Public key cipher system private key escrowing system based on identification

A public key cryptosystem and cryptosystem technology, applied in transmission systems, electrical components, user identity/authority verification, etc., can solve problems such as USBKey cracking, and achieve the effect of ensuring security and increasing attack difficulty.

Inactive Publication Date: 2009-02-04
湖北电力信息通信中心 +1
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to protect the security of the private key, the more commonly used method is to save the user's private key in the USBKey and protect it with a password. This method has certain security in practical applications, but strictly speaking, because the USB Key Passwords are usually relatively simple and can be obtained through exhaustive methods, and passwords are easily tracked and obtained in the computer system, so the USB Key may be cracked by static analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key cipher system private key escrowing system based on identification
  • Public key cipher system private key escrowing system based on identification
  • Public key cipher system private key escrowing system based on identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] This system is deployed on the Windows operating system. To implement the system designed by the present invention, it is first necessary to establish a private key generator PKG. Since the user's authentication information is stored in the PKG, it should be stored in a safe environment and various security protections should be taken. measures to avoid attacks.

[0034] Each client needs to install a password device and issue a password for authentication to the user. The password can be given to the user by using a password generator or by printing.

[0035] One-time password authentication can also be changed to biometric authentication and other security authentication methods that support the star structure.

[0036] System implementation includes three parts. One is the tamper-proof identity authentication protocol, the other is the design of the cryptographic device, and the third is the private key acquisition process.

[0037] 1. Tamper-proof identity authent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a public key cryptosystem private key escrow system based on identification. A client cryptosystem transmits the information of a user to a private key generator for requesting authentication; a user private key is generated and stored at the client cryptosystem after the authentication of the private key generator is passed; and the client cryptosystem provides an operation interface for an application program, and realizes the cryptographic operation internally. The public key cryptosystem private key escrow system dynamically acquires the private key form the private key generator when a user is logged in, a tamper-proofing authentication protocol and the technology of a cipher device can ensure the user to acquire the private key safely. Because the user neither stores the private key statically nor dynamically exposes the private key out of the cipher device, so the hacking difficulty of a hacker is increased. The public key cryptosystem private key escrow system can effectively resist various dynamic and static analysis methods.

Description

technical field [0001] The invention relates to the identification technology in the communication network, in particular to a private key trusteeship technology used in the identification-based public key cryptosystem. Background technique [0002] The identity-based public key cryptosystem uses the user's identity, such as name, IP address, email address, etc. as the public key, and the private key is calculated by a trusted third party, the private key generator PKG (Private Key Generator). However, the private key generator does not directly participate in the encryption and signature process except for generating the private key. [0003] In the public key encryption system, the user's private key is the only certificate to ensure the legitimacy of the user's identity and correctly implement decryption and digital signature. If the user's private key is leaked, a new public-private key pair needs to be regenerated for the user, and all users will be notified. The user'...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 杨复荪金波张小牧汤学明崔永泉龙涛付才
Owner 湖北电力信息通信中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products