Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity-based cross-system proxy re-encryption method

A proxy re-encryption and cross-system technology, applied in transmission systems, public keys for secure communications, electrical components, etc., can solve problems such as differences in ciphertext structure and public keys

Active Publication Date: 2017-04-05
BEIHANG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Since the IBE encryption system and the IBBE encryption system not only use different public keys, but also the ciphertext in the IBE encryption system is encrypted based on one identity, and the IBBE is encrypted based on a set of identities composed of multiple identities. The encrypted ciphertext of the two There are bound to be great differences in the structural forms. How to successfully realize the ciphertext conversion is the main problem to be solved by our invention

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-based cross-system proxy re-encryption method
  • An identity-based cross-system proxy re-encryption method
  • An identity-based cross-system proxy re-encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0104] The present invention is an identity-based cross-system proxy re-encryption method, see figure 1 , 2 As shown, the method is implemented by six modules: an initialization module, a private key generation module, a data encryption module, a conversion key generation module, a proxy re-encryption module, and a decryption module. See the system flow of the entire proxy re-encryption method operation figure 2 , Combined with the flow chart, the specific implementation steps of this method are introduced as follows:

[0105] Module 1: Initialize the module

[0106] The realization of the module function is divided into four steps:

[0107] Step 1: PKG first enters the system safety parameter λ, and runs the algorithm g(1 λ ), output two groups of prime order p And a bilinear mapping operation

[0108] Step 2:

[0109] PKG then runs the random number generation algorithm and randomly selects A generator g in the group, An element h in the group, and An element α in the domai...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identity-based cross-system proxy re-encryption method. The identity-based cross-system proxy re-encryption method comprises steps run by a PKG (Private Key Generator), namely 1, inputting a coefficient lambda and outputting system parameters, 2, running a random number generation algorithm, 3, calculating bilinear pairings, and carrying out exponentiation and multiplication, 4, selecting a collision-resistant hash function and outputting a public key, 5, running the collision-resistant hash function, and 6, performing addition, calculating a reciprocal and an exponent, and outputting a private key, steps run by an authorizing party, namely 7, running the collision-resistant hash function, 8, running the random number generation algorithm and carrying out multiplication and exponentiation operations, and outputting a ciphertext, 9, selecting a blinding factor k, 10, running the collision-resistant hash function, and 11, running the random number generation algorithm and carrying out multiplication and exponentiation operations, and outputting a conversion private key, a step run by a proxy party, namely 12, calculating bilinear pairings and carrying out division, and outputting a re-encryption ciphertext, and steps run by an authorized party, namely 13, running the collision-resistant hash function, 14, calculating bilinear pairings, and carrying out addition, continuous multiplication and division, and outputting k, and 15, calculating bilinear pairings and carrying out multiplication, and outputting a plaintext.

Description

[0001] (1) Technical field: [0002] The invention relates to an identity-based cross-system proxy re-encryption method, which can realize proxy conversion of ciphertext under different encryption systems, and belongs to the field of cryptography in information security. [0003] (2) Technical background: [0004] With the improvement of communication security, a variety of cryptosystems are proposed to encrypt and transmit data to ensure the privacy and security of communication between users. Identity-based public key encryption is one of the widely used. According to whether the keys used by both parties are the same, the data encryption system is divided into two types: single key encryption system and public key encryption system; public key encryption is an encryption system opposite to single key encryption, and both emphasize The encryption algorithm can be made public, and the decryption key must be strictly kept secret. Once the key is leaked, the entire encrypted data is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L29/06
Inventor 伍前红邓桦秦波刘建伟周云雅
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products