Method for constructing certificateless public key cryptography

A public key cryptography, certificateless technology, applied in the direction of public key of secure communication, user identity/authority verification, etc. Effect

Inactive Publication Date: 2011-09-28
北京中兴通德科技创新有限公司
View PDF3 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Correspondingly, the ciphertext generated by the identification cryptosystem can be decrypted in the key center, and there is a risk of information leakage
The second is the problem after the user ID private key is lost
In the traditional public key system, the user's identity and the public key are bound together. If the user's private key is lost, the user can regenerate a pair of public key and private key. In the identity cryptography system, the user's identity is the public key, so it cannot It is revoked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for constructing certificateless public key cryptography
  • Method for constructing certificateless public key cryptography
  • Method for constructing certificateless public key cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Various details involved in the technical solution of the present invention will be described in detail below in conjunction with specific embodiments. It should be pointed out that the described embodiments are only intended to facilitate the understanding of the present invention, rather than limiting it in any way.

[0051] Take the randomizable signature BBS04+ proposed by Zhou-Lin in "Unlinkable Randomizable Signature and Its Application in Group Signature" (Inscrypt'07, LNCS 4990, pages 328-342, 2008) as an example.

[0052] The steps to build the system are as follows:

[0053] Step 1. The key center selects the BBS04+ signature scheme;

[0054] Step 2. Select the private key of the key center as sk c =x, the public key of the key center is pk c ={p,g,g 1 , h 1 , e, w, G 1 , G 2}, where w=g 1 x , e is G 1 ×G 1 to G 2 bilinear map of

[0055] The key generation steps are as follows:

[0056] Step 1. Obtain the initial private key of identification: t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for constructing a certificateless public key cryptography, which aims to solve the problem of private key hosting of an identification cryptography. Compared with other similar methods, the method is universal, and signature and encryption schemes with relatively higher security can be easily obtained by the construction method. The method comprises a system establishment method, a key generation method, a signature and verification method and an encryption and decryption method. In the system establishment method, an unlinkable randomizable signature is utilized. The key generation method comprises an initial identification private key obtaining step, a current identification private key generation step, a user public and private key setting step and thelike. The signature and verification method comprises a temporary identification private key generation step, a signature generation step, a signature verification step and the like. The encryption and decryption method comprises a public key acquisition and encryption step, a step of performing decryption by utilizing a corresponding private key, and the like.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to public key encryption technology and identification or identity-based encryption technology. Background technique [0002] Public key cryptography is a widely used technology for encrypting files, messages and other information sent to designated recipients. The system using this cryptographic technology needs to generate a pair of mathematically related public key and private key for each user. The public key is publicly released in a certain way, so that any sender can obtain the receiver's public key and private key. It is then kept secret by the recipient. [0003] An important security requirement in the application of public key cryptography is to ensure that the public key used exactly belongs to the designated recipient, that is, a security mechanism that binds user identification (ID) and its public key is needed. [0004] In traditional public key crypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 周苏静王勇刚
Owner 北京中兴通德科技创新有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products