Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asymmetrical group encryption/decryption method based on user identity identification

A user identification and identification technology, applied in the field of asymmetric group encryption and decryption, can solve the problem of low computing efficiency of multicast encryption technology, and achieve the effect of improving encrypted communication efficiency, ensuring static security, and ensuring dynamic security.

Active Publication Date: 2012-07-04
AEROSPACE INFORMATION
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the technical problem of low computational efficiency of multicast encryption technology in the existing IBE-based asymmetric encryption system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetrical group encryption/decryption method based on user identity identification
  • Asymmetrical group encryption/decryption method based on user identity identification
  • Asymmetrical group encryption/decryption method based on user identity identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0022] figure 1 It is a structural diagram of the multicast system adopting the asymmetric group encryption and decryption method based on the user identity of the present invention, wherein the dotted line shows the IBE key generation interaction process, and the solid line shows the group encryption and decryption information interaction process, the group The encryption and decryption information is group joining request information, group member identification information, multicast information, and the like. Such as figure 1 As shown, the multicast system includes system users and a key management center 103 . Wherein, the system user includes a sending end 101 and multiple receiving ends 102 , and the sending end 101 includes a key unit 1011 and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an asymmetrical group encryption / decryption method based on user identity identification, which is realized by a multicast system. The multicast system comprises a system user and a key management centre, the system user comprises a transmitting end and a plurality of receiving ends and the transmitting end comprises a key unit and a group control unit. The method comprises the following steps that: the key management centre completes the creation of system IBE (Identity Based Encryption) parameter and distribution of system user IBE key; the group control unit completes the access of the receiving end, transmits a group member identity identification list to the key unit; the key unit generates a group encryption public key, a random session key pair and a receiving terminal key; the transmitting end decrypts the multicast information, and transmits a multicast ciphertext to the receiving end in the group; and the receiving end decrypts the multicast ciphertext according to respective private key. The method can increase the asymmetrical encryption communication efficiency in multicast mode and ensure the static safety and the dynamic safety of the multicast information.

Description

technical field [0001] The invention relates to information encryption technology in the field of network and information security, in particular to an asymmetric group encryption and decryption method in the information encryption technology. Background technique [0002] With the rapid development of network information technology, asymmetric encryption technology with PKI (Public Key Infrastructure) as the core has been widely used and developed, and has been widely used in e-commerce, e-government, online banking, online office, etc. Good application effect has been obtained in the system. D.Boneh and M.Franklin at the Crypto 2001 conference in 2001, and the "Identity Based Encryption from the Weil Pairing" paper published on "SIAM J.of Computing" in 2003, expanded a new asymmetric encryption technology Direction, that is, to achieve asymmetric encryption by using user identity. The user's public key can be any user identity that is easy for the user to remember, such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32H04L9/08H04L12/18
Inventor 宁红宙程登峰华刚张庆胜
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products