General surrogate key generation method for identity-based proxy cryptography method

A technology for generating a method and a surrogate key, applied in the field of information security, can solve the problems of increasing design cost and time overhead, reducing the security of the scheme, reducing security, etc., to improve convenience and security, and save computing costs and computational costs. small effect

Inactive Publication Date: 2016-06-29
SHANGHAI SECOND POLYTECHNIC UNIVERSITY
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the scheme needs to use the proxy public key in the verification process, it takes a lot of time to reconstruct the proxy public key in the final generated scheme, which is complex and inefficient.
[0005] 2. The surrogate key is generated in a single way and has no versatility
More importantly, these surrogate key generation methods can only be used for this scheme proposed by this author, and cannot be used for schemes proposed by other authors
Since the generation method of the surrogate key needs to be re-established every time, the design cos

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • General surrogate key generation method for identity-based proxy cryptography method
  • General surrogate key generation method for identity-based proxy cryptography method
  • General surrogate key generation method for identity-based proxy cryptography method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] based on the following Figure 1 ~ Figure 3 , specifically explain the preferred embodiment of the present invention.

[0038] like figure 1 As shown, the present invention provides a general surrogate key generation method in the identity-based surrogate encryption method, and the general surrogate key generation method can be applied to any known identity-based cryptography method. The general surrogate key The generation method includes the following steps:

[0039] Step S101, the original operator O establishes the authorization certificate Warrant, and directly uses the authorization certificate Warrant as the proxy public key;

[0040] Among them, the authorization certificate Warrant includes the identity information of the original operator O, the identity information of the agent operator P, the content of the agent authorization, the date range, etc.;

[0041] Step S102, the original operator O uses the private key d of the original operator o Encrypt the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a general surrogate key generation method for an identity-based proxy cryptography method. The general surrogate key generation method can be applied to any known identity-based cryptography method. The general surrogate key generation method directly adopts a certificate of authorization as a surrogate public key. A Hash function is adopted to encrypt middle parameters. Various efficient identity-based proxy cryptography methods which are established by using the method of the invention can be widely applied to electronic commerce, mobile agents, distributed networks, etc., and greatly enhance the running efficiency and safety.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a general proxy key generation method in an identity-based proxy encryption method. Background technique [0002] No matter in the real environment or the network environment, people often need to entrust some of their rights to a reliable agent, and let the agent exercise these rights on their own behalf. For example, the manager of a company or the leader of a unit is on a business trip. In order not to affect the normal operation of the company or unit, he can entrust his secretary or assistant to sign some important documents on his behalf during his business trip; another example is an online sales For the company, due to the large number of trading users, the service quality of the main server has declined, and the network delay has increased, which has seriously affected the user experience. At this time, the company can entrust some secondary service provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3236H04L9/3247H04L63/0823H04L63/083H04L63/0884
Inventor 胡小明
Owner SHANGHAI SECOND POLYTECHNIC UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products