Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Certificateless multi-proxy signcryption method with forward secrecy

A forward security, certificateless technology, applied in the forward security certificateless multi-agent signcryption field, can solve the problems of not taking into account the loss of the private key and the agent key, and the security cannot be guaranteed, reducing the The effect of system overhead

Inactive Publication Date: 2014-03-12
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing multi-agent solutions are based on certificates or identities, and most of them do not take into account the loss of the private key of the original signcryptor, the private key of the proxy signcryption group member group, and the loss of the proxy key, or even the loss of the session at the current stage. The security of the scheme in the case of the loss of the secret key, that is, strong forward security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless multi-proxy signcryption method with forward secrecy
  • Certificateless multi-proxy signcryption method with forward secrecy
  • Certificateless multi-proxy signcryption method with forward secrecy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the purpose, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0019] For ease of understanding, relevant parameters or representation symbols of the present invention are described:

[0020] m and c indicate text message and ciphertext respectively; H, H 1 ,H 2 ,H 3 ,H 4 respectively refer to five different safe monomial functions; H t (a,b), 1≤t≤4 means: the function operation of this single item contains elements a, b; H t (a□b), 1≤t≤4 means: this single hash function operation includes the result of the connection operation of elements a and b. point to Z q The set of all modular multiplication invertible elements in , Z q Refers to the residual class ring, q is any prime number; {0,1} n Refers to the collection of all strings of length n bits composed of 0 and 1; {0,1} * Refers to the set of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the fields of communication data authentication and privacy in a wireless network and provides a certificateless multi-proxy signcryption method with forward secrecy. An original signcrypter private key is constantly updated in a dynamic updating stage, and a proxy secret key is constantly updated too, a signcryption public key is unchanged in a whole process; furthermore, the private key is updated through a secrete key updating algorithm which is an one-way function; therefore, system overhead under a condition of higher security is reduced due to addition of a certificateless cryptosystem, thus meeting requirements of an original multi-proxy signcryption system on security, strong identifiability, public verification, strong non-repudiation and abuse resistance; in addition, the method can meet higher requirements on forward secrecy and strong unforgeability.

Description

technical field [0001] The invention belongs to the field of authentication and security of communication data in a wireless network, and in particular relates to a forward-secure non-certificate multi-agent signcryption method. Background technique [0002] In the application of computer communication and electronic commerce, confidentiality and authentication are one of the most important issues. In 1997, Zheng proposed the concept of signcryption. The signcryption system integrates the functions of signature and encryption, and realizes the functions of encryption and signature in one step. In 1999, Gamage et al. first proposed a proxy signcryption scheme, namely a The original signer can designate a proxy signcryptor as its proxy, and the proxy signcryptor generates an effective proxy signcryption process for the authorized message on behalf of the original signcryptor. However, in real life, it is often necessary for the original signcryptor to grant rights to multiple...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/02H04W12/06H04W12/041
Inventor 李方伟余航朱江冯德俊李立马安君
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products