Secure certificateless hybrid signcryption method without pairing

A certificateless, symmetric encryption algorithm technology, applied in the field of certificateless hybrid signcryption, can solve problems such as low efficiency, achieve the effect of improving computing efficiency, eliminating computing consumption, and improving security level

Inactive Publication Date: 2015-11-04
东莞市三航军民融合创新研究院
View PDF2 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the inefficiency of the existing certificateless hybrid signcryption method,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure certificateless hybrid signcryption method without pairing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] Glossary.

[0042] KGC: Key Generation Center;

[0043] Setup: system establishment;

[0044] Set-SV: secret value setting;

[0045] PPK-Gen: partial key generation;

[0046] UK-Gen: user key generation;

[0047] Signcrypt: sign encryption;

[0048] Unsigncrypt: decrypt signcryption;

[0049] k: system security parameters;

[0050] Z + : group of positive integers;

[0051] q: a k-bit prime number;

[0052] f q : a finite field containing q elements;

[0053] E / F q : In the finite field F q An elliptic curve E selected above;

[0054] G q : additive cyclic group;

[0055] Z q * : Integer multiplicative group modulo q;

[0056] P: additive cyclic group G q generator of

[0057] x 0 : The random number selected by KGC;

[0058] msk: system master key;

[0059] L: positive integer, indicating the length of the symmetric key space;

[0060] n: positive integer, indicating the length of the plaintext;

[0061] P pub : system master public key;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure certificateless hybrid signcryption method without pairing. The method is used for solving a technical problem of low efficiency of a conventional certificateless hybrid signcryption method. The method is characterized by a KGC is restricted by a user part public key in a stage of generating a part secret key by prescribing a fixed secret key generation sequence of a user so as to bind the user part public key when a signcryption user performs signcryption on a plaintext and guarantee enough resistance to public key replacing attack; before a user complete private key is generated, using a part private key bound with user identity information and a part public key to verify an equality in order that the user timely detects an invalid behavior of the active dishonest KGC, resists to malicious KGC attack, improves a system security level, and eliminates unnecessary computation consumption; in a unsigncryption stage, substituting scalar multiply operation on a elliptical curve to for expensive time-consuming bilinear pairings to complete message signcryption and unsigncryption processes, thereby improving computation efficiency.

Description

technical field [0001] The invention relates to a certificateless mixed signcryption method, in particular to a safe certificateless mixed signcryption method without pair operation. Background technique [0002] The existing communication environment has higher and higher requirements for the efficiency, security and practicability of cryptographic algorithms. As a widely used cryptographic algorithm, the hybrid cryptosystem not only eliminates the limitation of the public key cryptographic algorithm on the plaintext space, but also has the advantages of fast calculation speed and short key length. Therefore, the hybrid signcryption idea is applied to the certificateless signature The secret field has obvious advantages. At present, most of them use the method of improving the identity-based cryptosystem to construct a certificateless hybrid signcryption scheme, and use bilinear pairing operations to realize the signcryption and decryption of the scheme, resulting in low c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/30
CPCH04L9/3066H04L63/0435H04L63/1441
Inventor 李慧贤范天琪张晓莉庞辽军
Owner 东莞市三航军民融合创新研究院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products