Certificate-free generalized proxy signcryption method

A proxy signcryption, certificateless technology, applied in the field of information security, which can solve the problems of increasing the storage key space and implementing complexity.

Inactive Publication Date: 2015-08-05
JIUJIANG UNIVERSITY
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will inevitably increase the space for storing keys in the system, the cost of managing keys, the time for verifying keys, and the implementation complexity brought to the system by implementing the two algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-free generalized proxy signcryption method
  • Certificate-free generalized proxy signcryption method
  • Certificate-free generalized proxy signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] Such as figure 1 , 2 As shown, the present invention provides a generalized proxy signcryption method based on no certificate. In the application scenario of the generalized proxy signcryption method, the original signer or signcryptor authorizes a proxy signature or signcryptor he trusts to perform on his behalf. Sign or signcrypt. For sensitive data, the proxy signature or signcryptor can use the proxy signcryption method; for other information, he can use the proxy signature method. The proxy signature or signcipher only needs to save a pair of keys and use only one algorithm, which reduces the management cost of keys and the complexity of system implementation. Concrete process of the present invention is as follows:

[0043] Step 1. System initialization.

[0044] The security parameter k is an integer, and the generator is an additive cyclic group G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention, which belongs to the secret communication field, discloses a certificate-free generalized proxy signcryption method. The method comprises: a secret key generation center sets a system parameter; the secret key generation center generates a partial private key Di; a user generates a secret value based on the system parameter and sets a complete SKi according to the partial private key Di, and calculates a public key PKi; an original signer or signcryption person generates proxy authorization by using his / her private key and public key; and after a proxy signer or signcryption person verifies the proxy authorization successfully, generalized proxy signcryption processing is carried out on a message needed to be sent based on the proxy authorization, his / her private key, a public key of a receiving part, and the system parameter and then a result is sent to the receiver to carry out generalized proxy unsigncryption processing. According to the invention, proxy signature and proxy signcryption can be realized by the proxy signer or signcryption person only by using one pair of secret keys and one algorithm and security and / or authentication can be provided for the user. Moreover, on the basis of the certificate-free cryptosystem, a problem of secret key management can be solved and the high costs of public key management can be reduced.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a certificateless generalized proxy signcryption method. Background technique [0002] In the traditional public key cryptography system, the public key is a bunch of garbled characters, so a trusted third party - Certificate Authority (Certificate Authority, hereinafter referred to as CA) is required to issue a certificate to bind the user's public key with its identity information . However, the high cost of certificate management hinders the widespread use of traditional public key cryptography. [0003] The identity-based cryptosystem can reduce the high cost of certificate management. It is a concept proposed by Shamir in CRYPTO'84 in 1984. The identity-based cryptosystem is to determine the user's public key first, and then calculate the corresponding private key. Therefore, the public key can be taken as the user's identity information, thereby ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 周才学
Owner JIUJIANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products