Proxy re-encryption method for multicast communication

A proxy re-encryption and re-encryption technology, applied in key distribution, can solve problems such as large delay, bottleneck of group controller, and complicated calculation, and achieve the effect of improving security, resisting collusion attacks, and improving efficiency.

Inactive Publication Date: 2018-04-24
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of the first type of scheme is that as the size of the group members increases, the group controller will become a bottleneck
The disadvantage of the second type of scheme is that the calculation is complex and the delay is large, and it is difficult to apply to large-scale dynamic groups with frequent changes in membership.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy re-encryption method for multicast communication
  • Proxy re-encryption method for multicast communication
  • Proxy re-encryption method for multicast communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0040] see figure 1 , 2 , shown in 3, the multicast communication of the present invention uses the proxy re-encryption method to comprise the following steps: Step 1: system initialization; The sender sets security parameters, and broadcasts the security parameters to all agents and deputies;

[0041] The sender or a unified secure communication platform is responsible for setting the security parameters. Broadcast to all users after parameter setting. The system parameters to be set are as follows: k is a safety parameter, which is a function of p and l, p is a prime number, G and G T are two multiplicative cyclic groups of order p, g and g' are two independent generators of the group G, h 3 (.):G 2 ×G T ×{0,1} l ×G 2 →G is three hash functions, e:G×G→G T means G to G T The bilinear map of {0,1} * Represents a string of 0, 1 of any length, is a multi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a proxy re-encryption method for multicast communication, comprising the following steps: 1: the sender sets security parameters, and broadcasts the security parameters to all users; 2: independently selects a private key, and generates a public key according to the private key And make public the public key; 3: The sender performs hash function operation and bilinear pairing operation on the encrypted plaintext according to the security parameters and the public key of the agent to generate a first-level ciphertext; 4: The sender uses the security parameters and the proxy public key, generate a re-encryption key, and send it to the third-party agent; five: the third-party agent re-encrypts the first-level ciphertext according to the re-encryption key, generates a second-level ciphertext, and sends the second-level ciphertext to Agent; Six: The principal and the agent respectively decrypt according to the private key to obtain the plaintext. The invention can achieve the security of chosen ciphertext attack, and can be completely disclosed through the proxy re-encryption key, which is generated by the sender, which can resist collusion attack and improve the security of plaintext.

Description

technical field [0001] The invention relates to the field of data security communication, in particular to a proxy re-encryption method for multicast communication. Background technique [0002] With the development of wireless network technology, security group communication has become an important way of information exchange, and has a good application prospect in video conferencing, securities market release, digital content distribution and other occasions. In security group communication, there is usually one sender sending the same or different messages to multiple receivers. In order to ensure information security, the confidentiality and integrity of the sent message must first be ensured, that is, the content of the message cannot be stolen or tampered with by attackers who are not members of the communication group; The identity of the sender of the message; and forward security and backward security must be satisfied, that is, the receiver cannot obtain the conte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L12/18H04L29/06
Inventor 王绪安韩益亮孟艺超杨晓元张敏情
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products