Oval curve mixing signcryption method based on certificateless effect

An elliptic curve, certificateless technology, applied in the field of network information security, can solve problems such as large amount of calculation and communication cost, unreasonable and unrealizable environment with limited resources, etc., to eliminate key escrow problems, low communication cost, good safety effect

Inactive Publication Date: 2015-07-29
SHAANXI NORMAL UNIV +1
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, there are still the following problems in the use of hybrid signcryption methods in wireless sensor networks: 1) The network must have a trusted center to generate public keys for users
2) A secure channel is required to transmit secret information
3) The calculation amount

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Oval curve mixing signcryption method based on certificateless effect

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] A large prime number p selected by the key generation center, p is 2 192 -2 64 ‐1 as an example, the steps of the certificate-free elliptic curve hybrid signcryption method are as follows:

[0046] A. System initialization

[0047] (A1) The key generation center chooses a large prime number p, where p is 2 192 -2 64 -1, finite field F p The congruence equation y on 2 ≡x 3 +ax+bmodp all solutions (x,y)∈F p ×F p , together with a point O at infinity constitutes F p Elliptic curve E on :y 2 ≡x 3 +ax+b, where a,b∈F p is satisfied with 4a 3 +27b 2 ≠0 constant. E(a,b) and the point O at infinity form an additive cyclic group G p , G is the group G p A generator of .

[0048] (A2) The cryptographically secure Hash function selected by the key generation center includes: H 1 :{0,1} * → Z p * , H 2 :G p ×G p →{0,1} β , H 3 :{0,1} *2 ×{0,1} n ×G p 3 → Z p * , H 4 :{0,1} * ×G p 3 →G p , where β is the symmetric key length of a Data Encapsulatio...

Embodiment 2

[0076] A large prime number p selected by the key generation center, p is 2 224 -2 96 +1 as an example, the steps of the certificate-free elliptic curve hybrid signcryption method are as follows:

[0077] In the system initialization (A1) step of this embodiment, the key generation center selects a large prime number p, and p is 2 224 -2 96 +1, finite field F p The congruence equation y on 2 ≡x 3 +ax+bmodp all solutions (x,y)∈F p ×F p , together with a point O at infinity constitutes F p Elliptic curve E on :y 2 ≡x 3 +ax+b, where a,b∈F p is satisfied with 4a 3 +27b 2 ≠0 constant. E(a,b) and the point O at infinity form an additive cyclic group G p , G is the group G p A generator of . Other steps in Step A1 are the same as in Embodiment 1.

[0078] Other steps are the same as in Example 1.

Embodiment 3

[0080] A large prime number p selected by the key generation center, p is 2 256 -2 224 +2 192 +2 96 +1 as an example, the steps of the certificate-free elliptic curve hybrid signcryption method are as follows:

[0081] In the system initialization (A1) step of this embodiment, the key generation center selects a large prime number p, and p is 2 256 -2 224 +2 192 +2 96 +1, finite field F p The congruence equation y on 2 ≡x 3 +ax+bmodp all solutions (x,y)∈F p ×F p , together with a point O at infinity constitutes F p Elliptic curve E on :y 2 ≡x 3 +ax+b, where a,b∈F p is satisfied with 4a 3 +27b 2 ≠0 constant. E(a,b) and the point O at infinity form an additive cyclic group G p , G is the group G p A generator of . Other steps in Step A1 are the same as in Embodiment 1.

[0082] Other steps are the same as in Example 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an oval curve mixing signcryption method based on a certificateless effect. The method consists of the steps including system initialization, user private key and public key generation, partial user public key and partial user private key generation, signcryption and unsigncryption. The method solves the problems of calculation cost for certificate generation, storage, issuing, withdrawal and certificate verification, and the like in a traditional public key basic facility. The inherent private key trusteeship problem in the identity-based cryptography is eliminated, safety signal channels are not needed, the confidentiality and authentication effects can be simultaneously achieved, and the signcryption of messages with any length can be realized. The oval curve mixing signcryption method has the advantages that the safety is high, the operation efficiency is high, the communication cost is low, and the like. The method can be used for a wireless sensor network with the limited resources.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to certificateless cryptography or elliptic curve cryptography or a hybrid signcryption method. Background technique [0002] In order to achieve both confidentiality and authentication and signcryption of messages of any length, Dent proposed the concept of hybrid signcryption in 2005. Hybrid signcryption has the advantages of flexible design, high computing efficiency, and no limit on message length. It is one of the most important applications of public key cryptosystems. Hybrid signcryption consists of an asymmetric part and a symmetric part. The asymmetric part generates a symmetric key and symmetric key encapsulation under the joint action of the sender's private key and the receiver's public key, and the symmetric part is encrypted using a symmetric key and an encryption algorithm. Messages of any length. The various parts of hybrid signcryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04W84/18H04L9/08
CPCH04L9/083H04L9/3066H04W84/18
Inventor 俞惠芳杨波
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products