送的 AP 子证书进行有效性验证; 所述 AP子证书是当所述认证服务器被选为生成认 证服务器时, 向所述子证书有效性验证模块发送的;
所述子证书合并模块设置为: 在 AP子证书的有效个数大于或等于门限 值时, 合并所有有效的 AP子证书生成 AP证书。
所述 AP子证书为 (X SIGO, 其中, m为 AP的公钥信息, CfRC
SiH m) Π —m] +R mod N, G为椭圓曲线的基点, 为认证服务器
AS 随机选择的随机整数, £ (1,Ν), Ν为椭圓曲线点的个数, Η为单项函 数, 为 SIGi的子密钥;
所述子证书有效性验证模块是设置为: 通过 AS 的公钥 验证等式: SIG1 G=P1H(m) ΤΊ —ID] +Q是否成立, 如果不成立, 则认为所述 AP子证 书无效;
所述子证书合并模块是设置为: 若 ASl^ , ASU2, ASUt产生的 AP 子证书为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 AP证书 为 (m,C,SIG), 其中: C = d + C2 +...+ Ct, SIG ≡ SIGi + SIG2+... + SIGt (SlH(m) Π— +S2H(m) + -+SW
Figure imgf000021_0001
Π— ¾ -) +(Ri+R2 + · · .+Rt)mod N0 所述子证书有效性验证模块还设置为: 在验证某 AP子证书无效时, 向 可信中心上报生成该 AP子证书的认证服务器发生欺骗行为; 若判断有效子 证书个数小于门限值 t, 通知服务器选择模块再选择 n3个认证服务器作为证 书认证服务器。
一种移动终端(MT ) , 其包括相互连接的服务器选择模块、 子证书有效 性验证模块及子证书合并模块:
所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器,其中 l<t^n2 ≤N;
所述子证书有效性验证模块设置为: 对所述证书生成服务器发送的 MT 子证书进行有效性验证; 所述 MT子证书是当所述认证服务器被选为生成认 证服务器时, 向所述子证书有效性验证模块发送的;
所述子证书合并模块设置为: 在 MT子证书的有效个数大于或等于门限 值时, 合并所有有效的 MT子证书生成 MT证书。
所述 MT子证书为 (X SIGO,其中, m为 MT的公钥信息, C^G, SiH m) Π —m] +R mod N, G为椭圓曲线的基点, 为认证服务器
AS 随机选择的随机整数, £ (1,Ν), Ν为椭圓曲线点的个数, Η为单项函 数, 为 SIGi的子密钥;
所述子证书有效性验证模块是设置为: 通过 AS 的公钥 验证等式: SIGi G PiH m) ΤΊ —ID] +Q是否成立, 如果不成立, 则认为所述子证书 无效;
所述子证书合并模块是设置为: 若 ASl^ , ASU2, ASUt产生的 MT 子证书为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 MT证书 为 (m,C,SIG), 其中: C = d + C2 +...+ Ct, SIG ≡ SIGi + SIG2+... + SIGt (SlH(m) Π— +S2H(m) + -+SW
Figure imgf000022_0001
Π— ¾ -) +(Ri+R2 + · · .+Rt)mod N0 所述子证书有效性验证模块还设置为: 在验证某 MT子证书无效时, 向 可信中心上报生成该 MT子证书的认证服务器发生欺骗行为; 若判断有效子 证书个数小于门限值 t, 通知对应服务器选择模块再选择 n3个认证服务器作 为证书认证服务器。
以上所述仅为本发明的较佳实施例而已, 并不用于限制本发明, 凡在本 发明的精神和原则之内所作的任何修改、 等同替换和改进等, 均应包含在本 发明的保护范围内。
工业实用性
本发明认证方法、 认证系统及认证服务器引入门限密码学的基本思想, 对签名私钥进行了分割,每个 ASU只拥有签名私钥的一部分, ASU的个数必 须至少达到门限值时才能完成 MT证书的产生, 有效的防止了签名私钥遭到 滥用的行为和保证了签名私钥的安全性; 任何少于门限值个数的子密钥都不 会得到有关签名私钥的任何信息,克服了现有签名私钥由单一 ASU保管存在 的安全性问题, 分散了 ASU的权利; 发明还提供了验证机制, 可以有效的检 测出在信息交换过程中 ASU或者可信中心 TC的欺骗行为, 克服了现有技术 的缺点, 提高了安全性; 在认证阶段, AP可以选择门限值个服务器, 证书的 鉴别由多个 ASU相互合作完成,多个 ASU鉴别克服了单个 ASU鉴别的缺点, 提高了认证机制的安全性和效率。

Claims

权 利 要 求 书
1、 一种认证方法, 其包括:
证书认证服务器选择步骤, 接入点(AP )从 N个备选的认证服务器中随 机选择 nl个认证服务器作为证书认证服务器并通知所选择的认证服务器,其 中 t^nl ^N, t为预先设定的门限值;
第一子证书生成步骤, 各证书认证服务器利用各自的子密钥对 AP和移 动终端 (MT ) 的公钥信息签名生成 AP子证书及 MT子证书;
第一子证书有效性验证步骤, 各证书认证服务器与其他证书认证服务器 交互生成的 AP子证书及 MT子证书,并验证各 AP子证书及 MT子证书的有 效性;
第一子证书合并步骤, 在 AP子证书的有效个数及 MT子证书的有效个 数均大于或等于门限值 t时, 各证书认证服务器将有效的 AP子证书合并为 AP证书, 以及将有效的 MT子证书合并为 MT证书;
证书合法性验证步骤, 所述证书认证服务器验证 AP证书及 MT证书的 合法性。
2、 如权利要求 1所述的方法, 其中, 所述 AP和 MT的公钥信息包含在 AP证书和 MT证书中,
所述第一子证书生成步骤之前, 该方法还包括 AP证书或 MT证书生成 的步骤, 所述 AP证书或 MT证书生成的步骤包括:
证书生成服务器选择步骤, AP或 MT从 N个备选的认证服务器中随机 选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器, 其 中, 其中 l<t^ n2<N,
第二子证书生成步骤,各证书生成服务器利用各自的子密钥对 AP或 MT 第二子证书有效性验证步骤, 所述 AP或 MT对收到的各子证书进行有 效性验证; 以及
第二子证书合并步骤, 在 AP子证书或 MT子证书的有效个数大于或等 于门限值 t时,
AP证书或 MT证书。
3、 如权利要求 1或 2所述的方法, 其中,
所述第一子证书生成步骤或第二子证书生成步骤中, 生成的 MT子证书 AP的子证书为 (m SIGO, 其中, m为 MT的公钥信息或 AP的公钥信息,
Figure imgf000025_0001
+¾) mod Ν, G为椭圓曲线的基点, 为认证服务器 AS 随机选择的随机整数, Κ^ (Ι,Ν), N为椭圓曲线点的个数, Η为单项函数, 为 8101的子密钥;
所述第一子证书有效性验证步骤或第二子证书有效性验证步骤中, 认证 服务器、 ΜΤ 或 ΑΡ 通过 AS 的公钥 验证等式: SIGi G PiH m)
Π +Q是否成立, 如果不成立, 则认为所述 AP子证书或 MT子证 书无效;
所述第一子证书合并步骤或第二子证书合并步骤中,若 ASl^ , ASU2, ... , ASUt产生的 MT的子证书为: (m,Ci,SIGi), (m,C2,SIG2), . . . ,( m,Ct,SIGt), 则合 成后的证书为 (m,C,SIG), 其中:
+S2H(m)
Figure imgf000025_0002
4、 如权利要求 1或 2所述的方法, 其中, 所述第一子证书有效性验证步 骤或第二子证书有效性验证步骤中, 若验证某 AP子证书或 MT子证书无效, 则向可信中心 (TC )上报生成 该 AP子证书或 MT子证书的证书认证服务器发生欺骗行为; 若有效子证书个数小于 t, 则再选择 n3个证书认证服务器执行以上的子 证书生成步骤及子证书有效性验证步骤,其中 n3为发生欺骗行为的证书认证 服务器的个数, 直到有效子证书个数 ^t, 再执行子证书合并步骤。
5、 一种认证系统, 其包括相互连接的接入点 (AP )及 N个备选的认证 服务器;
所述 AP包括服务器选择模块, 所述服务器选择模块设置为: 从 N个备 选的认证服务器中随机选择 nl 个认证服务器作为证书认证服务器并通知所 选择的认证服务器, 其中 t^nl ^N, t为预先设定的门限值;
所述认证服务器包括相互连接的子证书生成模块、 子证书有效性验证模 块、 子证书合并模块及合法性验证模块, 其中:
所述子证书生成模块设置为: 当所述认证服务器被选为证书认证服务器 时, 利用所述认证服务器的子密钥对所述 AP及移动终端 (MT ) 的公钥信息 签名生成 AP子证书及 MT子证书并将生成的子证书发送给所述子证书有效 性验证模块;
所述子证书有效性验证模块设置为: 与所述认证服务器之外的其他参与 认证服务器交互生成的 AP子证书及 MT子证书, 并验证各 AP子证书及 MT 子证书的有效性;
所述子证书合并模块设置为: 在 AP子证书的有效个数及 MT子证书的 有效个数均大于或等于门限值时,将各有效 AP子证书合并为 AP证书以及将 各有效 MT子证书合并为 MT证书;
所述合法性验证模块设置为: 验证 AP证书及 MT证书的合法性。
6、 如权利要求 5所述的系统, 其还包括 MT,
所述 MT包括相互连接的服务器选择模块、 子证书有效性验证模块及子 证书合并模块: 所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器,其中 l<t^n2 ≤N;
所述 MT的所述子证书有效性验证模块设置为: 对所述证书生成服务器 发送的 MT子证书进行有效性 3全证; 所述 MT的所述子证书合并模块设置为: 在 MT子证书的有效个数大于 或等于门限值时, 合并所有有效的 MT子证书生成 MT证书;
所述 AP还包括与所述 AP的所述服务器选择模块相互连接的子证书有效 性验证模块和子证书合并模块:
所述 AP的服务器选择模块设置为: 从 N个备选的认证服务器中随机选 择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器, 其中 Kt≤n2≤N;
所述 AP 的子证书有效性验证模块设置为: 对所述证书生成服务器发送 的 AP子证书进行有效性验证;
所述 AP的子证书合并模块设置为:在 AP子证书的有效个数大于或等于 门限值时, 合并所有有效的 AP子证书生成 AP证书;
所述认证服务器的子证书生成模块还设置为: 当所述认证服务器被选为 生成认证服务器时, 将生成的 MT子证书发送给所述 MT的子证书有效性验
7、 如权利要求 5或 6所述的系统, 其中,
所述子证书生成模块生成的 MT子证书或 AP子证书为 (m SIGO,其中, m为 MT或 AP的公钥信息, +¾) mod N,
Figure imgf000027_0001
G为椭圓曲线的基点, 为认证服务器 AS 随机选择的随机整数, £ (1,Ν), Ν为椭圓曲线点的个数, Η为单项函数, 为 8101的子密钥;
所述 ΑΡ子证书有效性验证模块或 ΜΤ的子证书有效性验证模块是设置 为:通过 ASUi的公钥 验证等式: SIG1 G=P1H(m) ΓΤ —ID] 是否成立, 如果不成立, 则认为所述子证书无效;
所述 MT子证书合并模块或 AP的子证书合并模块是设置为: 若 ASl^ , ASU2 , ASUt产生的 MT 子证书或 AP 子证书分别为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 MT证书或 AP证书为 (m,C,SIG), 其中: C = d + C2 +...+ Ct , SIG SIGi + SIG2+... + SIGt ≡(SiH(m) Π _ 1 +S2H(m) FT 1 + ...+StH(m) ΓΤ 1 )+(Ri+R2
+ ...+Rt)mod N。
8、 如权利要求 5或 6所述的系统, 其还包括与所述 AP、 MT及认证服 务器连接的 TC, 所述认证服务器的子证书有效性验证模块、 或 AP 的子证书有效性验证 模块或 MT的子证书有效性验证模块还设置为: 在验证某 AP子证书或 MT 子证书无效时,向 TC上报生成该 AP子证书或 MT子证书的认证服务器发生 欺骗行为; 若判断有效子证书个数小于门限值 t, 通知对应服务器选择模块再 选择 n3个认证服务器作为证书认证服务器。
9、 一种认证服务器, 其包括相互连接的子证书生成模块、 子证书有效性 验证模块、 子证书合并模块及合法性验证模块, 其中:
所述子证书生成模块设置为: 当所述认证服务器被选为证书认证服务器 时, 利用所述认证服务器的子密钥对接入点 (AP )及移动终端 (MT ) 的公 钥信息签名生成 AP子证书及 MT子证书, 并发送给所述子证书有效性验证 模块;
所述子证书有效性验证模块设置为: 与所述认证服务器之外的其他证书 认证服务器交互生成的 AP子证书及 MT子证书, 并验证各 AP子证书及 MT 子证书的有效性;
所述子证书合并模块设置为: 在 AP子证书的有效个数及 MT子证书的 有效个数均大于或等于门限值 t时, 将各有效 AP子证书合并为 AP证书, 以 及将各有效 MT子证书合并为 MT证书;
所述合法性验证模块设置为: 验证 AP证书及 MT证书的合法性。
10、 如权利要求 9所述的认证服务器, 其中,
所述子证书有效性验证模块还设置为: 若判断有效子证书个数小于门限 值 t,通知对应服务器选择模块再选择 n3个认证服务器作为证书认证服务器。
11、 一种接入点 (AP ) , 应用于认证系统, 其特征在于, 所述 AP包括服务器选择模块, 所述服务器选择模块设置为: 从 N个备 选的认证服务器中随机选择 nl 个认证服务器作为证书认证服务器并通知所 选择的认证服务器, 其中 t^nl ^N, t为预先设定的门限值。
12、 如权利要求 11所述的 AP, 其中, 所述 AP还包括与所述服务器选 择模块相互连接的子证书有效性验证模块和子证书合并模块:
所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器,其中 l<t^n2 ≤N;
所述子证书有效性验证模块设置为: 对所述证书生成服务器发送的 AP 子证书进行有效性验证; 所述 AP子证书是当所述认证服务器被选为生成认 证服务器时, 向所述子证书有效性验证模块发送的;
所述子证书合并模块设置为: 在 AP子证书的有效个数大于或等于门限 值时, 合并所有有效的 AP子证书生成 AP证书。
13、 如权利要求 12所述的 AP, 其中, 所述 AP子证书为 (m SIGO, 其 中, m为 AP的公钥信息, CfRiG, SIQ =(8^(111) \ —ID] +¾) mod N,
IDt— ID
G为椭圓曲线的基点, 为认证服务器 ASUjl机选择的随机整数, Rie (l,N), N为椭圓曲线点的个数, H为单项函数, 为 8101的子密钥;
所述子证书有效性验证模块是设置为: 通过 AS 的公钥 验证等式:
SIG1 G=P1H(m) Π +Q是否成立, 如果不成立, 则认为所述 AP子证
IDt— ID
书无效;
所述子证书合并模块是设置为: 若 ASl^ , ASU2, ASUt产生的 AP 子证书为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 AP证书 为 (m,C,SIG), 其中: C = d + C2 +...+ Ct, SIG ≡ SIGi + SIG2+... + SIGt
(SiH(m) Π — .+StH(m)
Figure imgf000029_0001
Π )+(Ri+R2 + ...+Rt)mod N„
IDt— ID
14、 如权利要求 12所述的 AP, 其中, 所述子证书有效性验证模块还设 置为: 在验证某 AP子证书无效时, 向可信中心上报生成该 AP子证书的认证 服务器发生欺骗行为; 若判断有效子证书个数小于门限值 t, 通知服务器选择 模块再选择 n3个认证服务器作为证书认证服务器。
15、 一种移动终端(MT ) , 其包括相互连接的服务器选择模块、 子证书 有效性验证模块及子证书合并模块:
所述服务器选择模块设置为: 从 N个备选的认证服务器中随机选择 n2 个认证服务器作为证书生成服务器并通知所选择的认证服务器,其中 l<t^n2 ≤N;
所述子证书有效性验证模块设置为: 对所述证书生成服务器发送的 MT 子证书进行有效性验证; 所述 MT子证书是当所述认证服务器被选为生成认 证服务器时, 向所述子证书有效性验证模块发送的;
所述子证书合并模块设置为: 在 MT子证书的有效个数大于或等于门限 值时, 合并所有有效的 MT子证书生成 MT证书。
16、 如权利要求 15所述的 MT, 其中,
所述 MT子证书为
Figure imgf000030_0001
SiH m) Π —m] +R mod N, G为椭圓曲线的基点, 为认证服务器
AS 随机选择的随机整数, £ (1,Ν), Ν为椭圓曲线点的个数, Η为单项函 数, 为 SIGi的子密钥;
所述子证书有效性验证模块是设置为: 通过 AS 的公钥 验证等式: SIGi G PiH m) ΤΊ —ID] +Q是否成立, 如果不成立, 则认为所述子证书 无效;
所述子证书合并模块是设置为: 若 ASl^ , ASU2, ASUt产生的 MT 子证书为: (n^C^SIGO, (m,C2,SIG2), ...,( m,Ct,SIGt), 则合并所得的 MT证书 为 (m,C,SIG), 其中: C = d + C2 +...+ Ct, SIG ≡ SIGi + SIG2+... + SIGt
Figure imgf000030_0002
Figure imgf000031_0001
17、 如权利要求 15所述的 MT, 其中, 所述子证书有效性验证模块还设 置为: 在验证某 MT子证书无效时, 向可信中心上报生成该 MT子证书的认 证服务器发生欺骗行为; 若判断有效子证书个数小于门限值 t, 通知对应服务 器选择模块再选择 n3个认证服务器作为证书认证服务器。
PCT/CN2010/072138 2009-07-23 2010-04-23 认证方法、认证系统及认证服务器 WO2011009317A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN200910151190.6 2009-07-23
CN2009101511906A CN101610514B (zh) 2009-07-23 2009-07-23 认证方法、认证系统及认证服务器

Publications (1)

Publication Number Publication Date
WO2011009317A1 true WO2011009317A1 (zh) 2011-01-27

Family

ID=41484044

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/072138 WO2011009317A1 (zh) 2009-07-23 2010-04-23 认证方法、认证系统及认证服务器

Country Status (2)

Country Link
CN (1) CN101610514B (zh)
WO (1) WO2011009317A1 (zh)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610514B (zh) * 2009-07-23 2012-07-04 中兴通讯股份有限公司 认证方法、认证系统及认证服务器
CN101977110B (zh) * 2010-10-09 2012-08-29 北京航空航天大学 一种基于椭圆曲线的群签名方法
CN103139218B (zh) * 2013-02-27 2017-05-10 石家庄铁道大学 分离机制网络中可信域间映射更新认证方法
US10033720B2 (en) * 2014-05-28 2018-07-24 Futurewei Technologies, Inc. Method and system for creating a certificate to authenticate a user identity
CN104113416B (zh) * 2014-06-26 2017-08-25 北京天诚安信科技股份有限公司 基于电子签名的二维码验证方法及系统
US9654972B2 (en) * 2014-08-18 2017-05-16 Qualcomm Incorporated Secure provisioning of an authentication credential
CN107454048B (zh) * 2016-06-01 2021-03-23 腾讯科技(深圳)有限公司 信息的处理方法及装置、信息的认证方法、装置及系统
CN106961336B (zh) * 2017-04-18 2019-11-26 北京百旺信安科技有限公司 一种基于sm2算法的密钥分量托管方法和系统
US10425235B2 (en) * 2017-06-02 2019-09-24 Analog Devices, Inc. Device and system with global tamper resistance
CN108093059B (zh) * 2017-12-26 2021-03-26 南京信息职业技术学院 基于LoRa的温室大棚智能安全监控系统及其监控方法
CN110311881B (zh) * 2018-03-27 2022-01-14 阿里健康信息技术有限公司 一种授权方法、加密方法和终端设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116611A1 (en) * 2000-10-31 2002-08-22 Cornell Research Foundation, Inc. Secure distributed on-line certification authority
CN101252431A (zh) * 2007-09-06 2008-08-27 广州信睿网络科技有限公司 一种通用的数字签名方案的实现方法
CN101610514A (zh) * 2009-07-23 2009-12-23 中兴通讯股份有限公司南京分公司 认证方法、认证系统及认证服务器

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020116611A1 (en) * 2000-10-31 2002-08-22 Cornell Research Foundation, Inc. Secure distributed on-line certification authority
CN101252431A (zh) * 2007-09-06 2008-08-27 广州信睿网络科技有限公司 一种通用的数字签名方案的实现方法
CN101610514A (zh) * 2009-07-23 2009-12-23 中兴通讯股份有限公司南京分公司 认证方法、认证系统及认证服务器

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HE CHENGYONG ET AL.: "Anti-deception threshold signature scheme based on ECC.", JOURNAL OF CHONGQING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS(NATURAL SCIENCE EDITION)., vol. 20, no. 5, October 2008 (2008-10-01), pages 621 - 623 *

Also Published As

Publication number Publication date
CN101610514A (zh) 2009-12-23
CN101610514B (zh) 2012-07-04

Similar Documents

Publication Publication Date Title
CN111371730B (zh) 边缘计算场景下支持异构终端匿名接入的轻量级认证方法
WO2011009317A1 (zh) 认证方法、认证系统及认证服务器
KR100581590B1 (ko) 이중 요소 인증된 키 교환 방법 및 이를 이용한 인증방법과 그 방법을 포함하는 프로그램이 저장된 기록매체
EP2416524B1 (en) System and method for secure transaction of data between wireless communication device and server
CN103491540B (zh) 一种基于身份凭证的无线局域网双向接入认证系统及方法
Zhu et al. SLAB: A secure localized authentication and billing scheme for wireless mesh networks
CN107181597B (zh) 一种基于身份代理群签名的PMIPv6认证系统及方法
WO2008083628A1 (fr) Serveur d&#39;authentification, procédé, système et dispositif d&#39;authentification mutuelle dans un réseau sans fil maillé
JP2000083018A (ja) 機密を要する情報を最初は機密化されてない通信を用いて伝送するための方法
JP2013504832A (ja) 信頼できる認証およびログオンのための方法および装置
WO2011038620A1 (zh) 一种移动通讯网络中的接入认证方法、装置及系统
WO2011009268A1 (zh) 一种基于wapi的认证系统及方法
Aura et al. Reducing reauthentication delay in wireless networks
Li et al. Efficient authentication for fast handover in wireless mesh networks
Niu et al. An anonymous and accountable authentication scheme for Wi-Fi hotspot access with the Bitcoin blockchain
Chuang et al. PPAS: A privacy preservation authentication scheme for vehicle-to-infrastructure communication networks
Jing et al. A privacy preserving handover authentication scheme for EAP-based wireless networks
Hsu et al. Group anonymous D2D communication with end-to-end security in LTE-A
Ying et al. Efficient authentication protocol for secure vehicular communications
Bicakci et al. Server assisted signatures revisited
Lin et al. Authentication protocols with nonrepudiation services in personal communication systems
Lu et al. Preventing delegation-based mobile authentications from man-in-the-middle attacks
Hwang et al. A Key management for wireless communications
Olufemi et al. SAMA: a secure and anonymous mutual authentication with conditional identity-tracking scheme for a unified car sharing system
Meyer et al. An approach to enhance inter-provider roaming through secret sharing and its application to WLANs

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10801877

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10801877

Country of ref document: EP

Kind code of ref document: A1