CN-122027148-A - Anti-quantum traceable anonymous authentication method and system for mobile Internet of things
Abstract
The invention discloses an anti-quantum traceable anonymous authentication method and system for mobile Internet of things, and belongs to the technical field of identity authentication and tracking. The method comprises an initialization stage, a mobile Internet of things equipment registration stage, a mobile Internet of things equipment authentication stage and a mobile Internet of things equipment tracking and revocation stage. The bidirectional authentication and session key negotiation between the edge node and the equipment are realized by utilizing the chameleon hash and short integer solution problem based on the grid, the equipment identity and path privacy are protected by the chameleon hash trapdoor technology while the quantum computing attack is resisted, the accurate traceability and quick revocation of malicious equipment by law enforcement agencies as required can be supported, and the requirements of safety, privacy and supervision and duplicate in the mobile Internet of things scene are met.
Inventors
- WU BIN
- LI SIYUE
Assignees
- 中国科学院信息工程研究所
Dates
- Publication Date
- 20260512
- Application Date
- 20260331
Claims (10)
- 1. An anti-quantum traceable anonymous authentication method oriented to a mobile internet of things, which is characterized by being applied to a law enforcement agency, the method comprising: Generating system hash public key and key negotiation matrix System chameleon hash value System trapdoor And broadcasting system hash public key and system chameleon hash value Broadcasting, system trapdoor And secret matrix Issuing to an edge node via a domain authority, wherein the key agreement matrix Matrix based on random selection Secret matrix And error matrix Generating; through interaction with the mobile Internet of things equipment, the blockchain transaction address corresponding to the mobile Internet of things equipment is obtained Then, the corresponding relation between the true identity of the mobile Internet of things equipment and the blockchain transaction address is locally stored, and the blockchain transaction address is stored Key negotiation matrix Matrix Returning to the mobile internet of things equipment so as to enable the mobile internet of things equipment and the edge node to perform bidirectional authentication; When the domain management mechanism finds out malicious behaviors of any mobile Internet of things equipment, the law enforcement mechanism traces back to the mobile Internet of things equipment in combination with the corresponding relationship.
- 2. The method of claim 1, wherein a system hash public key, key agreement matrix is generated System chameleon hash value System trapdoor Comprising: obtaining a common parameter, wherein the common parameter comprises the number of system matrix lines Array number of system matrix Upper error bound Number of key agreement matrix rows Number of key agreement matrix columns Dimension extension Sum modulus , , , ; Generating matrices using GPV algorithms And the matrix And using the short group as a system trapdoor Wherein, the method comprises the steps of, Representation model On integers of A dimension matrix set; selecting a random matrix as a system private key And combine the matrix Sum modulus Obtaining the calculation result Thereafter, a system hash public key is generated ; Random message pair using system hash public key Random number Performing chameleon hash calculation to obtain a system chameleon hash value Wherein, the method comprises the steps of, Representation model Is a group of integer multiplications; Random selection matrix Secret matrix And error matrix And based on the matrix The secret matrix And the error matrix Obtaining a key negotiation matrix Wherein, the method comprises the steps of, And (3) with Respectively represent the mould On integers of Dimension matrix set and modulus On integers of A set of dimension matrices.
- 3. The method of claim 1, wherein interacting with a mobile internet of things device to obtain a blockchain transaction address corresponding to the mobile internet of things device comprises: generating matrices using GPV algorithms And the matrix Short base of (2) ; Negotiating an AES-256 key with mobile Internet of things equipment to enable the mobile Internet of things equipment to pass through an encryption channel generated by the AES-256 key, and identifying the true identity of the mobile Internet of things equipment Device first hash public key Hash value of chameleon with equipment And sending the first hash public key to a law enforcement agency, wherein the first hash public key is used for the device A matrix generated for the device hash public key using a GPV algorithm; Setting effective registration time for mobile internet of things devices ; The short base is added True identity as a private key of a lattice signature Device first hash public key Device chameleon hash value With effective registration time Signing to obtain signature ; Will sign the signature Device first hash public key Device chameleon hash value And effective registration time Submit to the blockchain and obtain blockchain transaction address 。
- 4. The method of claim 3, wherein the mobile internet of things device performs mutual authentication with the edge node, comprising: the mobile Internet of things equipment acquires common parameters, wherein the common parameters comprise the number of rows of a system matrix Array number of system matrix Upper error bound Number of key agreement matrix rows Number of key agreement matrix columns Dimension extension Sum modulus , , , ; Mobile Internet of things device generation device hash public key Equipment trapdoor Wherein the mobile internet of things device first hash public key For matrices generated using GPV algorithms, device trapdoors First hash public key for device Is used for the preparation of a polymer, A device second Ha Xigong key representing a mobile internet of things device; Random selection secret matrix for mobile internet of things device Error matrix Auxiliary error matrix And a common parameter matrix And record the current time generation time stamp Wherein, the method comprises the steps of, 、 、 Respectively represent the mould On integers of A set of dimension matrices, Dimension matrix set A dimension matrix set; mobile Internet of things device based on secret matrix Matrix And error matrix Computing device key agreement matrix ; Mobile Internet of things device based on secret matrix Key negotiation matrix Auxiliary error matrix Calculate the original negotiation value ; The mobile internet of things device is based on the original negotiated value Dimension extension Sum modulus Computing key agreement assistance values ; The mobile internet of things device is based on the original negotiated value Dimension extension Modulus of And a time stamp Calculating a first response value ; The mobile internet of things device sends a first message to the edge node, wherein the first message comprises a matrix Time stamp Device key negotiation matrix First response value And mobile internet of things device pseudonyms The pseudonym Based on transaction addresses Challenge value Generating the matrix Based on device second Ha Xigong keys And a common parameter matrix Generating; Edge node inspection time stamp And after passing the check, based on the matrix Device key negotiation matrix And a time stamp Restoring challenge values ; Edge nodes are based on challenge values And the pseudonym Acquiring transaction addresses And based on transaction addresses Obtaining a device chameleon hash value of a mobile internet of things device And device first hash public key ; The edge node is based on the device second Ha Xigong key And device chameleon hash value Carrying out identity verification on mobile Internet of things equipment, and recording current time to generate a time stamp under the condition that the identity of the mobile Internet of things equipment passes the verification ; Edge node usage System trapdoor Calculating a second response value Using pseudonyms Time stamp Key negotiation matrix Secret matrix Calculating the current session key Using pseudonyms Time stamp And the current session key Calculating hash values Thereafter, a second message is sent to the mobile Internet of things device Wherein the second message comprises a second response value Time stamp And hash value ; Mobile internet of things device inspection time stamp And after the checking is passed, based on the system chameleon hash value And verifying the identity of the edge node by the system hash public key; In case the identity of the edge node is verified, a pseudonym is used Time stamp System key negotiation matrix Secret matrix Calculating the current session key Using pseudonyms Time stamp And the current session key Calculating hash values ; At the hash value And the hash value Under the condition of equality, the mobile internet of things equipment calculates a first message Second message And the current session key Hash value of (a) And the hash value is used for Transmitting to the edge node; Edge node calculates a first message Second message And the current session key Hash value of (a) ; At the hash value And hash value Under the condition of equality, mobile Internet of things equipment is completed And the edge node, and use this session key between mobile internet of things equipment and the edge node Communication is performed.
- 5. The method of claim 4, wherein the transaction address is based on Obtaining a device chameleon hash value of a mobile internet of things device And device first hash public key Comprising: The mobile Internet of things equipment Based on transaction address when in the just-started stage or the cross-domain movement stage Acquiring mobile internet of things device from blockchain Device chameleon hash value of (c) ; The mobile Internet of things equipment Transaction address based when in intra-domain fast handover authentication phase Acquiring mobile internet of things devices from adjacent edge nodes Device chameleon hash value of (c) 。
- 6. The method of claim 1, wherein when the domain authority discovers malicious behavior of any mobile internet of things device, the law enforcement agency traces back to the mobile internet of things device in conjunction with the correspondence, comprising: when a domain management mechanism discovers malicious behaviors of mobile internet of things equipment, the domain management mechanism hashes the equipment chameleon of the mobile internet of things equipment Reporting to law enforcement agencies; Law enforcement agency use of device chameleon hash values Querying on a blockchain to obtain a transaction address Combining the corresponding relation between the true identity of the mobile Internet of things equipment and the blockchain transaction address to find the identity information of the mobile Internet of things equipment 。
- 7. The method of claim 1, wherein after the law enforcement agency traces back to the mobile internet of things device in conjunction with the correspondence, the method further comprises: the domain management mechanism sends the hash value containing the device chameleon to the subordinate edge node in the domain Is a revocation message of (a); The edge node, after receiving the revocation message, deletes the entry stored locally relating to the device chameleon hash value An entry for (a); Law enforcement agency hashes device chameleon on blockchain through intelligent contracts Transaction addresses involved Set to an invalid value.
- 8. Anti-quantum traceable anonymous authentication system oriented to mobile internet of things, which is characterized by comprising: law enforcement agency for generating system hash public key and key negotiation matrix System chameleon hash value System trapdoor And broadcasting system hash public key and system chameleon hash value Broadcasting, system trapdoor And secret matrix Issuing to an edge node via a domain authority, wherein the key agreement matrix Matrix based on random selection Secret matrix And error matrix Generating, obtaining a blockchain transaction address corresponding to the mobile Internet of things equipment through interaction with the mobile Internet of things equipment Then, the corresponding relation between the true identity of the mobile Internet of things equipment and the blockchain transaction address is locally stored, and the blockchain transaction address is stored Key negotiation matrix Matrix When the domain management mechanism finds out the malicious behavior of any mobile Internet of things device, the law enforcement mechanism traces back to the mobile Internet of things device by combining the corresponding relation; Domain management mechanism for trapdoor of system And secret matrix The malicious behavior of any mobile Internet of things equipment is found; an edge node for authenticating a mobile internet of things device; the mobile Internet of things equipment is used for enabling law enforcement agencies to acquire blockchain transaction addresses corresponding to the mobile Internet of things equipment through interaction with the law enforcement agencies And authenticating the edge node.
- 9. A computer device comprising a processor and a memory storing computer program instructions that when executed implement the mobile-networking oriented anti-quantum traceable anonymous authentication method of any of claims 1-7.
- 10. A computer readable storage medium, having stored thereon computer program instructions, which when executed by a processor, implement a mobile-networking oriented anti-quantum traceable anonymous authentication method according to any of claims 1-7.
Description
Anti-quantum traceable anonymous authentication method and system for mobile Internet of things Technical Field The invention belongs to the technical field of identity authentication and tracking, and relates to an anti-quantum traceable anonymous authentication method and system for mobile Internet of things. Background With the continuous evolution of the internet of things technology and the development of quantum computing capability, the future internet of things security system is facing unprecedented challenges. Under the quantum computing model, equal-quantity sub-attack means of the Shor algorithm and the Grover algorithm can cause fundamental threat to the traditional password mechanism constructed based on the problems of large integer decomposition, discrete logarithm and elliptic curve difficulty, so that the existing widely deployed identity authentication and key management scheme is difficult to be continued in the aspect of long-term security. Under the background, the construction of the Internet of things security mechanism with quantum security resistance becomes a key requirement for guaranteeing the sustainable operation of the system. Typical mobile internet of things devices include networked vehicles, networked vessels, unmanned aerial vehicles, and the like. Such devices generally have the problems of limited computing power, limited storage resources, low communication bandwidth and the like, and are difficult to directly deploy a cryptographic algorithm with high computing complexity. In the existing research, public Key Infrastructure (PKI) is still an important technical basis for identity authentication of the internet of things, but the security of the public key infrastructure is mainly dependent on the mathematical difficulty problem under a classical computing model, and the public key infrastructure is at risk of being efficiently cracked in a quantum computing environment. Although some researches try to alleviate this problem by introducing an anti-quantum cryptography algorithm, in the mobile internet of things scenario, many challenges still exist how to consider the resource-limited characteristics and privacy protection requirements while guaranteeing the post-quantum security. For example, some schemes rely on a centralized entity in the key generation and management process, possibly introducing key escrow and single point failure risks, and some schemes can hide the true identity of the device, but there are still features which can be correlated between authentication messages, so that it is difficult to effectively resist adversaries with quantum computing and large-scale analysis capabilities. Under the above background, an identity authentication scheme integrating an anti-quantum cryptography mechanism and a blockchain technology gradually becomes a research hotspot. The anti-quantum cryptography algorithm is constructed based on the problems of grid, hash or coding, and the like, the security can still be kept under a quantum computing model, and the blockchain records the equipment identity and authentication related data through a distributed account book, so that single-point failure and centralized trust risk can be effectively avoided. The authority of each party is subjected to refined constraint by means of intelligent contracts, and the scheme can provide safe, auditable and efficient identity authentication support for mobile Internet of things equipment in a scene of complex network environment and facing the requirements of rear quantum security. Such schemes typically involve implementation scenarios and participants 1) mobile internet of things device D, responsible for generating authentication information related to updating device identities and interacting with external entities. 2) The edge node N is deployed at the edge of the network, has stronger computing and storage capacity and numerous numbers, and is responsible for data aggregation, quantum signature resistance or verification operation and partial authentication logic, so that the burden of the equipment end is obviously reduced. 3) And the domain management mechanism RSM is used for supervising the equipment and authentication behavior in the specific network domain, and only has blockchain reading authority for auditing and state monitoring, so that trust risk caused by excessive centralization is avoided. 4) Law enforcement agency LEA has read and write rights of blockchain and is responsible for identity revocation and update of abnormal equipment and intervention, evidence collection and responsibility tracing under special events. 5) The blockchain BC is commonly maintained by law enforcement agencies and domain management agencies, and a trusted infrastructure is provided for quantum identity authentication under the cooperation of multiple participants by utilizing the characteristics of decentralization, non-tampering and public verifiability of the blockchain BC. Howev