Certificateless-based signcryption method and certificateless-based signcryption system

A technology without certificates and system parameters, which is applied in the field of certificateless signcryption methods and systems, and can solve problems such as low efficiency and poor security

Active Publication Date: 2015-03-04
马鞍山城智信息技术有限公司
View PDF2 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Aiming at the problems that most current certificateless signcryption schemes are implemented in an identity-based environment, and a few schemes are based on certificateless, low efficiency and poor security, the present invention provides a certificateless signcryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless-based signcryption method and certificateless-based signcryption system
  • Certificateless-based signcryption method and certificateless-based signcryption system
  • Certificateless-based signcryption method and certificateless-based signcryption system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] Let's first explain the related concepts:

[0057] Bilinear Pairing

[0058] Here we introduce the basic definition of a bilinear map and the properties it needs to satisfy.

[0059] Let P,Q∈G 1 , G 2 are two cyclic groups of order p, where p is a prime number and P is G 1 generator of . Define the bilinear map on two groups as: e:G 1 ×G 1 →G 2 , and satisfy the following properties:

[0060] Double mapping.e(aP,bP)=e(P,P) ab , for all are established.

[0061] Nondegenerate. There exists P such that e(P,P)≠1.

[0062] Computability. Efficient algorithms exist to compute e(P 1 ,P 2 ), where P 1 ,P 2 ∈G 1 .

[0063] It can be noticed that the bilinear pairing operation is commutative, because e(aP,bP)=e(P,P) ab =e(bP, aP).

[0064] 2. Difficult Problem Assumptions

[0065] Definition 1CDH (Computational Diffie-Hellman)-Problem: Given a p-order cyclic group G 1 , where p is a prime number and P is G 1 the generator of , then the group G 1 The CDH-p...

Embodiment 2

[0128] Embodiment 2 is basically the same as Embodiment 1, the difference is that the secure channel is constructed by a symmetric cryptographic algorithm, step 27, Bob verifies the equation e(P pub +q A P,Tt)=e(U,hP)e(U,PK A ), e(C 1 , P) α = W is not established, the message m is illegal, refuse to receive it.

Embodiment 3

[0130] Embodiment 3 is basically the same as Embodiment 1, except that the secure channel is constructed through a key exchange protocol.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificateless-based signcryption method and a certificateless-based signcryption system, belonging to the field of signcryption technologies. The certificateless-based signcryption method and the certificateless-based signcryption system comprise a third-party KGC (Key Generation Center partial private key generation center) and a user module, wherein the third-party module comprises an online task distributor, a partial private key generator and an Hash arithmetic unit which are connected through a secure channel; the user module comprises a user secret value generator, a user full private key generator, an offline signcryption machine, an online signcryption machine and a decipher, and the signcryption operation is carried out on a user through the steps of generating system parameters, generating a user secret value, generating a user partial private key, generating a user full private key, carrying out offline signcryption, carrying out online signcryption and decoding in sequence. According to the certificateless-based signcryption method and the certificateless-based signcryption system, signcryption effectively replaces a simple method of combining encryption and a signature through a logic unit, so that the online/offline signcryption can be implemented under the certificateless environment safely and effectively, and determination of identity of a receiver is not needed in an offline stage, and the certificateless-based signcryption method and the certificateless-based signcryption system have the advantages of high efficiency, good safety, large flexibility and strong applicability.

Description

technical field [0001] The invention relates to the technical field of signcryption, in particular, a certificateless signcryption method and system are designed. Background technique [0002] In electronic commerce, authentication and confidentiality are the most basic and important requirements. Electronic commerce inevitably involves mobile devices and smart cards. However, their physical layers are vulnerable to attacks. Therefore, some effective cryptographic protection is very necessary. However, due to the power-limited nature of these devices, it is particularly important to design low-cost algorithms. [0003] Zheng first proposed the primitive of signcryption, which has both unforgeability and confidentiality. Compared with the simple combination of signature and encryption, it has less computational complexity and lower communication cost. Malone-Lee proposed identity-based signcryption for the first time, and several identity-based signcryption schemes have bee...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 李继国张乐陈超东
Owner 马鞍山城智信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products