SG10201703532PA - Method and System for Symmetric Swarm Authentication - Google Patents

Method and System for Symmetric Swarm Authentication

Info

Publication number
SG10201703532PA
SG10201703532PA SG10201703532PA SG10201703532PA SG10201703532PA SG 10201703532P A SG10201703532P A SG 10201703532PA SG 10201703532P A SG10201703532P A SG 10201703532PA SG 10201703532P A SG10201703532P A SG 10201703532PA SG 10201703532P A SG10201703532P A SG 10201703532PA
Authority
SG
Singapore
Prior art keywords
nodes
root node
node
level
aggregated response
Prior art date
Application number
SG10201703532PA
Inventor
David Naccache
Guilin Wang
Elizabeth Quaglia
Original Assignee
Huawei Int Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Int Pte Ltd filed Critical Huawei Int Pte Ltd
Priority to SG10201703532PA priority Critical patent/SG10201703532PA/en
Priority to PCT/SG2018/050201 priority patent/WO2018199847A1/en
Priority to CN201880028158.6A priority patent/CN110945832B/en
Publication of SG10201703532PA publication Critical patent/SG10201703532PA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/34Encoding or coding, e.g. Huffman coding or error correction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Method and Sy stem for Sy mmetric S warm A uthentication Ab stract This invention relates asymmetric swarm authentication system and method fo r a root node to authenticate with nnodes in a spanning tree network of n +1 nodes organized in ylevels where the first level consists of the root node. The method comprising: a fi rst phase comprising the root node to: determine a simplex X code } {i e S with codewords of s ize a and Hamming weight h , where aand hare two positive integers; determine a first one - way function f and a second one - wa y function g ; generate nrandom binary matrices of size ab , , nkeys , one common key , and a shortcut matrix , where aand bare positive integer s, i refers to the index of the node from 1 to n , and = ⊕ ; transmit to all n nodes and ( , ) to respective node ; a second phase of a uthenticating the plurality of n nodes comprising the root node to: generate a challenge c , where cis a random number with binary length b ; transmit the challenge cto the second level nodes; receive responses from the second level nodes; aggregate the responses from the second level nodes to obtain an aggregated response r ; verify the aggregated response rwith the following expression, ′ = ( , ) ⨁ ; and determine the aggregated response is acceptable if a nd only if the Hamming weight of ′ is equal to h . Figure 1to accompany the abstract
SG10201703532PA 2017-04-28 2017-04-28 Method and System for Symmetric Swarm Authentication SG10201703532PA (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
SG10201703532PA SG10201703532PA (en) 2017-04-28 2017-04-28 Method and System for Symmetric Swarm Authentication
PCT/SG2018/050201 WO2018199847A1 (en) 2017-04-28 2018-04-26 Method and system for symmetric swarm authentication
CN201880028158.6A CN110945832B (en) 2017-04-28 2018-04-26 Symmetric group authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
SG10201703532PA SG10201703532PA (en) 2017-04-28 2017-04-28 Method and System for Symmetric Swarm Authentication

Publications (1)

Publication Number Publication Date
SG10201703532PA true SG10201703532PA (en) 2018-11-29

Family

ID=62223182

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201703532PA SG10201703532PA (en) 2017-04-28 2017-04-28 Method and System for Symmetric Swarm Authentication

Country Status (3)

Country Link
CN (1) CN110945832B (en)
SG (1) SG10201703532PA (en)
WO (1) WO2018199847A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114007222B (en) * 2021-10-20 2024-03-15 北京龙智数科科技服务有限公司 Illegal data authentication method, illegal data authentication device, computer equipment and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2700430B1 (en) * 1992-12-30 1995-02-10 Jacques Stern Method of authenticating at least one identification device by a verification device and device for its implementation.
CN101119364A (en) * 2007-09-13 2008-02-06 上海大学 Authenticating Ad Hoc group cipher key negotiation protocol
US9215072B1 (en) * 2012-10-23 2015-12-15 Authernative, Inc. Back-end matching method supporting front-end knowledge-based probabilistic authentication systems for enhanced credential security
CN103560879B (en) * 2013-10-09 2016-12-07 中国科学院信息工程研究所 A kind of light-weight authentication and the implementation method of key agreement
CN104393999B (en) * 2014-12-10 2017-12-12 暨南大学 Authentication method and system of a kind of main equipment to its slave
US9911007B2 (en) * 2015-02-27 2018-03-06 Guardtime IP Holdings, Ltd. Redundant fail-safe synchronization in a data authentication infrastructure
US9838870B2 (en) * 2015-03-25 2017-12-05 Juniper Networks, Inc. Apparatus and method for authenticating network devices

Also Published As

Publication number Publication date
CN110945832A (en) 2020-03-31
WO2018199847A1 (en) 2018-11-01
CN110945832B (en) 2022-09-09

Similar Documents

Publication Publication Date Title
CN106411506B (en) Key derivation method and device suitable for digital cash
JP5100844B2 (en) Quantum key distribution device using graph having toroid structure and LDPC code
CN106161012B (en) A kind of quantum key distribution after-treatment system and method based on polarization code error correction
JP6165646B2 (en) Quantum key distribution apparatus, quantum key distribution system, and quantum key distribution method
KR101575030B1 (en) Method of multi-signature generation for shared data in the cloud
CN106027230B (en) A method of carrying out error code correction in the processing after quantum key distribution
US10027475B2 (en) Key agreement device and method
CN106254374A (en) A kind of cloud data public audit method possessing duplicate removal function
CN105228157B (en) A kind of wireless sensor network security light weight reprogramming method
JP7509797B2 (en) Short Transaction Identifier Collision Detection and Reconciliation
CN105553648A (en) Quantum key distribution, privacy amplification and data transmission methods, apparatuses, and system
CN110430045B (en) Random number generation method based on distributed consensus algorithm
CN105072086A (en) Cloud-storage batch auditing method based on MapReduce
CN108282339A (en) A kind of digital identity method for retrieving based on intelligent contract and from social media
CN110311776A (en) Data processing method, device, computer equipment and storage medium
CN104780052B (en) Network equipment group authentication method in a kind of software defined network
CN112348518B (en) Block chain transaction certification method and device
CN104901804A (en) User autonomy-based identity authentication implementation method
CN115380503A (en) Wallet address generating emoticon sequence identification to identify blockchain wallets
CN112184441A (en) Data processing method, data processing device, node equipment and storage medium
SG10201703532PA (en) Method and System for Symmetric Swarm Authentication
CN103916393A (en) Cloud data privacy protection public auditing method based on symmetric keys
CN110941854B (en) Method and device for saving and recovering private data based on secure multi-party computing
CN110909387B (en) Method and device for saving and recovering private data based on secure multi-party computing
CN115860768B (en) Source tracing method and device based on blockchain and electronic equipment thereof