Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Signcryption method with hidden identity and strong security

An identity and security technology, which is applied in the field of identity hiding and strong security signcryption, can solve security problems such as re-analysis, leakage, and bandwidth occupation

Active Publication Date: 2016-02-03
赵运磊
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of this modified signcryption scheme needs to be re-analyzed, and the efficiency is poor: the first user needs to run at least 2 modular exponential operations, and the second user needs to run 3 modular exponential operations
In addition, Zheng's signcryption scheme requires an additional transmission of (r, s), thus occupying additional bandwidth
Also, the leakage of the temporary DH-exponent x of Zheng’s signcryption scheme will completely break the security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signcryption method with hidden identity and strong security
  • Signcryption method with hidden identity and strong security
  • Signcryption method with hidden identity and strong security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The implementation of the present invention will be described in detail below in conjunction with the accompanying drawings and examples, so as to fully understand and implement the process of how to apply technical means to solve technical problems and achieve technical effects in the present invention. It should be noted that, as long as there is no conflict, each embodiment and each feature in each embodiment of the present invention can be combined with each other, and the formed technical solutions are all within the protection scope of the present invention.

[0046] Also, in the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without the specific details or in the particular manner described.

[0047] In addition, the steps shown in the flow dia...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a signcryption method with hidden identity and strong security. The signcryption method comprises the steps that: a first device calculates X' = AXd, wherein X = gx and d = hd (X, auxd), determines a preset shared key S according to a DH-index x, a private key a and a public key B = gb of a second device, determines KA based on S, determines CA = (IA, A, CERTA, X, DataA)) according to KA, and sends [X CA]' to the second device; the second device determines the preset shared key S according to the received X' and the private key b of the second device, determines KA based on S, and decrypts CA according to KA to obtain (IA, A, CERTA, X, DataA); and if a public key certificate CERTA is valid and X' = AX d is effective, DataA is accepted. In the signcryption method provided by the invention, the identity and the public key information of the first device are hidden, the first device only needs to operate 2.5 modular exponentiations, and the second device only needs to operate 1.5 modular exponentiations. In addition, the bandwidth consumed by the method provided by the invention is less than an existing signcryption scheme, and the leakage of a temporary DH-index x does not affect the security of the scheme of the invention.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to an identity-hiding and strongly secure signcryption method. Background technique [0002] Digital signature and public key encryption are the core content of cryptographic theory and application. Signcryption combines the functions of digital signature and public key encryption into one, and the efficiency of separate signature and encryption is greatly improved. However, all existing signcryption schemes need to publicly transmit the user's identity and public key information. In the era of mobile Internet, user identities and public key certificate information are often sensitive information in many applications, so the development of identity-hiding signcryption methods has important theoretical and practical significance. [0003] The current mainstream and ISO-standardized signcryption scheme is the signcryption scheme given by Yuliang Zheng. Suppose the public key and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
Inventor 赵运磊
Owner 赵运磊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products