Authentication method by broadcast signature and ciphering

An authentication method and user key technology, applied in the field of broadcast signcryption authentication, can solve the separation of information confidentiality and authentication, information confidentiality, authentication and non-repudiation functions have not been fundamentally solved, transmission communication Excessive cost, etc.

Inactive Publication Date: 2009-08-12
SHIJIAZHUANG RAILWAY INST
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This research mode almost directly applies a single information signcryption transmission method to the broadcast system, which will inevitably bring about major limitations, such as high calculation costs, excessive transmission and communication costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method by broadcast signature and ciphering
  • Authentication method by broadcast signature and ciphering
  • Authentication method by broadcast signature and ciphering

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention is described in further detail below in conjunction with accompanying drawing:

[0026] Different from the point-to-point information transmission method, the method of the present invention broadcasts the sign-encrypted video, audio, streaming media data and other message content to a specific user group through broadcasting, and the user decrypts the message through the key, and can To authenticate the message, its system structure is as follows figure 1 shown, where B 1 , B 2 ,......,B m For broadcast center, U 1 , U 2 ,......, U n For users (receivers), broadcast center B 1 and B 2 For example, B 1 message m 11 , m 12 , m 13 Respectively signcrypt broadcast to user U 1 , U 2 , U 3 , B 3 message m 31 , m 34 , m 36 Respectively signcrypt broadcast to user U 1 , U 4 , U 6 ; This broadcasting method can make full use of communication bandwidth, save costs, and greatly improve communication efficiency.

[0027] The broadcast si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a broadcast signcryption authentication method, which comprises the following steps that: 1) system parameters are set; 2) a broadcast center calculates public key signature according to the parameters, and uses a user secret key to encrypt message to be broadcasted; 3) the broadcast center broadcasts the encrypted message acquired in step 2) to a user group; and 4) the user receives the encrypted message broadcasted in the broadcast center, uses a private key to decrypt the signature and verifies the validity of the signature. The method carries out two-layer confidential encapsulation of signature and encryption for the message, and broadcasts and mass-sends different messages to a group of users in once broadcast; and only specific authorized users can receive the designated message; therefore, the method has high-strength information confidentiality, signcryption information unforgeability and signcryption information non-repudiation. The method can regulate legal user groups at any time according to actual demand, but does not need to newly distribute new shared secret keys, has high flexibility, can make full use of communication bandwidth, saves cost, and greatly improves the communication efficiency.

Description

technical field [0001] The invention relates to the field of information broadcast communication, in particular to a broadcast signcryption authentication method. Background technique [0002] With the rapid development of modern society, broadcast encrypted transmission of media information has become an important information sharing method, which allows information senders to transmit encrypted data to a group of receivers, and only specific authorized users can decrypt and obtain information. This broadcast encryption authentication technology has broad application prospects, such as paid cable TV system, video and audio network broadcast, video conference and securities real-time market release and other occasions have good application prospects. [0003] Usually, the confidentiality of data is realized through encryption, and the authentication is realized through digital signature. In the traditional signature-encryption method, the information sender implements the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30H04L9/32H04L12/18
Inventor 綦朝晖綦小芹王书海樊金生王建民
Owner SHIJIAZHUANG RAILWAY INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products