A Signcryption Method from Certificate-less Environment to Identity-Based Environment
A technology without certificates and environments, applied in the direction of user identity/authority verification, etc., can solve problems such as increasing the amount of calculation for users, not being applicable to the sending end and receiving end, and only satisfying external security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] see image 3 , the specific execution steps include setting system parameters, generating a key in a non-certificate environment, generating a key in an identity-based environment, signcryption, and decryption. The specific description is as follows:
[0035] (1) Set system parameters
[0036] (1.1) Let G 1 is a cyclic additive group generated by P, with order p, G 2 is a cyclic multiplicative group with the same order p, is a bilinear map. Define four secure Hash functions H 1 ,H 2 ,H 3 and H 4 . h 1 、H 3 and H 4 are all from {0,1} * map to h 2 from {0,1} * maps to {0,1} t , where {0,1} * Represents a collection of binary sequences of arbitrary bit length, Represents the additive group obtained by removing the identity element, {0,1} t Indicate that the bit length is t (t is a preset parameter, and in this embodiment, the value is set to the bit length l of the message m m ) set of binary sequences, Denotes the finite field Z p ={0,1,...,p-1} ...
Embodiment 2
[0062] see Figure 4 , the specific execution steps include setting system parameters, generating a key in a non-certificate environment, generating a key in an identity-based environment, signcryption and decryption. The main difference between Embodiment 2 and Embodiment 1 lies in the fact that the generators selected in the non-certificate environment and the identity-based environment are different.
[0063] (1) Set system parameters
[0064] (1.1) In the same way as in Example 1, set the system parameters
[0065] (1.2) Key generation center selection group G 1 A generator P of 1 and a master private key Compute the corresponding public key P pub1 =s 1 P 1 .
[0066] (1.3) Private key generation center selection group G 1 A generator P of 2 and a master private key Compute the corresponding public key P pub2 =s 2 P 2 .
[0067] (2) Generate a key for a certificate-free environment
[0068] The sender submits the identity information ID A To the key gene...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com