Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Confusable anonymous authentication method

An anonymous authentication and authentication key technology, applied in the field of anonymous authentication and confusion theory, cryptography, can solve the problem that the program is difficult to understand and analyze

Active Publication Date: 2018-11-02
TONGJI UNIV
View PDF6 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obfuscation transformation provides a conversion mechanism to keep the function of the converted program unchanged, but at this time the program or its decompiled results are difficult to understand and analyze

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confusable anonymous authentication method
  • Confusable anonymous authentication method
  • Confusable anonymous authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0237] Such as figure 2 As shown, the present embodiment applies the above method to a mobile intelligent group sensing system for searching for parking spaces. Users in the system first need to register their identity information with the system administrator, and legitimate users after registration can register with the server in the system. An anonymous authentication request is initiated, and the server provides the user with information about available parking spaces after authenticating the user's legitimacy. The anonymous authentication request ensures that the user's private information is not exposed, but if a user performs an illegal operation that does not comply with the system regulations, the tracker in the system can find the user's identity through the user's authentication request.

[0238] The specific steps of the application are as follows:

[0239] 1 The system administrator initializes the system (Setup)

[0240] 2 new members to register as a user

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a confusable anonymous authentication method used for protecting identity information and a private authentication key of a user in an authentication system. A system administrator and a tracker are arranged in the authentication system; the system administrator is configured with a global public parameter, a master key, and a key pair for linear encryption and decryption;and a system user is configured with a private authentication key. The anonymous authentication method specifically comprises the following steps: confusing the private authentication key by the system user to obtain an obfuscation key; generating an authentication array containing a service request based on the obfuscation key by the system user, and sending the authentication array to a server;performing legality authentication on the authentication array by the server, and performing liveness verification on the system user; providing a service corresponding to the service request to a system user who passes the legality authentication and the liveness verification; and when any one of the legality verification and the liveness verification is not passed, tracking the corresponding system user by the tracker. Compared with the prior art, the confusable anonymous authentication method provided by the invention has the advantages of being traceable, low in attack success probabilityand the like.

Description

technical field [0001] The invention relates to the fields of cryptography, anonymous authentication and confusion theory, in particular to a confusing anonymous authentication method. Background technique [0002] Anonymous Authentication (AA for short) is an authentication method based on digital signatures and capable of providing anonymity. In recent years, a series of anonymous authentication schemes have been proposed to be applicable to various application fields. Traditional anonymous authentication usually has the following properties: 1) authenticity / correctness, 2) unforgeability, 3) non-reproducibility, 4) non-repudiation, 5) anonymity, 6) non-linkability, 7) conditional traceability. An anonymous authentication method can be based on different signature methods such as: blind signature, ring signature, traceable signature, group signature, etc. [0003] In traditional anonymous authentication schemes, the user's private authentication key is often directly us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/14
CPCH04L9/14H04L63/08H04L63/083H04L63/1441H04L63/1458
Inventor 史扬梁竞文张清
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products