Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Batch Cramer-Shoup cryptosystem based on batch processing exponential operation product

A batch processing and exponential technology, applied in the field of cryptography in information security, can solve the problems that mobile devices cannot bear the consumption and the amount of calculation is huge.

Active Publication Date: 2015-08-12
BEIHANG UNIV
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When there are many ciphertexts to be verified, the amount of calculation is very large, and the time and power consumption will be very obvious. It is difficult for mobile devices to bear such a large consumption.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch Cramer-Shoup cryptosystem based on batch processing exponential operation product
  • Batch Cramer-Shoup cryptosystem based on batch processing exponential operation product
  • Batch Cramer-Shoup cryptosystem based on batch processing exponential operation product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The invention is a batch Cramer-Shoup encryption system based on batch processing exponential operation product, and the method is realized by three modules: a system initialization module, a data batch encryption module and a data batch decryption module. figure 1 It is a system architecture diagram of the method of the present invention. The system flow of the batch Cramer-Shoup cryptosystem operation based on the batch exponential operation product figure 2 , combined with the flow chart, the specific implementation steps of the method are introduced as follows:

[0042] Module 1: The system initialization module can trust the authority (TA) to call the initialization algorithm, select security parameters and anti-collision hash functions, and generate public and private keys.

[0043] Step 1: TA inputs the system security parameter λ, and runs the initialization algorithm g(1 λ ), output a group whose order is a prime number q

[0044] Step 2: TA then runs the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a batch Cramer-Shoup cryptosystem based on batch processing exponential operation product. The method comprises: 1, a trusted authority performing initialization and outputting system parameters; 2, operating a random number generation algorithm; 3, selecting a collision-resistant Hash function, calculating a Hash value; 4, calculating a public key; 5, a data batch encryptor determining size n of a batch according to data size; 6, using a batch processing exponential operation product algorithm to perform bulk encryption on the data; 7, a data batch decryptor verifying ciphertext in batch; 8, if the ciphertext passes the verification, performing decoding; 9, and if the ciphertext does not pass the verification, finding out the void ciphertext. The batch Cramer-Shoup cryptosystem is used to encode and decode data under a mobile terminal environment, the batch Cramer-Shoup cryptosystem protects security of data and personal privacy. Through the batch processing exponential operation product technology, calculation cost of encryption and decryption of mobile device terminals is greatly reduced.

Description

Technical field: [0001] The present invention is a batch Cramer-Shoup cryptosystem based on the product of batch processing exponential operation, which can implement batch processing encryption and decryption by using the product of batch processing exponential operation, and can accelerate the operation speed to the greatest extent and reduce the calculation cost of encryption and decryption of mobile devices. It belongs to the field of cryptography in information security. technical background: [0002] With the development of wireless communication technology and ubiquitous computing technology, more and more mobile terminals such as wireless sensors, smart phones, and tablet computers are used to process sensitive information. When data collection or mobile office is performed, the amount of data that needs to be processed is very large. Therefore, in order to ensure the security of data and the efficiency of data processing, the choice of cryptosystem is very importan...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/02H04W12/06H04W12/03H04W12/041
CPCH04W12/02H04W12/06
Inventor 孙洋伍前红秦波周修文刘建伟
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products