Thanks to visit codestin.com
Credit goes to patents.google.com

SG10201606061PA - A method for unified network and service authentication based on id-based cryptography - Google Patents

A method for unified network and service authentication based on id-based cryptography

Info

Publication number
SG10201606061PA
SG10201606061PA SG10201606061PA SG10201606061PA SG10201606061PA SG 10201606061P A SG10201606061P A SG 10201606061PA SG 10201606061P A SG10201606061P A SG 10201606061PA SG 10201606061P A SG10201606061P A SG 10201606061PA SG 10201606061P A SG10201606061P A SG 10201606061PA
Authority
SG
Singapore
Prior art keywords
service authentication
unified network
cryptography
authentication based
based cryptography
Prior art date
Application number
SG10201606061PA
Inventor
Xin Kang
Haiguang Wang
Jie Shi
Guilin Wang
Yanjiang Yang
Original Assignee
Huawei Int Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Int Pte Ltd filed Critical Huawei Int Pte Ltd
Priority to SG10201606061PA priority Critical patent/SG10201606061PA/en
Priority to PCT/SG2017/050162 priority patent/WO2018017013A1/en
Priority to EP17720253.8A priority patent/EP3469763B1/en
Priority to CN201780028149.2A priority patent/CN109075973B/en
Publication of SG10201606061PA publication Critical patent/SG10201606061PA/en
Priority to US16/254,205 priority patent/US11044084B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Algebra (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Physics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
SG10201606061PA 2016-07-22 2016-07-22 A method for unified network and service authentication based on id-based cryptography SG10201606061PA (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
SG10201606061PA SG10201606061PA (en) 2016-07-22 2016-07-22 A method for unified network and service authentication based on id-based cryptography
PCT/SG2017/050162 WO2018017013A1 (en) 2016-07-22 2017-03-28 A method for unified network and service authentication based on id-based cryptography
EP17720253.8A EP3469763B1 (en) 2016-07-22 2017-03-28 A method for unified network and service authentication based on id-based cryptography
CN201780028149.2A CN109075973B (en) 2016-07-22 2017-03-28 Method for carrying out unified authentication on network and service by using ID-based cryptography
US16/254,205 US11044084B2 (en) 2016-07-22 2019-01-22 Method for unified network and service authentication based on ID-based cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201606061PA SG10201606061PA (en) 2016-07-22 2016-07-22 A method for unified network and service authentication based on id-based cryptography

Publications (1)

Publication Number Publication Date
SG10201606061PA true SG10201606061PA (en) 2018-02-27

Family

ID=58640966

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201606061PA SG10201606061PA (en) 2016-07-22 2016-07-22 A method for unified network and service authentication based on id-based cryptography

Country Status (5)

Country Link
US (1) US11044084B2 (en)
EP (1) EP3469763B1 (en)
CN (1) CN109075973B (en)
SG (1) SG10201606061PA (en)
WO (1) WO2018017013A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107592281B (en) * 2016-07-06 2022-04-05 华为技术有限公司 Protection system, method and device for transmission data
SG10201606061PA (en) * 2016-07-22 2018-02-27 Huawei Int Pte Ltd A method for unified network and service authentication based on id-based cryptography
CN110120927B (en) * 2018-02-05 2022-03-25 华为技术有限公司 Method and device for generating private key
US11831792B2 (en) * 2018-11-26 2023-11-28 Forticode Limited Mutual authentication of computer systems over an insecure network
EP3912377B1 (en) 2019-01-15 2025-09-10 ZTE Corporation Method and device for preventing user tracking, storage medium and electronic device
WO2021112603A1 (en) * 2019-12-06 2021-06-10 Samsung Electronics Co., Ltd. Method and electronic device for managing digital keys
CN113452660B (en) 2020-03-27 2023-07-25 瑞昱半导体股份有限公司 Communication method of mesh network and cloud server, mesh network system and node device thereof
JP7458348B2 (en) * 2021-07-05 2024-03-29 株式会社東芝 Communication systems, access point devices, communication methods and programs
CN113242554B (en) * 2021-07-12 2021-09-24 北京电信易通信息技术股份有限公司 Mobile terminal authentication method and system based on certificate-free signature
CN115776672B (en) * 2021-09-08 2025-04-25 大唐移动通信设备有限公司 Satellite communication system, authentication method and device

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6373946B1 (en) * 1996-05-31 2002-04-16 Ico Services Ltd. Communication security
FI974341A7 (en) * 1997-11-26 1999-05-27 Nokia Telecommunications Oy Data connection privacy
US20050135610A1 (en) * 2003-11-01 2005-06-23 Liqun Chen Identifier-based signcryption
US10339791B2 (en) * 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US7266435B2 (en) * 2004-05-14 2007-09-04 General Motors Corporation Wireless operation of a vehicle telematics device
GB2416282B (en) * 2004-07-15 2007-05-16 Hewlett Packard Development Co Identifier-based signcryption with two trusted authorities
US7594261B2 (en) * 2005-02-08 2009-09-22 Microsoft Corporation Cryptographic applications of the Cartier pairing
EP2217995A4 (en) * 2007-10-26 2012-11-21 Telcordia Tech Inc Method and system for secure session establishment using identity-based encryption (vdtls)
EP2343916B1 (en) * 2010-01-12 2018-05-09 Koninklijke KPN N.V. Secure coupling of hardware components
CN102480354A (en) 2010-11-30 2012-05-30 北大方正集团有限公司 A unified authentication service system and unified authentication method
CN102487379A (en) * 2010-12-01 2012-06-06 李洪伟 Identity-based grid authentication protocol
EP2702741B1 (en) * 2011-04-27 2015-10-14 Telefonaktiebolaget L M Ericsson (publ) Authenticating a device in a network
CN102420808B (en) 2011-06-30 2014-07-23 南京中兴软创科技股份有限公司 Method for realizing single signon on telecom on-line business hall
CN103188080B (en) * 2011-12-31 2018-02-09 中兴通讯股份有限公司 A kind of machinery of consultation of key authentication end to end of identity-based mark and system
CN103259667B (en) 2013-06-07 2016-05-18 北京邮电大学 The method and system of eID authentication on mobile terminal
CN103532720A (en) * 2013-10-22 2014-01-22 杭州华三通信技术有限公司 Transmission method and equipment of CAPWAP message
CN104717648B (en) 2013-12-12 2018-08-17 中国移动通信集团公司 A kind of uniform authentication method and equipment based on SIM card
CN105530099A (en) * 2015-12-11 2016-04-27 捷德(中国)信息科技有限公司 Anti-fake verification method, device and system and anti-fake certificate based on IBC (Identity-Base Cryptography)
CN105743646B (en) * 2016-02-03 2019-05-10 四川长虹电器股份有限公司 A kind of Identity based encryption method and system
CN105790941B (en) * 2016-04-22 2019-08-16 北京迪曼森科技有限公司 A kind of combination key generation divided with domain and authentication method based on mark
CN107317674B (en) * 2016-04-27 2021-08-31 华为技术有限公司 Key distribution, authentication method, device and system
SG10201606061PA (en) * 2016-07-22 2018-02-27 Huawei Int Pte Ltd A method for unified network and service authentication based on id-based cryptography
JP2019041321A (en) * 2017-08-28 2019-03-14 ルネサスエレクトロニクス株式会社 Data receiving apparatus, data transmission system, and key generation apparatus

Also Published As

Publication number Publication date
US20190158283A1 (en) 2019-05-23
EP3469763B1 (en) 2021-06-09
EP3469763A1 (en) 2019-04-17
US11044084B2 (en) 2021-06-22
CN109075973B (en) 2022-04-05
CN109075973A (en) 2018-12-21
WO2018017013A1 (en) 2018-01-25

Similar Documents

Publication Publication Date Title
SG10201606061PA (en) A method for unified network and service authentication based on id-based cryptography
GB201718151D0 (en) Controller area network message authentication
ZA201708085B (en) Method for enabling a secure provisioning of a credential, and related wireless devices and servers
SG11201704328PA (en) Systems and methods for providing customized virtual wireless networks based on service oriented network auto-creation
EP3326346A4 (en) Communication device for implementing selective encryption in a software defined network
EP3800909C0 (en) Remote management method, and device
HUE067447T2 (en) Secure 3d printer and 3d printer management network
EP3201895A4 (en) Package exchange and service system using a key fob simulator
HUE050072T2 (en) Method for unified application authentication in trunking system, server and terminal
ZA201503863B (en) Method and system for establishing a secure communication channel
EP3197123A4 (en) Method, terminal, and network server for information encryption and decryption and key management
HUE061587T2 (en) Vehicle network v2x service sending method and apparatus
GB201503198D0 (en) Method and system for providing a vulnerability management and verification service
EP3146670A4 (en) Network authentication system with dynamic key generation
EP3285439A4 (en) Network service lifecycle management method and device
EP3195523A4 (en) Methods, devices and management terminals for establishing a secure session with a service
IL265553B (en) Cipher message with authentication instruction
EP3163792A4 (en) Fully homomorphic message authentication method, device and system
GB201507136D0 (en) A communications system, method and gateway device
SG10201605364XA (en) Method For Effecting An Authentication Procedure Associated With A Service Provider Or An Application
PL3378213T3 (en) Systems and methods for authenticating network messages
GB2565662B (en) Method and system for authenticating a session on a communication device
EP3229413A4 (en) Cross-domain cooperative method, cooperative device and control device for network as a service business
HUE056558T2 (en) Authenticating a message in a wireless communication system
SG10201606165SA (en) A key generation and distribution method based on identity-based cryptography