Agent re-encryption method used for group traffic

A proxy re-encryption and re-encryption technology, which is applied to key distribution, can solve problems such as large-scale dynamic groups that are difficult to apply to membership relationships, bottlenecks in group controllers, and complex calculations

Inactive Publication Date: 2014-06-25
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF4 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the first type of scheme is that as the size of the group members increases, the group controller will become a bottleneck
The disadvantage of the second type of scheme is that the calculation is complex and the delay is large, and it is difficult to apply to large-scale dynamic groups with frequent changes in membership.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent re-encryption method used for group traffic
  • Agent re-encryption method used for group traffic
  • Agent re-encryption method used for group traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0040] see figure 1 , 2 , shown in 3, multicast communication of the present invention uses proxy re-encryption method to comprise the following steps: Step 1: system initialization; The sender sets security parameters, and broadcasts the security parameters to all agents and deputies;

[0041] The sender or a unified secure communication platform is responsible for setting the security parameters. Broadcast to all users after parameter setting. The system parameters to be set are as follows: k is a safety parameter, which is a function of p and l, p is a prime number, G and G T are two multiplicative cyclic groups of order p, g and g' are two independent generators of the group G, H 1 ( . ) : { 0,1 } ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an agent re-encryption method used for group traffic. The method comprises the following steps: step one: a sender sets safety parameters and broadcasts the safety parameters to all users; step two: a private key is independently selected, and a public key is generated according to the private key and the public key is disclosed; step three: a Hash function operation and a bilinear pairing operation are performed on a clear text to be encrypted according to the safety parameters and the public key of a principal so that a first-level cipher text is generated; step four: a re-encryption secrete key is generated by the sender according to the safety parameters and the public key of an agent and the re-encryption secrete key is sent to the third part agent; step five: the first-level cipher text is re-encrypted by the third part agent according to the re-encryption secrete key so that a second-level cipher text is generated and sent to the agent; and step six: the principal and the agent are respectively decrypted according to the private key so that the clear text is acquired. According to the method, chosen cipher text attack safety can be achieved, the secret key can be completely disclosed via agent re-encryption and the agent re-encryption secret key is generated by the sender so that collusive attack can be resisted and safety of the clear text can be enhanced.

Description

technical field [0001] The invention relates to the field of data security communication, in particular to a proxy re-encryption method for multicast communication. Background technique [0002] With the development of wireless network technology, security group communication has become an important way of information exchange, and has a good application prospect in video conferencing, securities market release, digital content distribution and other occasions. In security group communication, there is usually one sender sending the same or different messages to multiple receivers. In order to ensure information security, the confidentiality and integrity of the sent message must first be ensured, that is, the content of the message cannot be stolen or tampered with by attackers who are not members of the communication group; The identity of the sender of the message; and forward security and backward security must be satisfied, that is, the receiver cannot obtain the conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L12/18H04L29/06
Inventor 王绪安韩益亮孟艺超杨晓元张敏情
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products