Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security chip and application method, system and medium based on puf and zero-knowledge proof

A technology of zero-knowledge proof and security chip, which is applied in the field of security chip based on PUF (Physically Unrepeatable Function) and zero-knowledge proof, can solve the problem of not meeting the security certification requirements of the Internet of Things environment, long certification time, user Problems such as poor experience, to achieve the effect of simple and efficient authentication process, fast authentication speed, and low implementation cost

Active Publication Date: 2021-12-31
北京智涵芯宇科技有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] As mentioned above, the existing authentication methods often require multiple rounds of interaction between the authentication requester and the authentication server to complete the authentication, which not only cannot meet the security authentication requirements of the IoT environment, but also increases security risks due to round-trip interactions. , at the same time authentication takes longer, more power consumption is required to complete the authentication, and the user experience is not good

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security chip and application method, system and medium based on puf and zero-knowledge proof
  • Security chip and application method, system and medium based on puf and zero-knowledge proof
  • Security chip and application method, system and medium based on puf and zero-knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0078] In this embodiment, the function expression of the first execution circuit to generate the publicly available zero-knowledge identification identification number PID according to the identification ChipID is shown in formula (1):

[0079] PID = ModMult(ChipID, ChipID, Z) (1)

[0080]Among them, PID represents a publicly available zero-knowledge identification number, ChipID is a unique chip ID, Z is a specified large integer, and ModMult(ChipID, ChipID, Z) represents the result of multiplying ChipID and ChipID to take the modulus of the large integer Z. The function expression of the ID number generated by the GEN_PID command for zero-knowledge identification is shown in formula (1): the first execution circuit squares the value of ChiID and takes the modulus of the large number Z, where Z is a large integer. In order to achieve sufficient security, The number of bits of Z needs to reach 1024 bits; PID is a publicly available zero-knowledge identification number. Due to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security chip based on PUF and zero-knowledge proof, an application method, a system, and a medium. The security chip based on PUF and zero-knowledge proof includes a PUF circuit module, a ChipID generating circuit module, a zero-knowledge proof circuit module and The main control module, the zero-knowledge proof circuit module includes a first execution circuit for generating a publicly available zero-knowledge identification number PID and a second execution circuit for generating a proof code P; An identity authentication method for an order-of-magnitude security chip. This identity authentication method does not require complex interactive protocols. The requester and server only need to perform zero-knowledge proof calculations. Compared with digital signatures and authentication methods based on public key cryptography algorithms, they are simpler. It has the advantages of good versatility, high security, low authentication overhead, and simple authentication process.

Description

technical field [0001] The present invention relates to the technical fields of integrated circuit design and information security, in particular to a security chip based on PUF (Physically Unreproducible Function) and zero-knowledge proof, and an application method, system and medium. Background technique [0002] With the rapid development of information technology and the popularization and application of digital and intelligent information systems, the security issues of information systems have become increasingly prominent. The safe and credible identity authentication of the access client by the server system has become the basis of all information system security. Users and terminals can obtain corresponding services from the server only after confirming the legitimacy of their identities. At present, the identity authentication is mainly the identity authentication of the user and the information equipment operated by the user. With the rapid development of the Inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3278H04L9/3221
Inventor 陈晓飞郑朝霞文浩王若凡夏恒炀
Owner 北京智涵芯宇科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products