Agent signcryption method and system

A proxy signcryption and proxy signature technology, which is applied in the field of proxy signcryption methods and systems, can solve the problems of a large amount of calculation of proxy signcryption schemes, easy to be impersonated, and difficult to verify proxy signcryption schemes, and achieves security. Guaranteed, removes the dependence of the secure channel, the effect of easy storage space

Inactive Publication Date: 2007-10-10
SHANGHAI JIAO TONG UNIV +1
View PDF0 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In order to solve the shortcomings in the prior art that the proxy signcryption scheme relying on the secure channel is easy to be impersonated, the proxy signcryption is difficult to ve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent signcryption method and system
  • Agent signcryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The present invention will be further described below with reference to the accompanying drawings and examples, but it is not intended to limit the present invention.

[0054] The entities involved in the technical solution of the present invention are as follows:

[0055] (1) Original sender: The entity entrusting the proxy sender to exercise the signcryption authority.

[0056] (2) Proxy sender: An entity that accepts the authorization of the original sender and sends a signcrypted message to the receiver on behalf of the original sender.

[0057] (3) Receiver: The recipient of the message sent by the proxy sender.

[0058] (4) Third party: When the proxy sender denies having sent a certain message to the receiver, the receiver can show evidence to the third party, and the third party will make a ruling.

[0059] Referring to Fig. 1, the present invention provides a kind of method of proxy signcryption, and described method step is as follows:

[0060] Step A: Set ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention solves issues that disadvantages of large amount of calculation and system security exist in current technique. The method includes steps: setting up system parameters, generating proxy cipher-signed private key, sending cipher-signed message, recovering cipher-signed message, and validating proxy cipher sign. The invention raises operation efficiency, and avoids dependence on secure channel.

Description

technical field [0001] The invention relates to the application fields of computer communication and e-commerce, in particular to a proxy signcryption method and system. Background technique [0002] In the application of computer communication and electronic commerce, confidentiality and authentication are one of the most important issues. In the prior art, the purpose of confidentiality is usually achieved by means of encryption, and the purpose of authentication is achieved by means of digital signature. In order to achieve the effect of confidentiality and authentication at the same time, the traditional method is to encrypt first and then sign or first sign and then encrypt. In 1997, Zheng proposed the concept of signcryption. The signcryption system integrates the functions of signature and encryption. Suppose Alice wants to send a message m to Bob. Alice does not want anyone other than Bob to see the message m. At the same time, Alice wants to let Bob know that the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/22H04L9/30
Inventor 曹珍富董晓蕾王琴郑志彬位继伟
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products