Unlock instant, AI-driven research and patent intelligence for your innovation.

An Identity-Based Elastic Leakage Resistant Encryption Method

An encryption method and flexible technology, which is applied to the public key and key distribution of secure communication, can solve the problems of high calculation cost of encryption steps, long public key and private key, and low relative key leakage ratio. Effects of shortness, efficiency improvement, and calculation reduction

Active Publication Date: 2017-09-19
马鞍山城智信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] Aiming at the problems existing in the prior art, the calculation cost of the encryption step is very high, the operation efficiency is low, the index operation is many, the key public key and private key are long, and the relative key leakage ratio is low, the present invention provides an identity-based Resilient Leakage Resistant Encryption Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Identity-Based Elastic Leakage Resistant Encryption Method
  • An Identity-Based Elastic Leakage Resistant Encryption Method
  • An Identity-Based Elastic Leakage Resistant Encryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] The present invention is improved on the basis of Gentry's IBE scheme and the Elastic Leakage IBE scheme of Alwen et al. The improved scheme has lower calculation cost, shorter key (public key / private key) length and Higher relative key leak ratio.

[0049] Let's first explain the related concepts:

[0050] 1. Bilinear Pairing

[0051] Here is a brief introduction to the basic definition of a bilinear map and the properties it needs to satisfy.

[0052] Let G and G T are two multiplicative cyclic groups of the same order p, where p is a large prime number. g is the generator of the group G, and the computable bilinear map (Bilinear Map) e:G×G→G T has the following properties:

[0053] (1) Bilinearity: For any u, v∈G and a, b∈Z p , all have e(u a ,v b )=e(u,v) ab ;

[0054] (2) Non-degeneracy: For the generator g of G, e(g,g)≠1 is obtained;

[0055] (3) Computability: There is an effective polynomial time algorithm that can calculate e(u,v)∈G T , where u, v∈G...

Embodiment 2

[0119] The following will describe the application of the above-mentioned encryption system according to the present invention in an enterprise.

[0120] According to the steps of the present invention, when the encryption system of the present invention is used in XXX company, the work card number of each employee of XXX company can be regarded as an employee U, whose identity information is id, and the user private key generation module according to the system parameters and id to generate the private key sk of the user U id , and stored in the personal card with the employee.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based anti-elastic leakage encryption method, which belongs to the field of data encryption. An identity-based anti-resilient leakage encryption method, including two modules: a trusted third-party private key generation center module and a user module, wherein the trusted third-party private key generation center module includes an online task distributor and a key generator, online The two-way connection between the task distributor and the key generator is through a secure channel; the user module is a user terminal, including a ciphertext verifier, an encryptor, and a decryptor; the user data is encrypted and decrypted using system settings, encryption steps, and decryption steps For the decryption operation, the present invention can greatly reduce the calculation cost of the encryption equation, improve the operation efficiency of the whole system, and has shorter key length and higher relative key leakage ratio.

Description

technical field [0001] The invention relates to the field of data encryption, and more specifically relates to an identity-based anti-elastic leakage encryption method. Background technique [0002] In the traditional public key cryptography system, the public key certificate infrastructure PKI (Public Key Infrastructure) is mainly used to verify the correlation between the public key and the identity of the user. The association between the user identity and the public key is realized through the public key certificate issued by the certification authority (Certification Authority: CA). The certificate management process in this way requires high computing overhead and storage overhead. [0003] The idea of ​​identity-based cryptosystem was first proposed by Shamir in 1984. In this system, the public key is the user's identity information (or directly derived from the user's identity information), such as the IP address of a host in the network or the email address of a u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L9/08
Inventor 李继国陈超东张乐
Owner 马鞍山城智信息技术有限公司