A system and method for proxy re-encryption based on certificateless conditions

A proxy re-encryption, certificate-free technology, applied in transmission systems, electrical components, usage of multiple keys/algorithms, etc., can solve the problems of third-party inquiry, high certificate verification cost, complicated certificate management, etc., and achieve excellent performance. Effect

Active Publication Date: 2018-04-20
HOHAI UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in practical applications, due to some shortcomings in the certificate environment, such as high cost of certificate verification, complicated certificate management, and third-party inquiries about certificate status, there are still uncertified agents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system and method for proxy re-encryption based on certificateless conditions
  • A system and method for proxy re-encryption based on certificateless conditions

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical scheme of the present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments, so that those skilled in the art can better understand the present invention and implement it, but the examples given are not intended to limit the present invention.

[0033] In this system:

[0034] (1) Key generation center: responsible for system parameter generation, that is, generating system master key (private key of key generation center) and system public parameter set (including cyclic group, generator, master public key and hash function, etc. ), and a trusted third party that generates some public-private key pairs for system users;

[0035] (2) Client: The original receiver of the encrypted message is the entity that entrusts the receiver to exercise the decryption right;

[0036] (3) Accepting party: the entity that receives the authorization of the entrusting party and exercises the decryption ri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificateless-condition-based proxy re-encryption system and method. A certificateless public key system and a proxy re-encryption system are combined together, so that certificate management is avoided and problems in secrete key distribution and escrow are eliminated. In a condition of ensuring encryption safety, online re-encryption is performed flexibly and the re-encryption capability of a proxy center is controlled, so that only ciphertext meeting specific conditions can be re-encrypted effectively. At the same time, since the certificateless public key system is used, the system and method provided by the invention have advantages of traditional public key encryption and identify-based encryption and are good in performance and convenient in application in an open network environment. The novel system and method provided by the invention are safe and efficient.

Description

technical field [0001] The invention relates to a proxy re-encryption system and method based on certificate-free conditions. Background technique [0002] The Chinese invention patent with application number 201410614744.2 discloses a certificate-based proxy re-encryption method and system, which combines the certificate-based cryptographic system and the proxy re-encryption system to provide a certificate-based proxy re-encryption method. [0003] However, in practical applications, due to some shortcomings in the certificate environment, such as high cost of certificate verification, complicated certificate management, and third-party inquiries about certificate status, there are still uncertified agents. [0004] The certificateless public key cryptosystem is a new type of public key cryptosystem proposed by Al-Riyami and Paterson at the Asian Cryptography Conference in 2003. This system organically combines the advantages of identity-based cryptosystem and traditional p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/14
CPCH04L9/14H04L63/0442H04L63/0478
Inventor 李继国赵雪霞张亦辰
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products