Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Convertible proxy signcryption method with provable security

A proxy signcryption and proxy signature technology, applied in the field of convertible proxy signcryption, can solve the trust crisis, hinder the mainstream cloud computing service platform and other problems, and achieve the effect of ensuring confidentiality

Inactive Publication Date: 2015-11-18
ZHEJIANG GONGSHANG UNIVERSITY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the development of cloud computing, the "black cloud" driven by fraudulent behavior is developing faster, leading to a crisis of trust between cloud computing resource owners, providers, and service users, and hindering cloud computing from becoming an Mainstream service platform

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Convertible proxy signcryption method with provable security
  • Convertible proxy signcryption method with provable security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] combined with figure 1 , 2 , the present invention is further illustrated by specific examples.

[0026] 1. A provably safe transferable proxy signcryption method comprising the following steps:

[0027] Step 1. Proxy signature key generation;

[0028] 1.1 The original signer randomly selects k 0 ∈ Z * q , where q is a set of large prime numbers selected from the key generation center KGC, which generates public-private key pairs (x 0 belongs to Z * q ,y 0 =x 0 P), (x d belongs to Z * q ,y d =x d P) and (x v belongs to Z * q ,y v =x v P), Z * q For the set of positive integers in the set of large prime numbers, calculate r 0 =k 0 P, P is E(GF q ) generator, E(GF q ) is an elliptic curve defined on the finite field GF(q), c 0 =H(r 0 ), H():{0,1} * →{0,1} 256 is a secure Hash function, constructing proxy certificate m w , and then put (c 0 ,m w ) to the proxy signer;

[0029] 1.2 The proxy signer receives (c 0 ,m w ), randomly select k ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a convertible proxy signcryption method with provable security of cloud security control and is used for protecting privacies of users. The method mainly comprises the generation of proxy signing keys, signing, message recovery and signature verification, signature conversion and the like; the main difference between the general proxy signcryption scheme is as follows: the public keys, the proxy certificates and parameters of an original signer and a proxy signer cannot be transmitted as public parameters, and also need to be recovered as the message. The convertible proxy signcryption method with provable security provided by the invention can guarantee the confidentiality of the identities of the original signer and the proxy signer, so as to be applied to an authentication protocol of cloud computing.

Description

technical field [0001] The invention relates to a provably safe convertible proxy signcryption method controlled by cloud security and used to protect user privacy. Background technique [0002] Cloud computing is a computing model that provides users with services such as computing, data storage, application software, and system platforms through the network. The initial investment cost of the project and the post-management cost. The user obtains the required service resources from the cloud computing center through the computer network, and pays the corresponding fee to the cloud computing service provider. Judging from the development trend of cloud computing today, cloud computing has broad application prospects. However, with the development of cloud computing, the "black cloud" driven by fraudulent behavior is developing faster, leading to a crisis of trust between cloud computing resource owners, providers, and service users, and hindering cloud computing from beco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/14H04L29/08H04L29/06
Inventor 刘东升邹江波周怡王蓓王黎明王冰
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products