Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Signcryption method from public key infrastructure environment to certificateless environment

A public key infrastructure and certificate-free technology, applied in the field of heterogeneous signcryption, can solve problems such as unusability

Inactive Publication Date: 2015-07-08
JIUJIANG UNIVERSITY
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, if the sender belongs to the PKI environment and the receiver belongs to the non-certificate environment, the above methods will not work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signcryption method from public key infrastructure environment to certificateless environment
  • Signcryption method from public key infrastructure environment to certificateless environment
  • Signcryption method from public key infrastructure environment to certificateless environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 , 2 As shown, the present invention provides a heterogeneous signcryption method from a public key infrastructure environment to a certificate-free environment, and the specific process of the present invention is as follows:

[0031] Step 1. Initialize the system in the non-certificate environment.

[0032] Security parameter k 1-1 is an integer, and the generator is P 1-1 An additive cyclic group G of 1-1 and a multiplicative cyclic group G 2-1 , the orders of both groups are prime numbers q 1-1 . e 1 :G 1-1 ×G 1-1 →G 2-1 is a bilinear map. Define a secure Hash function where {0,1} * Represents a collection of binary sequences of arbitrary bit length, Represents the additive group obtained by removing the identity element. The key generation center KGC randomly selects As the master private key, calculate P pub =sP 1-1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a signcryption method from a public key infrastructure environment to a certificateless environment, and belongs to the field of secret communications. The signcyption method comprises the steps that system initialization of the certificateless environment is conducted; system initialization of the public key infrastructure environment is conducted; a secret key of a certificateless environment receiver is generated; a secret key of a public key infrastructure environment sender is generated; the public key infrastructure environment sender generates a signcryption text sigma according to system parameters, a private key and a public key of the sender, an identity and a public key of the receiver and a message m and sends results to the receiver; the certificateless environment receiver verifies the correctness of the signcryption text sigma according to the system parameters, the public key of the sender and the identity and the public key of the receiver and decrypts the signcryption text sigma by using a complete private key of the receiver. The signcryption method from the public key infrastructure environment to the certificateless environment can achieve that the sender of the public key infrastructure environment sends the signcryption text to the receiver of the certificateless environment and provides confidentiality and authentication for the receiver of the certificateless environment; the features that the authentication can be verified publicly and a sharing system and common parameters of the receiver and the sender are not necessary are achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a heterogeneous signcryption method from a public key infrastructure environment to a certificate-free environment. Background technique [0002] In 1976, Diffie and Hellman proposed the concept of public key cryptosystem. Compared with the symmetric cryptosystem, the public key cryptosystem has two significant advantages: key distribution is simple, and digital signature is easy to realize. Public key cryptography has two keys, a public key and a private key. The public key can be made public, and the private key is kept secret. Since the public key has no direct relationship with the user's identity, a trusted third party—the Certificate Authority (CA) is required to issue a certificate to bind the user's public key with its identity information, so it is necessary to establish a set of Public Key Infrastructure (Public Key Infrastructure, hereinafte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30
Inventor 周才学
Owner JIUJIANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products