Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Three-party authenticated key agreement method for centralized mobile positioning system

A technology for authenticated key negotiation and mobile positioning, which is applied in the field of three-party certifiable key negotiation for centralized mobile positioning systems, and can solve problems such as high algorithm complexity, inability to guarantee forward security, and inability to resist active attacks.

Active Publication Date: 2020-09-18
SOUTHEAST UNIV +1
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] Aiming at the technical problems in the above key agreement methods, such as the length of the key is too long, the complexity of the algorithm is high, the reliance on the third-party certificate authority, the reliance on the key generation center, the inability to resist active attacks and the inability to guarantee forward security, etc., the present invention provides The three-party authenticated key agreement method of the centralized mobile positioning system adopts the self-designed self-designed ECC three-party authenticated key agreement algorithm to ensure that each entity in the system can generate session keys safely and reliably during the interaction; for key length The problem of too long and the high complexity of the algorithm, the key length used by the present invention based on the ECC algorithm is shorter, and the encryption and decryption speed is faster than the modular exponentiation operation; for the problem of relying on third-party certificate agencies and relying on the key generation center, The method of the invention enables each entity in the system to generate a public-private key pair and its own certificate locally, without relying on other institutions for key custody or participating in certificate verification during mutual authentication; for the problem of being unable to resist man-in-the-middle attacks, the invention provides The self-designed signature algorithm and identity authentication algorithm are used in the authentication process, which can effectively avoid fake authentication responses and resist man-in-the-middle attacks; for the problem that forward security cannot be guaranteed, the present invention introduces a non-disclosed random The number reaches the one-time secret effect to ensure forward security; the method of the present invention can be successfully applied to a centralized mobile positioning system to ensure that the three-party entities in the centralized mobile positioning system can safely and reliably generate session keys, and have high encryption strength, The key length is short, the algorithm efficiency is high, and the characteristics of not relying on a third-party organization, the present invention is also applicable to multi-party entity interactive authentication key negotiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Three-party authenticated key agreement method for centralized mobile positioning system
  • Three-party authenticated key agreement method for centralized mobile positioning system
  • Three-party authenticated key agreement method for centralized mobile positioning system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0061] Based on the self-designed self-owned certificate ECC three-party authenticated key agreement algorithm, the present invention provides a method for interactive authentication and key agreement applied to a centralized mobile positioning system. The present invention can be deployed as a separate authentication and negotiation function module in existing In some three-party interactive systems, as the initial module of entity online security interaction, session keys are safely and reliably generated for multi-entity interaction; the self-designed self-designed ECC three-party authentication key agreement algorithm used in the present invention, due to the use of The key length is short, the computational complexity is low, and it can run stably in a lightweight computing unit; at the same time, it does not need to rely on the certificate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a three-party authenticated key agreement method for a centralized mobile positioning system, and the method comprises the steps: achieving the mutual authentication and key agreement among a communication entity client, a central server and a positioning terminal through the autonomous design of a self-owned certificate ECC three-party authenticated key agreement algorithm, and generating a safe session key; and by adopting an autonomously designed self-owned certificate registration algorithm, enabling the client, the central server and the positioning terminal to locally generate public and private key pairs and self-owned certificates. According to the method, participation of a key generation center and a certificate issuing mechanism is not needed, and the certificate management problem, the certificate authentication overhead problem and the third-party key trusteeship problem are solved; through adoption of an autonomously designed signature algorithm and an identity authentication algorithm, bidirectional authentication of a communication entity is realized, and man-in-the-middle attacks and replay attacks can be effectively resisted; according to the designed ECC three-party authenticated key agreement algorithm, a one-time pad effect is achieved by setting a security random number, and forward security is ensured.

Description

technical field [0001] The invention relates to the field of computer network communication and the field of network security, in particular to a three-party authenticated key negotiation method for a centralized mobile positioning system. Background technique [0002] With the development of Internet technology, the centralized network service system is widely used in enterprises due to its advantages of convenient deployment, convenient management, safety and reliability, such as centralized mobile positioning system, centralized Internet of Things system, centralized remote control system, However, with the continuous development of the application technology of the centralized network service system, the security problems brought about by it have gradually become prominent. In the multi-entity interaction system similar to the centralized mobile positioning system, most of them only provide plaintext data transmission function, it is difficult to guarantee the security o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/08H04L9/32
CPCH04L9/3066H04L9/0825H04L9/0838H04L9/3268H04L9/3297
Inventor 蒋睿朱普明裴蓓吴松洋
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products