Anonymous participant identity-based signcryption method for multiple receivers

A multi-receiver and participant technology, which is applied in the field of multi-receiver signcryption where the identity of the participant is anonymous, can solve problems such as poor security

Inactive Publication Date: 2013-10-23
XIDIAN UNIV +1
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the disadvantages of poor security of existing multi-receiver signcryption me...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous participant identity-based signcryption method for multiple receivers
  • Anonymous participant identity-based signcryption method for multiple receivers
  • Anonymous participant identity-based signcryption method for multiple receivers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] refer to figure 1 The present invention will be described in detail.

[0033] Glossary.

[0034] TTP: Trusted third party, often acted by the key generation center, responsible for generating the private key of the sender and receiver;

[0035] z: system security parameters selected by the trusted third-party TTP;

[0036] q: a large prime number selected by the trusted third-party TTP, satisfying q>2 z ;

[0037] G 1 : The q-order additive cyclic group selected by the trusted third-party TTP;

[0038] G 2 : The q-factorial cyclic group selected by the trusted third-party TTP;

[0039] e: G selected by the trusted third-party TTP 1 and G 2 The bilinear map on e:G 1 ×G 1 →G 2 ;

[0040] A→B: mapping from domain A to value domain B;

[0041] P:G 1 The generator on is randomly selected by the trusted third-party TTP;

[0042] s: system master key, randomly selected by the trusted third-party TTP;

[0043] Z q * : non-zero multiplicative group based on pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous participant identity-based signcryption method for multiple receivers, solving the technical problem that the safety of the current signcryption method for multiple receivers is poor. The technical scheme comprises the steps of (1) sender signcryption: a sender IDs selects n authorization receivers ID1, ID2, ellipsis, IDn, builds an authorization receiver identity information list L={ID1, ID2, ellipsis, IDn}, constructs a signcryption ciphertext C=<Y, X, U, sigma, W, T, J>, and broadcasts the signcryption ciphertext C so as to complete signcryption operation; and (2) receiver decryption: a receiver IDi calculates h'=H4 (sigma, X, U, T, J) according to elements in the signcryption ciphertext C firstly, then judges whether an equation e (W, P)=e (X+h'Y, Ppub) is workable, decodes a message ciphertext sigma by using a symmetrical decipherment algorithm Dk() to obtain a cleartext M=DK(sigma), and completes the decryption process. The sender is anonymous through constructing a pseudo public key, meanwhile Lagrange's interpolation is adopted for fusing identity information of all the authorization receivers to realize that the identities of the authorization receivers are anonymous for non-authorization receivers, and the safety of the signcryption method for multiple receivers is improved.

Description

technical field [0001] The invention relates to a multi-receiver signcryption method, in particular to a multi-receiver signcryption method with anonymous participant identities. Background technique [0002] In distributed network applications (such as web conferences, round table conferences, and pay TV), in order to protect the privacy of all participants in the conversation in the communication system and ensure that the conversation content can only be decrypted correctly by authorized users, non-authorized users cannot correctly decrypt Decryption requires secure broadcast technology as support. Secure broadcast is a technology that enables one sender to securely send the same message to multiple authorized receivers, and can meet the security requirements of the above-mentioned network applications. [0003] The document "Anonymous ID Based Signcryption Scheme for Multiple Receivers, Cryptology ePrint Archive. Report 2009 / 345" discloses a multi-receiver signcryption ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 庞辽军高璐李慧贤裴庆祺
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products