Method and system for certificateless and pairing-free identity-based proxy signcryption

A proxy signcryption, certificateless technology, applied in the field of cryptography, can solve the problem of no pairing identity-based proxy signcryption scheme, no certificate, etc., and achieve the effect of solving the problem of key escrow

Active Publication Date: 2014-07-02
AEROSPACE INFORMATION
View PDF3 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, there is no efficient certificateless and pairless identity-based proxy signcryption scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for certificateless and pairing-free identity-based proxy signcryption
  • Method and system for certificateless and pairing-free identity-based proxy signcryption
  • Method and system for certificateless and pairing-free identity-based proxy signcryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] The entities involved in the technical solutions described in the embodiments of the present invention are as follows:

[0023] (1) Key generation center: The key generation center is responsible for generating system parameters based on security parameters, selecting the master key, and combining the user's identity to generate the user's partial key, and send the partial key to the user through a secure channel.

[0024] (2) Sender: The sender verifies some of its keys and generates all of its keys. Combined with the agent's identity, use the private key to generate proxy information, and send the proxy information to the proxy.

[0025] (3) Proxy: The proxy verifies some of its keys and generates all of its keys. Receive the proxy information, verify the proxy information, and after the verification is passed, combine the identity of the sender, use your own private key, generate a proxy key, and use the proxy key, combined with the identity of the receiver and the ...

Embodiment 2

[0067] The specific structural diagram of a certificateless and pairless identity-based proxy signcryption system provided by this embodiment is as follows: figure 2 As shown, the following units are included:

[0068] The proxy information processing unit 21 is used to generate the private key and the public key of the sender according to the system public parameters and the identity information parameters of the sender, generate the proxy information with the private key and the public key of the sender, and send the proxy information to agent;

[0069] The message signcryption processing unit 22 is configured to generate a proxy key after verifying that the proxy information is passed by the proxy, and use the proxy key and system public parameters to signcrypt the message to be sent by the proxy Processing the signcrypted message and intermediate parameters obtained, and sending the signcrypted message and intermediate parameters to the receiver;

[0070] The message re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and a system for certificateless and pairing-free identity-based proxy signcryption. The method mainly comprises the following steps: a sender generates a private key and a public key thereof according to common parameters of the system and identity information parameters of the sender, generates proxy information based on the private key and the public key thereof, and sends the proxy information to a proxy; after the proxy information passes verification of the proxy, the proxy generates a proxy key, performs signcryption on a message needing to be sent based on the proxy key and the common parameters of the system to obtain a signcrypted message and an intermediate parameter, and sends the signcrypted message and the intermediate parameter to a receiver; and the receiver recovers the signcrypted message with the use of the intermediate parameter and the common parameters of the system to obtain a recovered message, and verifies the recovered message. The certificateless and pairing-free identity-based proxy signcryption scheme provided by the embodiment of the invention has both signature and encryption characteristics and has the feature of proxy. A key generation center only generates part of keys of a user, no certificate is needed, and the problem of key escrow is solved.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to an identity-based proxy signcryption method and system without certificates and without pairing. Background technique [0002] Diffie and Hellman introduced the public key cryptosystem into cryptography in 1976, and they also proposed the concept of digital signature. In 1977, Rivest, Shamir and Adleman publicly proposed the RSA cryptosystem, public key cryptography began to be widely used, and digital signatures can be naturally constructed and applied. Shamir proposed identity-based cryptography in CRYPTO'84 in 1984. In 2001, Boneh and Franklin proposed a scheme using bilinear pairing on elliptic curves in CRYPTO 2001. Since then, identity-based cryptography has been widely used. Development, construction of many encryption schemes and signature schemes using the tool of bilinear pairings on elliptic curves. [0003] Encryption and signature play different important role...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/08
Inventor 亓延峰郭宝安徐树民田心王申张先强
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products