Proxy re-encryption method and system on basis of certificate conditions

A proxy re-encryption and conditional technology, applied in the field of information security, can solve problems such as non-simplification and complicated certificate management process

Inactive Publication Date: 2015-02-18
HOHAI UNIV
View PDF3 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the certificate-based cryptosystem is a new type of public-key key system with excellent performance and easy to apply in an open network environment, but the management process of certificates is relatively complicated, and there is a problem of not simplifying

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy re-encryption method and system on basis of certificate conditions
  • Proxy re-encryption method and system on basis of certificate conditions
  • Proxy re-encryption method and system on basis of certificate conditions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0072] The proxy re-encryption method based on the certificate condition of the present invention can be realized based on the bilinear pairing. The following briefly introduces the relevant concepts of the bilinear pairing and the properties that need to be satisfied:

[0073] Order G 1 , G 2 is a multiplicative cyclic group of order p, where p is a prime number and g is G 1 generator of . Suppose G 1 and G 2 The discrete logarithm problem on both groups is hard. Define the bilinear map on the group as: e:G 1 ×G 1 →G 2 , and satisfy the following properties:

[0074] 1. Bilinear: e(g a , g b )=e(g,g) ab , for all a,b∈Z p * and g∈G 1 are established.

[0075] 2. Non-degenerate: where 1 is G 2 unit element.

[0076] 3. Computability: There exists an efficient algorithm to compute e.

[0077] It can be noticed that e is commutati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a proxy re-encryption system on the basis of certificate conditions. The proxy re-encryption system comprises a system parameter setting module, a user key generation module, a certificate generation module, an encryption module, a proxy re-encryption key generation module, a proxy re-encryption module and a decryption module, wherein the system parameter setting module generates a system master key and system public parameters; the user key generation module generates public keys and private key pairs of various users; the certificate generation module endorses the identity of the users and the public keys and generates certificates of the users; the encryption module is used for encrypting messages and transmitting the messages to the decryption module and the proxy re-encryption key generation module; the proxy re-encryption key generation module generates proxy re-encryption keys and transmits the same to the proxy re-encryption module; the proxy re-encryption module re-encrypts original cryptographs to generate re-encryption cryptographs to be transmitted to the decryption module; the decryption module restores corresponding plaintexts. The invention further discloses a proxy re-encryption method on the basis of certificate conditions. On the premise of guaranteeing safety of the system, the original cryptographs can be flexibly subjected to proxy re-encryption, and rights of proxies are strictly controlled.

Description

technical field [0001] The invention relates to a data encryption technology for network security, in particular to a safe certificate-based conditional proxy re-encryption system and method, belonging to the field of information security. Background technique [0002] With the rapid development of information technology, there are many unsafe factors in file transmission and e-mail business dealings on the Internet, especially for some large companies and the transmission of some confidential files on the network. Pay attention to. Data encryption technology is the core and key technology to ensure the confidentiality of electronic data. It converts data into meaningless ciphertext through encryption keys and encryption algorithms, thereby preventing data from being accessed by unauthorized persons and effectively ensuring data confidentiality. sex. [0003] Decryption authorization is often encountered in real society. For example, a bank department manager applies for ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0442H04L63/0478H04L63/0884
Inventor 李继国赵雪霞张亦辰陆阳王瑶李磊沙凤杰姚伟林啸南张全领汪海萍赵晶晶郭俊石岳蓉
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products