Authentication key negotiation method and system against continuous leakage

An authentication key negotiation and verification key technology, which is applied in the public key, transmission system, digital transmission system and other directions of secure communication, can solve the problem that the opponent cannot obtain the secret value, and achieve the effect of high security and high efficiency

Inactive Publication Date: 2018-09-28
HUBEI UNIV OF TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the early AKE model, the leak attack is not allowed, that is, the adversary cannot obtain any information about the secret value
However, this assumption is unrealistic in the actual environment, for example, IoT attackers can obtain part of the secret information of the node's long-term private key by measuring the electromagnetic radiation of the IoT node

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication key negotiation method and system against continuous leakage
  • Authentication key negotiation method and system against continuous leakage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and examples. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0031] please see figure 1 , an authentication key agreement system against continuous leakage provided by the present invention, the system has two users in total, namely the session initiator U and the responder V, and each user has its own public-private key pair.

[0032] please see figure 2 , an authentication key agreement method against continuous leakage provided by the present invention, specifically comprising the following steps:

[0033] Step 1: The system is initialized, and the user independently generates a public-private key pair;

[0034] St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication key negotiation method and system against continuous leakage. The system is composed of two users, respectively a session initiator and a responder; and eachuser has a pair of public and private keys. The method in the invention first performs system initialization and then performs a first interaction, and the session initiator sends a message parameterto the responder; then a second interaction is carried out, and the session responder responds to the initiator with the message parameter; finally, the session initiator and the responder authenticate key negotiation, update own private keys and generate a common communication key. The authentication key negotiation method and system against continuous leakage in the invention are particularly suitable for the secure communication of both parties, are high in security as having achieved cryptographically provable security, and is high in practicability as being able to execute safely and stably still in a continuous leakage environment; and in combination with an elliptic curve and bilinear pairing technology, a session key authentication negotiation protocol against continuous leakage isproposed, and the scheme efficiency is high.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to an authentication key negotiation method and system against continuous leakage, and in particular to a combination of elliptic curve and bilinear pairing technology aimed at the needs of both communication parties for security, convenience and efficiency. An authenticated key agreement system and method capable of resisting continuous leakage attacks. Background technique [0002] With the rapid development of Internet technology, more and more users are connected to the Internet, which greatly promotes the process of social informatization. While people are enjoying the convenience and comfort brought by smart devices and the Internet, the emergence of various network attack methods poses a serious threat to data security. How to protect users' personal privacy and communication security in the process of informatization has become an important issue in today's societ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0838H04L9/0869H04L9/3066
Inventor 阮鸥米旌王子豪周靖杨阳黄雄波
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products