Certificateless multi-proxy signcryption method with forward secrecy

A forward security, certificateless technology, applied in the forward security certificateless multi-agent signcryption field, can solve the problems of not taking into account the loss of the private key and the agent key, and the security cannot be guaranteed, reducing the The effect of system overhead

Inactive Publication Date: 2014-03-12
CHONGQING UNIV OF POSTS & TELECOMM
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing multi-agent solutions are based on certificates or identities, and most of them do not take into account the loss of the private key of the original signcryptor, the private key of the proxy signcryption grou

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless multi-proxy signcryption method with forward secrecy
  • Certificateless multi-proxy signcryption method with forward secrecy
  • Certificateless multi-proxy signcryption method with forward secrecy

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0018] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments.

[0019] To facilitate understanding, the relevant parameters or symbols of the present invention are explained:

[0020] m and c indicate the text message and cipher text respectively; H, H 1 ,H 2 ,H 3 ,H 4 Respectively refer to five different safe single functions; H t (a,b),1≤t≤4 means: the function operation of this single term includes elements a,b; H t (a□b),1≤t≤4 means: this single hash function operation includes the result of the operation connected by the elements a and b. Means Z q The set of all the modular multiplication invertible elements in Z q Refers to the residual class ring, q is any prime number; {0,1} n Refers to the set of n-bit strings composed of 0 and 1; {0,1} * Refers to the collection of all strings composed of 0 and 1; Ind...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the fields of communication data authentication and privacy in a wireless network and provides a certificateless multi-proxy signcryption method with forward secrecy. An original signcrypter private key is constantly updated in a dynamic updating stage, and a proxy secret key is constantly updated too, a signcryption public key is unchanged in a whole process; furthermore, the private key is updated through a secrete key updating algorithm which is an one-way function; therefore, system overhead under a condition of higher security is reduced due to addition of a certificateless cryptosystem, thus meeting requirements of an original multi-proxy signcryption system on security, strong identifiability, public verification, strong non-repudiation and abuse resistance; in addition, the method can meet higher requirements on forward secrecy and strong unforgeability.

Description

technical field [0001] The invention belongs to the field of authentication and security of communication data in a wireless network, and in particular relates to a forward-secure non-certificate multi-agent signcryption method. Background technique [0002] In the application of computer communication and electronic commerce, confidentiality and authentication are one of the most important issues. In 1997, Zheng proposed the concept of signcryption. The signcryption system integrates the functions of signature and encryption, and realizes the functions of encryption and signature in one step. In 1999, Gamage et al. first proposed a proxy signcryption scheme, namely a The original signer can designate a proxy signcryptor as its proxy, and the proxy signcryptor generates an effective proxy signcryption process for the authorized message on behalf of the original signcryptor. However, in real life, it is often necessary for the original signcryptor to grant rights to multiple...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04W12/06H04W12/041
Inventor 李方伟余航朱江冯德俊李立马安君
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products