Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Confusable Anonymous Authentication Method

An anonymous authentication and authentication key technology, applied in the field of anonymous authentication and confusion theory, cryptography, can solve the problem that the program is difficult to understand and analyze, and achieve high security effects

Active Publication Date: 2021-05-11
TONGJI UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obfuscation transformation provides a conversion mechanism to keep the function of the converted program unchanged, but at this time the program or its decompiled results are difficult to understand and analyze

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Confusable Anonymous Authentication Method
  • A Confusable Anonymous Authentication Method
  • A Confusable Anonymous Authentication Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0237]Such asfigure 2 As shown, the present embodiment applies the above method to a mobile smart group perception system for finding a parking space, and the user first needs to register your identity information to the system administrator, and the legal user after registration can mark the server in the system. Initiate anonymous authentication requests, the server provides information on the user's legitimacy and provides users with the available parking space. The anonymous authentication request guarantees that the user's privacy information is not exposed, but if some users have implemented illegal operations that do not meet the system, the tracker can find user identity through the user's authentication request.

[0238]The specific steps of the application are as follows:

[0239]1 System administrator initializes the system (SETUP)

[0240]2 new members conduct user registration

[0241]2.1 Send its identity ID to the system administrator when the user requests to join the system

[024...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a confusing anonymous authentication method, which is used to protect the user's identity information and private authentication key in the authentication system. The authentication system is provided with a system administrator and a tracker, and the system administrator is configured with a global public parameter, master key and key pair for linear encryption and decryption, the system user is configured with a private authentication key, and the anonymous authentication method is specifically: the system user obfuscates the private authentication key to obtain the obfuscation key; The system user generates an authentication array containing service requests based on the obfuscated key, and sends it to the server; the server verifies the validity of the authentication array and verifies the liveness of the system user; The system users who have passed the verification provide the service corresponding to the service request; when any of the legality verification and liveness verification fails, the tracker will track the corresponding system user. Compared with the prior art, the present invention has the advantages of traceability and low attack success probability.

Description

Technical field[0001]The present invention relates to the field of cryptography, anonymous authentication, and confusion, in particular, involving a confusing anonymous authentication method.Background technique[0002]Anonymous Authentication (AA) is a authentication method based on digital signature and can provide anonymity. In recent years, a series of anonymous authentication programs have been proposed in various applications. Traditional anonymous authentication usually has the following properties: 1) Certification / correctness, 2) Unable totrurability, 4) Unsciousness, 5) Anonymity, 6) Unable to litability, 7) Conditions Traceability. An anonymous authentication method can be based on different signatures such as: Blind sign name, loop signature, tracking signature, group signature, and more.[0003]In a conventional anonymous authentication scheme, the user's private authentication key is often used directly to generate a user's authentication request, which requires a critic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14
CPCH04L9/14H04L63/08H04L63/083H04L63/1441H04L63/1458
Inventor 史扬梁竞文张清
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products