Unlock instant, AI-driven research and patent intelligence for your innovation.

An identity-based multi-receiver ring signcryption method with multiple security properties

A security attribute and multi-receiver technology, applied in the field of identity-based multi-receiver ring signcryption, can solve problems such as poor security

Active Publication Date: 2018-08-07
河北朝夕网络科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the disadvantages of poor security of existing identity-based ring signcryption methods, the present invention provides an identity-based multi-receiver ring signcryption method with multiple security attributes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-based multi-receiver ring signcryption method with multiple security properties
  • An identity-based multi-receiver ring signcryption method with multiple security properties
  • An identity-based multi-receiver ring signcryption method with multiple security properties

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Glossary.

[0056] PKG: private key generation center;

[0057] k: the secret parameter selected by the user, which is a long integer;

[0058] G 1 : The additive group of order q;

[0059] G 2 : the multiplicative group of order q;

[0060] q: large prime number, the order of the group, indicating that the group contains only q elements;

[0061] P:G 1 a generator of

[0062] P 0 : Additive group G 1 A random number in ;

[0063] s: a random number in the integer multiplication group;

[0064] Z q * : Integer multiplicative group modulo q;

[0065] P pub : system public key;

[0066] (E, D): symmetric encryption and decryption algorithm pair;

[0067] bilinear map;

[0068] params: parameter collection;

[0069] h 1 : One-way hash function, which can calculate a binary string of any length into a hash value in an additive group of order q;

[0070] h 2 : One-way hash function, which can calculate the string in the additive group with order q into...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based multi-recipient ring signcryption method with multiple safety attributes, which is used for solving the technical problem that a conventional identity-based ring signcryption method has bad safety. The method comprises the steps of parameter setting, secret key extraction, anonymous signcryption, unsigncryption, public verification, etc. During a signcryption process, a mixed encryption method is applied. The method is guaranteed to have forward safety by using the difficult problem of solving a symmetric key. By using ring signcryption and the Lagrange interpolation function, user identity information of a sender and multiple recipients is completely hidden. The user privacy is effectively guaranteed. Meanwhile, a bilinear pair operation is adopted to guarantee multiple safety attributes such as public verifiability, decryption fairness, etc.

Description

technical field [0001] The invention relates to an identity-based signcryption method, in particular to an identity-based multi-receiver ring signcryption method with multiple security attributes. Background technique [0002] Most of the existing identity-based signcryption methods are not perfect enough, and do not have various security attributes, such as user identity privacy, decryption unfairness, forward security, and public verification. It is extremely vulnerable to various attacks, and security issues have become the main challenge for the wide application of signcryption technology. [0003] The document "An Identity Based Ring Signcryption Scheme with PublicVerifiability, Security and Cryptography (SECRYPT), Proceedings of the 2010International Conference on IEEE, 2010, 1-10" designed an identity-based ring signcryption method, which uses multiple bilinear Yes, it solves the problem that some methods cannot resist adaptive chosen ciphertext attack, existential u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 李慧贤张晓莉范天琪庞辽军
Owner 河北朝夕网络科技有限公司