Reverse-engineering-resistant safe E-mail forwarding system and method

An e-mail and reverse engineering technology, applied in the field of data security, can solve the problems of recipient's private key leakage, email plaintext leakage, cumbersome steps, etc.

Active Publication Date: 2015-12-23
HUBEI UNIV OF TECH
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These steps are cumbersome, and if this process is handed over to an untrustworthy mail ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Reverse-engineering-resistant safe E-mail forwarding system and method
  • Reverse-engineering-resistant safe E-mail forwarding system and method
  • Reverse-engineering-resistant safe E-mail forwarding system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0050] In the traditional re-encryption scheme, the re-encryption program may be reversed by a third party to obtain the private key. In order to make up for the shortcomings of the existing scheme, the present invention uses re-encryption and obfuscation technology to safely confuse the re-encryption circuit. Proxy re-encryption on the server. When the mail server performs proxy re-encryption on the mail, it uses the re-encryption scheme provided in the scenario to re-encrypt the encrypted mail into a form that the proxy recipient can decrypt. Due to the sa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a reverse-engineering-resistant safe E-mail forwarding system and method. The system comprises a secret mail re-encryption module and a re-encrypted mail recovery module, wherein the secret mail re-encryption module comprises a preprocessed parameter generating unit, a re-encryption tuple generating unit, a confused re-encryption processing unit and a re-encryption output unit; and the re-encrypted mail recovery module comprises a re-encrypted mail receiving unit, a re-encrypted mail decryption unit and an original mail searching unit. The method comprises an E-mail re-encryption method and an E-mail re-encryption recovery method. The reverse-engineering-resistant safe E-mail forwarding system and method have the characteristics of low realization complexity, high safety, recovery simplicity and the like and are suitable for re-encrypting and forwarding a mail through a third-party mail service provider under the conditions that the private keys of the original mail receiver and the mail agent receiver are not leaked, and any information of the mail is not leaked.

Description

technical field [0001] The invention belongs to the technical field of data security, and relates to a secure e-mail forwarding system and method, in particular to a third-party e-mail server, which uses e-mail as an object and combines cryptography technology with cloud computing to prevent e-mail and private A secure re-encryption forwarding system and method for key leakage. Background technique [0002] With the rapid development and popularization of the Internet, e-mail has become one of the most widely used and popular services in the network. Users of e-mail have developed from business, science, and education industries to ordinary families, and it is becoming more and more important to ensure the security of e-mail itself and the impact of e-mail on the system. At present, more and more emails will be encrypted and sent to recipients due to the need for confidentiality. However, when recipients cannot process these emails in time and need other people to process t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/58H04L29/06
Inventor 张明武张语荻赵玲陈泌文
Owner HUBEI UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products