A Certificateless Generalized Proxy Signcryption Method
A proxy signcryption and certificate-free technology, applied in the field of information security, can solve problems such as increasing storage key space and implementation complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The present invention will be described in detail below in conjunction with the accompanying drawings.
[0042] Such as figure 1 , 2 As shown, the present invention provides a generalized proxy signcryption method based on no certificate. In the application scenario of the generalized proxy signcryption method, the original signer or signcryptor authorizes a proxy signature or signcryptor he trusts to perform on his behalf. Sign or signcrypt. For sensitive data, the proxy signature or signcryptor can use the proxy signcryption method; for other information, he can use the proxy signature method. The proxy signature or signcipher only needs to save a pair of keys and use only one algorithm, which reduces the management cost of keys and the complexity of system implementation. Concrete process of the present invention is as follows:
[0043] Step 1. System initialization.
[0044] The security parameter k is an integer, and the generator is an additive cyclic group G...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

