Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A certificate issuer anonymity entity identification method and system

A credential and entity technology, applied in the authentication method and system field of anonymity of the credential issuer, can solve the problems of malicious collection of data, differentiated treatment of users, destruction of cloud environment location independence, transparency, etc., to achieve increased anonymity and strong privacy Effects on sex and flexibility

Inactive Publication Date: 2019-06-18
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, the issuer of the user credential has a direct relationship with the region and organizational department to which the user belongs. The disclosure of this information to the identity verification party will cause problems such as differentiated treatment of users and malicious collection of data, especially in the cloud environment. When identity management is performed on a single machine, it seriously undermines the characteristics of location independence, transparency, etc. that are required in the cloud environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A certificate issuer anonymity entity identification method and system
  • A certificate issuer anonymity entity identification method and system
  • A certificate issuer anonymity entity identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] Example 1. Issuer's Anonymous Authentication Algorithm

specific example

[0041] System establishment: let G 1 ,G 2 ,GT It is a prime number order cyclic group of p (the present invention needs to set three different prime number order cyclic groups, and use subscripts 1, 2 and T to distinguish two different prime number order cyclic groups), P 1 ,P 2 G respectively 1 ,G 2 generator of . ψ is G 2 to G 1 The isomorphic map of , satisfying ψ(P 2 ) = P 1 , e:G 1 ×G 2 →G T is a bilinear map, that is, the input of the bilinear map e belongs to the group G 1 and G 2 The two elements in , the output is the group G T in an element. Choose a hash function and P 0 ∈ G 2 ,in is an integer multiplicative group of order p. Then the public parameters generated by the system are params={G 1 ,G 2 ,G T ,p,e,ψ,P 1 ,P 2 ,P 0 ,h,H}, where e is a bilinear map as described above.

[0042] Issuer key generation: When the issuer of the certificate whose issuer ID is I needs to generate its own key, the following operations are performed: first...

Embodiment 2

[0055] Example 2. Anonymous authentication system with issuer anonymity

[0056] This embodiment aims to provide a specific example of the attribute-based anonymous authentication system of the present invention.

[0057] The system includes three types of subjects: credential issuer (Crendential Issuer, CI), user agent (UserAgent, UA), and service provider (Service Provider, SP). The three parts are connected through the network, and the certificate issuer is responsible for verifying the validity of the user's identity and issuing attribute certificates for the user. The main work of the user side is done by the user agent, mainly public parameter storage, credential reception, storage, query, and generation of identity certificates. Users need to apply for attribute certificates from the certificate issuer before requesting services. The service provider verifies the certificate presented by the user, and provides corresponding services or data if the verification is pass...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certificate issuer anonymity entity identification method and system. The method comprises the following steps that: 1) each certificate issuer joining a system generates a private key and a public key of the certificate issuer according to system public parameters; 2) the certificate issuer I generates an identity certificate of the user according to the input user identity identifier, the private key of the certificate issuer I and the system public parameters and transmits the identity certificate to the user; 3) the user selects a plurality of certificate issuersto form a confusion set; an anonymous identity certificate of the user is generated according to the public parameters of the system, the public keys of all the selected certificate issuers and the identity certificate held by the user, and sending the anonymous identity certificate to an identity verifier; Wherein the confusion set comprises a certificate issuer I for issuing a user certificate to the user; And 4) the identity verifier verifies the received anonymous identity certificate according to the system public parameters and the public key of each certificate issuer in the confusion set, and determines whether the received anonymous identity certificate is valid or not.

Description

technical field [0001] The invention belongs to the field of computer technology and information security, and relates to a method for protecting the privacy of an entity identity authentication process and preventing privacy leakage in a network environment, and is specifically embodied as an authentication method and system for anonymous certificate issuers. Background technique [0002] In recent years, the protection of personally identifiable information on the Internet has become the focus of attention. As network services become more and more important in people's lives, privacy leakage incidents also emerge in endlessly, which have a great impact on the vital interests of users and national security. How to avoid privacy leakage has become an urgent problem to be solved in the current network development. [0003] In this context, the research and application of anonymous credentials and anonymous authentication technology has become a hot spot in current identity a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62
Inventor 张严张立武张敏陈华冯登国
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products