Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!
An identity-based cross-system proxy re-encryption method
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A proxy re-encryption and cross-system technology, applied in transmission systems, public keys for secure communications, electrical components, etc., can solve problems such as differences in ciphertext structure and public keys
Active Publication Date: 2017-04-05
BEIHANG UNIV
View PDF4 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0011] Since the IBE encryption system and the IBBE encryption system not only use different public keys, but also the ciphertext in the IBE encryption system is encrypted based on one identity, and the IBBE is encrypted based on a set of identities composed of multiple identities. The encrypted ciphertext of the two There are bound to be great differences in the structural forms. How to successfully realize the ciphertext conversion is the main problem to be solved by our invention
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment Construction
[0104] The present invention is an identity-based cross-system proxy re-encryption method, see figure 1 , 2 As shown, the method is implemented by six modules: an initialization module, a private key generation module, a data encryption module, a conversion key generation module, a proxy re-encryption module, and a decryption module. See the system flow of the entire proxy re-encryption method operation figure 2 , Combined with the flow chart, the specific implementation steps of this method are introduced as follows:
[0105] Module 1: Initialize the module
[0106] The realization of the module function is divided into four steps:
[0107] Step 1: PKG first enters the system safety parameter λ, and runs the algorithm g(1 λ ), output two groups of prime order p And a bilinear mapping operation
[0108] Step 2:
[0109] PKG then runs the random number generation algorithm and randomly selects A generator g in the group, An element h in the group, and An element α in the domai...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention provides an identity-based cross-system proxy re-encryption method. The identity-based cross-system proxy re-encryption method comprises steps run by a PKG (Private Key Generator), namely 1, inputting a coefficient lambda and outputting system parameters, 2, running a random number generation algorithm, 3, calculating bilinear pairings, and carrying out exponentiation and multiplication, 4, selecting a collision-resistant hash function and outputting a public key, 5, running the collision-resistant hash function, and 6, performing addition, calculating a reciprocal and an exponent, and outputting a private key, steps run by an authorizing party, namely 7, running the collision-resistant hash function, 8, running the random number generation algorithm and carrying out multiplication and exponentiation operations, and outputting a ciphertext, 9, selecting a blinding factor k, 10, running the collision-resistant hash function, and 11, running the random number generation algorithm and carrying out multiplication and exponentiation operations, and outputting a conversion private key, a step run by a proxy party, namely 12, calculating bilinear pairings and carrying out division, and outputting a re-encryption ciphertext, and steps run by an authorized party, namely 13, running the collision-resistant hash function, 14, calculating bilinear pairings, and carrying out addition, continuous multiplication and division, and outputting k, and 15, calculating bilinear pairings and carrying out multiplication, and outputting a plaintext.
Description
[0001] (1) Technical field: [0002] The invention relates to an identity-based cross-system proxy re-encryption method, which can realize proxy conversion of ciphertext under different encryption systems, and belongs to the field of cryptography in information security. [0003] (2) Technical background: [0004] With the improvement of communication security, a variety of cryptosystems are proposed to encrypt and transmit data to ensure the privacy and security of communication between users. Identity-based public key encryption is one of the widely used. According to whether the keys used by both parties are the same, the data encryption system is divided into two types: single key encryption system and public key encryption system; public key encryption is an encryption system opposite to single key encryption, and both emphasize The encryption algorithm can be made public, and the decryption key must be strictly kept secret. Once the key is leaked, the entire encrypted data is n...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.