Digital certificate generation method, identity authentication method, quantum CA authentication center and quantum CA authentication system

A CA authentication, quantum technology, applied in identity authentication method, quantum CA authentication center and system, and digital certificate generation field, can solve problems such as system management burden, poor practical performance, complex encryption technology upgrade, etc., and achieve the effect of convenient certificate management

Active Publication Date: 2022-03-29
NANJING UNIV +1
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The core of PKI is CA (Certificate Authority). The traditional CA center issues a digital certificate to each user who uses the public key. The function of the digital certificate is to prove that the user listed in the certificate legally owns the public key listed in the certificate. That is, the certificate is bound to the public key, so the change of the public key will inevitably bring about the renewal of the digital certificate. If the encryption algorithm is no longer safe, the encryption algorithm needs to be updated, and the encryption technology upgrade is complicated and costly, resulting in poor practical performance of the entire system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital certificate generation method, identity authentication method, quantum CA authentication center and quantum CA authentication system
  • Digital certificate generation method, identity authentication method, quantum CA authentication center and quantum CA authentication system
  • Digital certificate generation method, identity authentication method, quantum CA authentication center and quantum CA authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood, however, that the invention may be embodied in various forms, and some exemplary and non-limiting embodiments are shown in the drawings and described below, and are not intended to limit the invention to the specific embodiments described. .

[0038] A quantum-safe CA certification center, the CA certification center is set up in different levels of administrative areas, and the specific number of CA certification centers set up in each level of administrative area is determined by the user scale and business volume of the administrative area. With reference to the actual administrative divisions of our country and the actual situation of the establishment of the existing CA certification center, the present invention constructs a quantum-safe asymmetric key according to the national-provincial two-level model or the nation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a digital certificate generation method, an identity authentication method, a quantum CA authentication center and a quantum CA authentication system, and each CA authentication center is used for providing a message authenticity authentication function, namely a quantum digital signature service based on trusted identity authentication. The CA authentication center comprises a registration authentication unit, a basic function unit, a quantum security unit and an interface unit which are connected in sequence. When a signature is initiated between two users, a CA authentication center and two communication parties jointly form a message authenticity verification system, firstly, a signer requests one identity authentication from the CA authentication center, and then quantum security verification is completed on the authenticity of a sent message through the processes of secret key preparation, signature generation and signature verification. And completing the quantum digital signature. According to the invention, the CA needs to issue a trusted identity certificate to each user, but the certificate does not need to be bound with a secret key for verifying the signature, so that the certificate management of the CA with quantum security is more convenient.

Description

technical field [0001] The invention relates to the field of information security, in particular to a digital certificate generation, identity authentication method, quantum CA authentication center and system. Background technique [0002] With the rapid development of Internet technology, users gradually complete various operations and obtain various services online. While online operations bring convenience to users, they also bring concerns about confidentiality and security to users. The authenticity of information sent by users is generally It is ensured by the public key infrastructure (Public Key Infrastructure, PKI), which is a universal security service measure that uses the principle of asymmetric cryptographic algorithm (public key theory) and third-party authentication technology to realize and provide security services. The core of PKI is CA (Certificate Authority). The traditional CA center issues a digital certificate to each user who uses the public key. The...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/45G06F21/60G06F21/64G06N10/60
CPCG06F21/31G06F21/45G06F21/602G06F21/64G06N10/00
Inventor 陈增兵富尧杨鸽
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products