Unlock instant, AI-driven research and patent intelligence for your innovation.

data encryption

A technology of secret data and data processing system, which is applied in the field of data encryption and can solve problems such as no encryption scheme

Inactive Publication Date: 2017-04-05
INT BUSINESS MASCH CORP
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] To date, there is no practical encryption scheme that enables a user possessing a ciphertext and proof that the ciphertext was efficiently computed to prove to an authenticating party that he possesses the ciphertext without revealing such an efficiently computed ciphertext

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • data encryption
  • data encryption
  • data encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 is a simplified schematic diagram of a data processing system showing the major components involved in the operation of the encryption-based techniques to be described. For the purposes of this description, consider an exemplary system 1 comprising three parties P1, P2 and P3, respectively represented by corresponding computers 2, 3 and 4 in the drawings. The computer 2 implements the encryption device of the present invention for encrypting secret data embodied in the example to be described. Computer 2 includes control logic 6 for generally controlling the operation of the computer and implementing key steps of the encryption process. The computer 2 also includes a memory 6 and a communication interface 7 for storing data used in the encryption process. Computer 3 includes control logic 8 for controlling the operation of computer 3 , memory 9 and communication interface 10 . The control logic 8 includes functionality for encrypting messages received from t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A public key encryption method and apparatus are provided for encrypting secret data under a public key in a data processing system (1). The secret data is provided as a message (m) comprising at least one element of the group pair G1, G2 satisfying the bilinear map ê: G1xG2→GT, where GT is the target group. A message (m) is encrypted using the public key to produce an encrypted message (c). Consistency component (v) is generated using encrypted message (c) and the bilinear map, such that consistency component (v) allows verification of encrypted message without revealing encrypted message. The output ciphertext (ct) includes the encrypted message (c) and the consensus component (v).

Description

technical field [0001] The present invention relates generally to data encryption, and provides methods and apparatus for public key encryption of secret data in a data processing system. Background technique [0002] Public key cryptography is basically an important cryptographic tool in any security protocol aimed at protecting data transmitted in a data processing system. Encryption schemes rely on key pairs, that is, private and public keys, which are associated with specific parties communicating in the system. A party's public key is available to all users of the scheme, while the private key is kept secret from that party. When used in a basic messaging process (where a sender wishes to communicate with a recipient while keeping the message data secret from others), the sender can encrypt the secret data via a cryptographic encoding process using the recipient's public key. Security relies on the premise that the resulting ciphertext can only be decrypted to recover...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/32
CPCH04L9/0838H04L9/0847H04L9/3073H04L9/3221H04L9/32
Inventor J·L·卡梅尼施K·哈拉兰比夫
Owner INT BUSINESS MASCH CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More