Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Signcryption Method from Public Key Infrastructure Environment to Certificateless Environment

A public key infrastructure, certificateless technology, applied in the field of heterogeneous signcryption, which can solve problems such as unavailability

Inactive Publication Date: 2017-10-24
JIUJIANG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, if the sender belongs to the PKI environment and the receiver belongs to the non-certificate environment, the above methods will not work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Signcryption Method from Public Key Infrastructure Environment to Certificateless Environment
  • A Signcryption Method from Public Key Infrastructure Environment to Certificateless Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0030] Such as figure 1 , 2 As shown, the present invention provides a heterogeneous signcryption method from a public key infrastructure environment to a certificate-free environment, and the specific process of the present invention is as follows:

[0031] Step 1. Initialize the system in the non-certificate environment.

[0032] Security parameter k 1-1 is an integer, and the generator is P 1-1 An additive cyclic group G of 1-1 and a multiplicative cyclic group G 2-1 , the orders of both groups are prime numbers q 1-1 . e 1 :G 1-1 ×G 1-1 →G 2-1 is a bilinear map. Define a secure Hash function where {0,1} * Represents a collection of binary sequences of arbitrary bit length, Represents the additive group obtained by removing the identity element. The key generation center KGC randomly selects As the master private key, calculate P pub =sP 1-1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A signcryption method from a public key infrastructure environment to a certificateless environment, belonging to the field of secure communication. The sign encryption steps are as follows: system initialization in the non-certificate environment; system initialization in the public key infrastructure environment; key generation for the receiver in the non-certificate environment; key generation for the sender in the public key infrastructure environment; parameter, sender’s private key and public key, receiver’s identity and public key, and message m to generate a signed ciphertext, and send the result to the receiver; the receiver in the non-certificate environment bases on system parameters, sender’s public key, receiver’s identity and The public key verifies the correctness of the signed ciphertext and uses the receiver's complete private key to decrypt the signed ciphertext. The present invention can realize that the sender in the public key infrastructure environment sends signed ciphertext to the receiver in the non-certificate environment, and provides them with confidentiality and authentication services; and has publicly verifiable authentication and the fact that the sending and receiving parties do not need to share system public parameters features.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a heterogeneous signcryption method from a public key infrastructure environment to a certificate-free environment. Background technique [0002] In 1976, Diffie and Hellman proposed the concept of public key cryptosystem. Compared with the symmetric cryptosystem, the public key cryptosystem has two significant advantages: key distribution is simple, and digital signature is easy to realize. Public key cryptography has two keys, a public key and a private key. The public key can be made public, and the private key is kept secret. Since the public key has no direct relationship with the user's identity, a trusted third party—the Certificate Authority (CA) is required to issue a certificate to bind the user's public key with its identity information, so it is necessary to establish a set of Public Key Infrastructure (Public KeyInfrastructure, hereinafter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
Inventor 周才学
Owner JIUJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products