Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Signcryption Method from Certificateless Environment to Public Key Infrastructure Environment

A public key infrastructure and certificate-free technology, applied in the field of heterogeneous signcryption, can solve problems such as unusability

Inactive Publication Date: 2017-10-24
JIUJIANG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, if the sender belongs to a non-certificate environment and the receiver belongs to a PKI environment, the above methods will not work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Signcryption Method from Certificateless Environment to Public Key Infrastructure Environment
  • A Signcryption Method from Certificateless Environment to Public Key Infrastructure Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0036] Such as figure 1 , 2 As shown, the present invention provides a heterogeneous signcryption method from a certificateless environment to a public key infrastructure environment, and the specific process of the present invention is as follows:

[0037] Step 1. Initialize the system in the non-certificate environment.

[0038] Security parameter k 1-1 is an integer, and the generator is P 1-1 An additive cyclic group G of 1-1 and a multiplicative cyclic group G 2-1 , the orders of both groups are prime numbers q 1-1 . e 1 :G 1-1 ×G 1-1 →G 2-1 is a bilinear map. Define four secure Hash functions h 2 :{0,1} * →{0,1} l , where {0,1} * Represents a collection of binary sequences of arbitrary bit length, Represents the additive group obtained by removing the identity element, {0,1} l Indicates a set of binary sequences with a bit length l, and l i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a signcryption method from a certificateless environment to a public key infrastructure environment, and belongs to the field of secret communications. The signcyption method comprises the steps that system initialization of the certificateless environment is conducted; system initialization of the public key infrastructure environment is conducted; a secret key of a certificateless environment sender is generated; a secret key of a public key infrastructure environment receiver is generated; the certificateless environment sender generates a signcryption text sigma according to system parameters, a complete private key and public key of the sender, a public key of the receiver and a message m and sends results to the receiver; the public key infrastructure environment receiver verifies the correctness of the signcryption text sigma according to the system parameters, an identity and the public key of the sender and the public key of the receiver and decrypts the signcryption text sigma by using a private key of the receiver. The signcryption method from the certificateless environment to the public key infrastructure environment can achieve that the sender of the certificateless environment sends the signcryption text to the receiver of the public key infrastructure environment and provides confidentiality and authentication for the receiver of the public key infrastructure environment; the features that the authentication can be verified publicly and a sharing system and common parameters of the receiver and the sender are not necessary are achieved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a heterogeneous signcryption method from a certificateless environment to a public key infrastructure environment. Background technique [0002] The traditional public key cryptosystem is based on the public key infrastructure (Public Key Infrastructure, hereinafter referred to as PKI). In this cryptographic system, the public key has no direct relationship with the user's identity, so a trusted third party - Certificate Authority (Certificate Authority, hereinafter referred to as CA) is required to issue a certificate to bind the user's public key with its identity information , so it is necessary to establish a PKI system. Because the establishment of PKI requires high costs, this hinders the widespread use of PKI-based public key cryptosystems, making it only suitable for systems with a moderate number of users. [0003] The identity-based cryptosyst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30
Inventor 周才学
Owner JIUJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products