Anonymous signcryption method from identity public key system to certificate public key system

A technology of identity public key and certificate public key, applied in the direction of user identity/authority verification, etc., can solve the problems of inability to realize the anonymity of message delivery, leakage of user privacy, and not wanting any third party to know the message

Active Publication Date: 2014-04-23
西安千喜网络科技有限公司
View PDF2 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, in order to protect their privacy, the sender of the message often does not want any third party to know the source of the message
In the existing signcryption method from the identity public key system to the certificate public key system, since the identity of the sender is directly exposed in the signcrypted ciphertext, the existing method cannot achieve the anonymity of the message, and the user's identity is leaked. privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous signcryption method from identity public key system to certificate public key system
  • Anonymous signcryption method from identity public key system to certificate public key system
  • Anonymous signcryption method from identity public key system to certificate public key system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] One, the mathematical theory used in the present invention and technical term description:

[0043] 1. Bilinear pairing

[0044] In the present invention, bilinear pairing is a mapping that satisfies bilinearity, non-degenerateness, and computability, and it maps two elements in the prime order group G to the prime order group G T an element in . For example, the Weil pair and Tate pair defined on supersingular elliptic curves are bilinear pairs that satisfy the condition.

[0045] 2. Hash function

[0046] A hash function is a one-way function that transforms an input of any length into a fixed-length output, which is called the hash value of the input. A secure hash function should meet the following conditions: ①The output length is fixed, generally at least 128 bits, to resist birthday attacks; ②For each given input, its hash value can be easily calculated ; ③Given a description of a hash function and a hash value, it is computationally infeasible to find the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an anonymous signcryption method from an identity public key system to a certificate public key system. The anonymous signcryption method specifically comprises the steps that parameters are randomly selected from a public key function database and system public keys and system private keys of the identity public key system and the certificate public key system are generated; a public key and a private key of a user are generated according to the public keys and the private keys and the system parameters; anonymous signcryption is performed to a message by using a bilinear pair, the private key of the user of the identity public key system and the public key of the user of the certificate public key system, and a ciphertext is sent to a receiver; the receiver performs designcryption to the ciphertext according to the bilinear pair and the private key of the receiver and simultaneously authenticates the identity of a sender. The anonymous signcryption method from the identity public key system to the certificate public key system has the advantages of simple implementation process and high transmission efficiency, and can be used for realizing the confidentiality, authentication and anonymity of information transmitted from the identity public key system to the certificate public key system.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to anonymous signcryption, in particular to an efficient anonymous signcryption method from an identity public key system to a certificate public key system, which can be used to realize the transformation from an identity public key system to a certificate public key system Confidentiality, authentication and anonymity of transmitted messages. Background technique [0002] Information security is one of the important issues facing the information society, and information security has become an important factor restricting the development of network technology. Modern cryptography is the theoretical basis of information security, and confidentiality and authentication are two important security goals in cryptography. Confidentiality of messages can be obtained by encryption with a basic cryptography technique. Encryption can be seen as a transformation that transforms r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 张应辉郑东赵庆兰任方
Owner 西安千喜网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products