Unlock instant, AI-driven research and patent intelligence for your innovation.

A Certificateless Generalized Proxy Signcryption Method

A proxy signcryption and certificate-free technology, applied in the field of information security, can solve problems such as increasing storage key space and implementation complexity

Inactive Publication Date: 2018-01-30
JIUJIANG UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This will inevitably increase the space for storing keys in the system, the cost of managing keys, the time for verifying keys, and the implementation complexity brought to the system by implementing the two algorithms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Certificateless Generalized Proxy Signcryption Method
  • A Certificateless Generalized Proxy Signcryption Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] Such as figure 1 , 2 As shown, the present invention provides a generalized proxy signcryption method based on no certificate. In the application scenario of the generalized proxy signcryption method, the original signer or signcryptor authorizes a proxy signature or signcryptor he trusts to perform on his behalf. Sign or signcrypt. For sensitive data, the proxy signature or signcryptor can use the proxy signcryption method; for other information, he can use the proxy signature method. The proxy signature or signcipher only needs to save a pair of keys and use only one algorithm, which reduces the management cost of keys and the complexity of system implementation. Concrete process of the present invention is as follows:

[0043] Step 1. System initialization.

[0044] The security parameter k is an integer, and the generator is an additive cyclic group G...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a non-certificate generalized proxy signcryption method, belonging to the field of secure communication, comprising: a key generation center sets system parameters; the key generation center generates a part of private keys; a user generates a secret value and part of private key together to set a complete private key and calculate the public key; the original signer or signer uses his private key and public key to generate a proxy authorization; after the proxy signature or signer verifies the proxy authorization, he uses the proxy authorization, his private key, The recipient's public key and system parameters perform generalized proxy signcryption processing on the message to be sent, and send the result to the recipient for generalized proxy decryption signcryption processing. The present invention can realize proxy signature or signcryption, and the two functions of proxy signature and proxy signcryption can be realized only by using a pair of keys and an algorithm, providing confidentiality and (or) authentication for users; and based on certificateless cryptography The implementation of the system solves the key escrow problem and reduces the high cost of public key management.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a certificateless generalized proxy signcryption method. Background technique [0002] In the traditional public key cryptography system, the public key is a bunch of garbled characters, so a trusted third party - Certificate Authority (Certificate Authority, hereinafter referred to as CA) is required to issue a certificate to bind the user's public key with its identity information . However, the high cost of certificate management hinders the widespread use of traditional public key cryptography. [0003] The identity-based cryptosystem can reduce the high cost of certificate management. It is a concept proposed by Shamir in CRYPTO'84 in 1984. The identity-based cryptosystem is to determine the user's public key first, and then calculate the corresponding private key. Therefore, the public key can be taken as the user's identity information, thereby ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 周才学
Owner JIUJIANG UNIV