Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and system for processing cipher text

A processing method and ciphertext technology, applied in the field of communication, can solve the problems of poor scalability of public key infrastructure, no longer secure messages, and inability to support large-scale user groups, etc., to achieve good scalability, message security, and flexible processing Effect

Inactive Publication Date: 2012-04-04
HUAWEI TECH CO LTD
View PDF5 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing ciphertext re-encryption technology has defects in collusion, that is, if user B and user C collude, they can calculate part of the private key information of user A, so that the encrypted message of user A is no longer safe
[0005] At the same time, the existing ciphertext re-encryption technology relies on the public key infrastructure (PKI), and the scalability of the public key infrastructure is poor, and it cannot support a large-scale user group.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for processing cipher text
  • Method, device and system for processing cipher text
  • Method, device and system for processing cipher text

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0039] See figure 1 , is a schematic structural diagram of a ciphertext processing system according to an embodiment of the present invention. The system in this embodiment includes: a ciphertext sending end 10 , a ciphertext receiving end 20 , and a key generation mechanism 30 . Wherein, the key generation mechanism 30 is a server for key generation and issuance. In this embodiment, the ciphertext sending end 10 is marked as the user A end, and the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method, a device and a system for processing cipher text. The method comprises the following steps: selecting the random secret value by a cipher text transmitting terminal; calculating the key of the terminal according to the partial keys obtained by the terminal and the random secret value; calculating the proxy key according to the keys of the terminal and public keys published by a cipher text receiving terminal, wherein the public keys published by the cipher text receiving terminal are obtained through calculating by the cipher text receiving terminal according to the selected random secret value and public parameters of the system; and transmitting the proxy key so that the cipher text receiving terminal obtains the cipher text after being switched according to the cipher text transmitted to the cipher text transmitting terminal by the proxy key, and decrypts. After adopting the embodiment of the invention, the shortcoming of the cipher text re-encryption technology on collusion can be effectively prevented, and the safety of the information can be ensured. Simultaneously because of the realization of the invention, public key infrastructures (PKI) can be saved, and extensibility is better.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method, device and system for processing ciphertext. Background technique [0002] The ciphertext re-encryption technology is a technology that transforms the ciphertext without revealing the ciphertext information, and converts the received ciphertext into a ciphertext encrypted by the public key of the ciphertext receiving end. [0003] Specifically, suppose there are two users A and B, where the public key of user A is pk A , the private key is sk A ; User B's public key is pk B , the private key is sk B . Using the public / private key information of users A and B, a proxy key rk can be calculated AB . If user C holds proxy key rk AB , then user C can use pk A Encrypted messages are converted to use pk B An encrypted message, during the conversion process, User C cannot see the plaintext of the message. After the conversion is completed, user B can use his own ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3073H04L9/0819H04L9/0869H04L9/08H04L2209/76H04L9/30
Inventor 徐磊吴晓昕张新文
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products