Short ciphertext identity-based encryption method satisfying forward security

A forward security, short ciphertext technology, applied in the field of short ciphertext identity base encryption, which can solve the problems of unobtainable and unbreakable ciphertext messages.

Active Publication Date: 2015-07-22
BEIHANG UNIV +1
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can be used to solve the security problem caused by the leakage of the private key in the identity-based encryption system. Even if the attacker obtains the private key of a legitimate user at the current moment, the attacker cannot obtain the private key of the user at the previous moment. Still unable to decipher the ciphertext message sent to the user at the previous moment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Short ciphertext identity-based encryption method satisfying forward security
  • Short ciphertext identity-based encryption method satisfying forward security
  • Short ciphertext identity-based encryption method satisfying forward security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] The short ciphertext identity-based encryption method that satisfies forward security will be described in detail below in conjunction with the accompanying drawings. The present invention is divided into 6 steps, that is, the initialization of the private key generation mechanism, the registration and authentication of the user, the generation and distribution of the initial private key, the update of the private key, encryption and decryption, see figure 1 , the specific steps of the method are as follows:

[0058] Step 1: The private key generation mechanism is initialized. The private key generation agency first specifies the total number of time slices of the system as N, and then selects two compound factorial cyclic groups G according to the system security parameter k 0 and G 1 (the order of which satisfies q=p 1 p 2 p 3 , and p 1 ,p 2 ,p 3 are three different large prime numbers, and the subgroups of G are ), and there is a symmetric bilinear map e on...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a short ciphertext identity-based encryption method satisfying forward security. The short ciphertext identity-based encryption method includes six steps of 1) initializing a private key generating mechanism; 2) registering and authenticating users; 3) generating and issuing initial private keys; 4) updating the private keys; 5) encrypting; 6) decrypting. On the basis of the identity-based encryption mechanism, forward security is realized, the users can independently update private keys, loss caused by revealing of the private keys can be effectively reduced, and the short ciphertext identity-based encryption method is applicable to the communication encryption solution scheme in the open network environment and non-secure devices. In addition, ciphertext is short and fixed in length, encryption and decryption cost low, authentication link is omitted for decryption, and encryption and decryption are high in efficiency, so that the short ciphertext identity-based encryption method has wider application range in actual application.

Description

(1) Technical field [0001] The invention relates to a short ciphertext identity-based encryption method satisfying forward security, which can effectively reduce the security threat caused by the leakage of a private key, and belongs to the field of public key encryption system. (2) Background technology [0002] Today, with the rapid development of digitalization, information security has gradually become an important issue, and data encryption is an important means to ensure information security. Modern data encryption systems include two basic encryption systems: symmetric encryption and asymmetric encryption. Among them, asymmetric encryption is also called public key encryption. Encryptors and decryptors use asymmetric keys to encrypt and decrypt data during the communication process, without prior key negotiation, which reduces the security requirements for communication channels. Therefore, public key encryption has been widely used. [0003] In the traditional publ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 刘建伟艾倩颖王志学李妍
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products