Construction method for one-time anonymous signcryption of public key

A construction method and a one-time technology, applied in the field of information security, can solve the problems of exposing sensitive information of users, lack of traceability, and inability to determine the identity of malicious users

Inactive Publication Date: 2013-09-11
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] In view of the problems existing in the above-mentioned prior art, the purpose of the present invention is to provide a construction method of one-time public key anonymous signcryption, which solves the existing problems in the prior art: excessive certificate management overhead in the certificate-based public key system; long-term Using the same identity will expose the user’s sensitive information; lack of traceability, the identity of malicious users cannot be determined; illegal users can forge private keys and certificates, and create signatures for deception; registered and non-registered users can forge signatures; in a pervasive environment The receiving side faces the threat of a one-time attack by malicious entities; it cannot resist malicious attacks by trusted centers and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction method for one-time anonymous signcryption of public key
  • Construction method for one-time anonymous signcryption of public key
  • Construction method for one-time anonymous signcryption of public key

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0062] 1. Description of symbols

[0063] The symbols involved in the text are shown in Table 1 below

[0064] Table 1 Symbol Description

[0065]

[0066]

[0067] Two, the embodiment

[0068] exist Figure 3 to Figure 7 Among them, for the convenience of explanation, i=A or B in the figure, that is:

[0069] Table 2 Figure 3 to Figure 7 Explanation of Chinese symbols

[0070]

[0071]

[0072] like figure 2 Shown: Let G 1 , G 2 are respectively the cyclic addition group and the cyclic multiplication group generated by P, P is a point on the elliptic curve, the elliptic curve is an algebraic curve, and the equation of the elliptic curve is: y 2 =x 3 +ax+b, where a and b are constants; the elliptic curve has no singularity, no sharp point or self-intersection. G 1 , G 2 The discrete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a construction method for one-time anonymous signcryption of public key and aims to complete the construction method for the one-time anonymous signcryption of the public key by the aid of a computer system. The computer system comprises a UA (user A), a UB (user B) and a TC (trusted center), and the UA, the UB and the TC are mutually communicated. The construction method includes seven steps of 1), generating computer system public key; 2), generating user partial secret key; 3), generating user secret key; 4), generating one-time public key; 5), subjecting the one-time public key to validity verification; 6), performing signcryption; 7), unsigncrypting. Compared with the prior art, the construction method has both anonymity and traceability, and can effectively prevent one-time attacks of malicious users and untrusted attacks from the TC inside a system. Meanwhile, the construction method has high computational efficiency and low communication costs as compared with conventional methods.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a construction method of anonymous signcryption with a one-time public key. Background technique [0002] Due to the openness and sharing of the network, it is vulnerable to various malicious attacks. Network users often face security issues such as passwords, account numbers and other important information disclosure, loss or damage to data integrity during communication and transmission. To protect sensitive data transmitted by users, there are usually ways such as certificate-based public key system, identity-based and blind signature. [0003] Certificate Based Public Key Cryptosystem (Certificate Based Public Key Cryptosystem) refers to the user U i According to its own private key s i Calculate and generate public key P i , and then submit a certificate application to the trusted certificate authority CA (Cerrificate Authentication) to obtain the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 张龙军夏昂郭程许钟华张璐麟
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products