Method and equipment for generating inextensible unidirectional proxy re-encryption key, and method and system for executing inextensible unidirectional proxy re-encryption

A non-extensible, one-way technology, used in transmission systems, public keys for secure communications, user identity/authority verification, etc.

Inactive Publication Date: 2011-06-29
NEC (CHINA) CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if that constraint happens to be not met, as stated above, the state of the art is actually insecure under the relaxed constraints
In other words, in the one-way proxy transcryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment for generating inextensible unidirectional proxy re-encryption key, and method and system for executing inextensible unidirectional proxy re-encryption
  • Method and equipment for generating inextensible unidirectional proxy re-encryption key, and method and system for executing inextensible unidirectional proxy re-encryption
  • Method and equipment for generating inextensible unidirectional proxy re-encryption key, and method and system for executing inextensible unidirectional proxy re-encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0091] In the following, the present invention will be described with reference to the accompanying drawings. In the following description, some specific embodiments are only for the purpose of description, and should not be construed as limiting the present invention in any way, but are only examples of the present invention. Conventional structures or constructions will be omitted when they may obscure the understanding of the present invention.

[0092] [Detailed scene description]

[0093] In the following, the non-extensible one-way proxy encryption (NRE) scheme according to the present invention is described in detail in comparison with references [4] and [5] which are regarded as the closest prior art of the present invention.

[0094] figure 1 is a schematic block diagram showing the various units operating in the Third Attempt of references [4] and [5]. refer to figure 1 , each unit of authorizing party Alice, agent and authorized party Bob is described as fol...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses equipment for generating an inextensible unidirectional proxy re-encryption key. The equipment comprises a re-encryption key generating unit and a strengthening unit, wherein the re-encryption key generating unit is used for acquiring a private key pair (a1, a2) of an authoring part and a public key of an authorized part and generating a unidirectional proxy key according to one private key a1 in the private key pair of the authorizing part and the public key of the authorized part; and the strengthening unit is used for selecting an adjusting factor s, acquiring the public key h of the authorizing part, and generating the inextensible unidirectional proxy re-encryption key rka-b by introducing the selected adjusting factor s, the public key h of the authorizing part and the other private key a2 in the private key pair of the authorized part according to the generated unidirectional proxy re-encryption key. In addition, the invention also discloses a method for generating the inextensible unidirectional proxy re-encryption key, and a method and a system for executing inextensible unidirectional proxy re-encryption.

Description

technical field [0001] The present invention relates to the field of computer communication network security, more specifically, to a non-extensible one-way proxy transcryption key generation method and device, and a non-extensible one-way proxy transcryption execution method and system. Background technique [0002] Proxy-to-encryption (PRE) is an encryption system with special properties, in which Alice as the authorizing party can authorize Bob as the authorized party to decrypt Alice's ciphertext. A key requirement of the PRE system is that the ciphertext transciphering operation for Bob does not require Alice's participation. Otherwise, the PRE system has no meaning of existence. [0003] To meet this critical requirement, a proxy is introduced in the PRE system, which converts Alice's ciphertext into Bob's ciphertext of the same message without seeing the plaintext. It should be noted that in the public key encryption setting, the original PRE scheme is: Alice provid...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L29/06
Inventor 曾珂
Owner NEC (CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products