Disposable public key encryption structuring method based on fuzzy identity

A construction method, one-off technology, applied in the field of information security, which can solve the problems of inability to determine the identity of malicious users, deception, lack of traceability, etc.

Inactive Publication Date: 2014-11-19
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The purpose of the present invention is to provide a method for constructing a one-time public key signcryption based on fuzzy identity, which solves the problems existing in the prior art. The same identity will expose the user’s sensitive information; lack of traceability, the identity of malicious users cannot be determined; illegal users can forge private keys and certificates, and create signatures for spoofing; registered and non-registered users can forge signatures And other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disposable public key encryption structuring method based on fuzzy identity
  • Disposable public key encryption structuring method based on fuzzy identity
  • Disposable public key encryption structuring method based on fuzzy identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0057] One, the detailed steps of the present invention

[0058] The method of the present invention uses a computer system to complete the construction of a one-time public key anonymous signcryption based on fuzzy identity. The computer system includes user A and user B who can communicate with each other, a public key generation center PKG and a private key generation center KGC; The method steps are as follows:

[0059] Step 1, system initialization

[0060] Step S10, such as figure 2 As shown, let P be a point on the elliptic curve, and the equation of the elliptic curve is: y 3 =x 3 +ax+b, a and b are constants; G 1 , G 2 are two groups generated by P, whose order is a prime number q; among them, G 1 is the cyclic addition group, G 2 is the cyclic multiplication group, in the group G 1 , G 2 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a disposable public key encryption structuring method based on fuzzy identity. According to the method, a computer system is utilized to complete disposable public key anonymous encryption structure based on fuzzy identity and comprises a user A, a user B, a PKG (a public key generation center) and a KGC (a private key generation center), wherein two users need to send and receive messages to / from each other. The method comprises five steps: initialization, user secret key generation, disposable public key generation, encryption and decryption. Compared with the conventional method, the method has anonymity, unforgeability and traceability, and can effectively prevent disposable attack of malicious users and untrusted attack from a trusted center in the system. Meanwhile, compared with the conventional method, the method provided by the invention has relatively high calculation efficiency and relatively low communication expenditure.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a construction method of one-off public key signcryption based on fuzzy identity. Background technique [0002] The main idea of ​​Identity Based Encryption (IBE) is that users use their own user information (such as user name and network IP address) as their own public key, and the private key generation center (Key Generation Center, KGC) generates the corresponding key. The private key solves the management "bottleneck" problem of the Certificate Based Public Key Cryptosystem. In all proposed IBE schemes, the user's identity is regarded as a uniformly distributed random string. However, using identity information such as user names or IP addresses as public keys cannot meet some practical needs. Due to the outstanding advantages of uniqueness, certainty and non-forgery of biometric information, the application of biometric information in identity aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
Inventor 张龙军
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products