Key threshold algorithm based on level identity encryption

An identity encryption and level technology, applied in the field of identity encryption, can solve the problems of security dependence and achieve the effect of enhancing security and flexibility and broad application prospects

Inactive Publication Date: 2012-07-18
FUJIAN NORMAL UNIV
View PDF1 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Gentry and Silverberg gave a complete HIBE scheme in 2002, bu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key threshold algorithm based on level identity encryption
  • Key threshold algorithm based on level identity encryption
  • Key threshold algorithm based on level identity encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The present invention is based on the key threshold algorithm of hierarchical identity encryption, such as figure 1 As shown, the algorithm includes a parameter establishment module, a private key calculation module, an encryption module and a decryption module, assuming that the maximum level of encrypted identity is ,grade i Have private key generation center KGC, identity public key is ,in , each module is implemented as follows:

[0014] The parameter establishment module outputs the main system parameters and the master key according to a set of input security secret parameters, and the master key is managed by the highest-level KGC;

[0015] The private key calculation module is graded as i -1 n i-1 KGC calculation grade i The private key of the KGC constitutes ( m i-1, n i-1 ) threshold: input public parameters, identity public key ID , arbitrary m i-1 superior master key , output ID corresponding master key and user private key , the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of identity passwords, in particular to a key threshold algorithm based on level identity encryption. A parameter establishment module, a private key calculation module, an encryption module and a decryption module are included, wherein the parameter establishment module is used for outputting a master system parameter and a master key, and the master key is managed by a highest-level KGC (Key Generation Center); the private key calculation module is used for calculating the master key and the private key at the i level by ni-1 KGCs at the i-1 level and forming a key threshold; the encryption module encrypts data M by using the public key and returns a ciphertext C; and the decryption module is used for decrypting the ciphertext C by using the private key SKID, and returning a plaintext M. Due to adoption of the algorithm, the security and the flexibility of key distribution are enhanced.

Description

technical field [0001] The invention relates to the technical field of identity encryption, in particular to a key threshold algorithm based on hierarchical identity encryption. Background technique [0002] Identity cryptography with hierarchical structure is a special kind of cryptographic protocol model, which is mainly used in secret communication between entities with different levels of authority. [0003] The characteristic of the hierarchical identity encryption system is that it divides the key management center according to different levels, each level is managed by a KGC, and the KGC can only calculate the key of the identity domain where it is located. Identity encryption can be understood as a hierarchical identity encryption system with only one level. The hierarchical identity encryption system greatly reduces the computational load of each KGC, and it allows key escrow to be completed by different levels of KGC. [0004] The core problems of hierarchical id...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
Inventor 陈志德刘中仁许力
Owner FUJIAN NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products