Secret key generating method based on identity encryption

A technology of key generation and identity encryption, which is applied in the field of information security, can solve the problems of heavy operation burden of traditional servers, and achieve the effect of reducing the operation burden

Inactive Publication Date: 2012-09-26
SUZHOU UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Considering that there may be many users conducting encrypted communication at the same time, the traditional server will have a heavy operational burden

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key generating method based on identity encryption
  • Secret key generating method based on identity encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0016] see figure 1 , the present invention provides a key generation method based on identity encryption, comprising the following steps:

[0017] The user selects the identity ID and sets the access password on the client, randomly generates a session key, and encrypts the session key with the server domain name as the public key, and the session key generates the key containing the identity ID and the access password Request encryption and send a key generation request to the key distribution server;

[0018] The key distribution server decrypts the request data, returns to the client the message that the application has been received, and se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secret key generating method based on identity encryption. The method comprises the following steps: a user requests a secret key distributor to generate a secret key according to identity (ID) and an access password, the secret key distributor decrypts request data and returns a message showing that the request is received and sends the request to a secret key generating server after a specific time interval, the secret key generating server generates a secret key, and the user acquires the secret key. By adopting the manner, the secret key generating method based on identity encryption has the advantages of guaranteeing secrete key security and reducing operation burden.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity-based encryption key generation method. Background technique [0002] In traditional public key cryptography, the public key is a random string that has nothing to do with the identity. There is a problem of how to confirm the authenticity of the public key. It is necessary for the public key infrastructure to be bound in the form of a public key certificate issued by a trusted third-party identity authentication agency. To determine the public key and identity information, it is also necessary to maintain the corresponding relationship between the public key user and its identity. When the user initiates encrypted communication, it is necessary to first search for the receiver's public key in the corresponding relationship according to the receiver's identity, and then use the public key. key to complete the encryption. Considering that there may be man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/06H04L29/06
Inventor 罗喜召王烨
Owner SUZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products