Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based safety signature method

A security signature and identity technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as insufficient computing power, small storage space, and limited power supply

Active Publication Date: 2013-03-13
YUELIANG CHUANQI TECH CO LTD
View PDF4 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in wireless sensor networks, there are usually constraints such as limited power supply, insufficient computing power, small storage space, dynamic changes in network topology, and insufficient bandwidth, making it difficult to apply data security and authentication technologies in current networks to wireless sensor networks. Use in sensor networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based safety signature method
  • Identity-based safety signature method
  • Identity-based safety signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The present invention will be further described in conjunction with the following specific embodiments. The specific examples are to further describe the present invention in detail, without limiting the protection scope of the present invention.

[0053] An identity-based secure signature method, comprising the steps of:

[0054] (1) Offline key distribution, generate system parameters and master key: run the nodes in the system, generate parameter k, calculate elliptic curve E(Fp), and calculate output is {q,G 1 ,G 2 ,e,g,g 1 ,h,α}, where q is a prime number, input k to generate a large prime number Q, and establish two groups with order Q: additive cyclic group G 1 , and the multiplicative cyclic group G 2 Making the CDH problem difficult, build a bilinear map e:G 1 ×G 1 →G 2 , arbitrarily choose a generating element p∈G 1 ; Then the master key of the system is generated by the nodes in the system System public parameters g,h∈G 1 , g 1 =g α ∈G 2 and the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an identity-based safety signature method which comprises the steps of: allocating a secret key offline, signing online and setting a secret key service life for realizing updating of a communication group secret key, wherein a unique identification of a sensor node, i.e. a public key of the node, is used as identity information. Based on a public parameter of a system and a main secret key of the system and according to identity information of each node, a private key of the node is figured out. After a wireless sensor network is configured, a system parameter and a private key are stored in each node, when identity authentication is required between two or among more nodes, a sender can use the private key of the sender to sign a pre-appointed authentication quantity. With identity information of the sender as a public key, a receiver verifies the received information according to a signature verification algorithm in the signature scheme so as to determine the identity of the sender. The storage space in the safety signature method is a constant, therefore, the safety signature method is more suitable for being used in a wireless sensor.

Description

technical field [0001] The invention relates to the electronic commerce application field of a computer communication machine, in particular to an identity-based signature method in a wireless sensor network. Background technique [0002] Using data security and authentication technology to provide security management services for the information transmitted by the Internet of Things can effectively enhance the security mechanism. However, the computing, storage and communication capabilities of the networked front-end data collection and transmission nodes are very limited, and are generally considered unsuitable for the use of public key cryptography. Many research results in recent years have shown that some optimized public key methods can provide more powerful security guarantees for wireless sensor networks. A wireless sensor network is a wireless network composed of a large number of sensor nodes with wireless communication, sensing, and data processing capabilities ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06H04W84/18H04W12/041H04W12/0431H04W12/10
Inventor 陈中华林伟雄叶敏陈景范姚巍
Owner YUELIANG CHUANQI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products