Certificate-free combined secret key generation and application method

A technology of combined key and application method, which is applied in the field of certificateless combined key generation and application, and can solve problems such as collision

Active Publication Date: 2016-03-30
鄂尔多斯市迪曼森密码科技有限公司
View PDF4 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The technical problem to be solved by the present invention is: aiming at the technical problems existing in the prior art, the present invention provides a certificate-less combination that solves the collision and linear collusion problems of the combined public key technology and overcomes the shortcomings of the identification cryptosystem. Key generation and application method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-free combined secret key generation and application method
  • Certificate-free combined secret key generation and application method
  • Certificate-free combined secret key generation and application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] The present invention will be further described below in conjunction with the accompanying drawings and specific preferred embodiments, but the protection scope of the present invention is not limited thereby.

[0070] Such as figure 1 As shown, a method for generating and applying a combined key without a certificate in this embodiment includes the following steps: S1. The server side generates an elliptic curve and 2 h ×2 k The private key seed matrix skm, 2 h ×2 k The public key seed matrix pkm, and publish the parameters of the elliptic curve and the public key seed matrix pkm, the parameters of the elliptic curve include the base point G of the elliptic curve; S2. The client generates an individual identification ID, a partial signature private key xID and a partial signature public key PK uk , and the individual identification ID, part of the signature public key PK uk Upload to the server; S3. The server generates the individual identification private key SK ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificate-free combined secret key generation and application method. The method comprises the following steps: S1, a server end generating an elliptical curve, skm and pkm, and issuing parameters of the elliptical curve and the pkm; S2, a client generating ID, xID and PKuk, and uploading the ID and the PKuk to the server end; S3, the server end generating SKID, PKID, rID and PKrID; S4, the server end generating PKE, SKE and PKS; S5, the service end issuing the SKE to the client, and broadcasting the ID, the PKE and the PKS; S6, the client generating SKS through the xID and the SKE, and decrypting encryption information through the SKE, and signing verification information through the SKS; and S7, a general client encrypting decryption information and verifying signature information through the PKS. The method provided by the invention solves the problems of non-repudiation of sum bumps, linear collusion and individual signature of a combination public key technology and the like.

Description

technical field [0001] The invention relates to the field of information security combination keys, in particular to a method for generating and applying a combination key without a certificate. Background technique [0002] PKI (Public Key Infrastructure) public key infrastructure is a system or platform that provides public key encryption and digital signature services for the purpose of managing keys and certificates. In 1984, the cryptographer Shamir proposed the identification cryptosystem. In the identification cryptosystem, the user identification is the user's public key. Due to the limitation of technology, there has been no implementation scheme of identification cryptosystem with better computational efficiency. [0003] Chinese scholars Tang Wen, Nan Xianghao, and Chen Zhong proposed "combined public key technology based on elliptic curve key system" in 2003. The core idea is: construct a random integer matrix as the private key seed matrix; correspondingly cal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
CPCH04L9/0816H04L9/0825H04L9/0861
Inventor 欧阳震诤戴清平
Owner 鄂尔多斯市迪曼森密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products