Protection method of mobile security data

A technology of secure data and public parameters, applied in secure communication devices, digital transmission systems, user identity/authority verification, etc., can solve problems such as illegal user revocation identity-based encryption system problems, achieve revocation problems and improve security Effect

Inactive Publication Date: 2016-09-07
JIANGSU ELECTRIC POWER INFORMATION TECH +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A database supporting mobile access based on identity-based encryption that satisfies various conditions has been proposed. However, the problem of illegal user revocation is an inherent problem in identity-based encryption systems.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method of mobile security data
  • Protection method of mobile security data
  • Protection method of mobile security data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be further described below in conjunction with the accompanying drawings.

[0019] A method for protecting mobile security data, the specific steps are as follows:

[0020] (1) Initialization phase: a trusted central organization inputs a security parameter Apply the bilinear group generation algorithm to generate bilinear groups of prime order (e,p,G,G T ). Suppose g, h are the generators of the cyclic group G, H is a collision-resistant hash function, Z p is a finite field composed of modules. The central organization randomly selects α∈z p , and calculate g 1 =g α . The master key of the system is α, and the public parameters are (e,p,G,G T ,g,g 1 , h).

[0021] (2) Key generation phase: when user U uses identity ID U When joining the system, the central agency first verifies the legitimacy of its identity, and then randomly selects r U ∈ z p ,calculate User U's key is SK U =(r U ,h U ). The central authority will send t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protection method of mobile security data. The protection method includes an initialization stage, a key generation stage, an encryption stage and a decryption phase. The identity of a user can be any binary strings; when a message is encrypted, not only is the identity information of a recipient needed to be inputted, but also the identity information of a proxy servicer is needed to be inputted; and when the message is decrypted, not only is the key of the recipient needed to be inputted, but also the key of the proxy servicer is needed to be inputted, namely, when the user decrypts the message, he or she needs the help of the proxy servicer. With the protection method of the invention adopted, the proxy servicer can revoke illegal users timely and flexibly, and therefore, the revocation problem of the illegal users in a mobile data protection scheme can be solved, and the security of the mobile data protection scheme can be improved.

Description

technical field [0001] The invention belongs to the field of computer security, and in particular relates to a method for protecting mobile security data. Background technique [0002] With the rapid development of wireless network technology, mobile communication has been widely concerned. One of the advantages of mobile communication is that users can access data anytime and anywhere, regardless of time and place. At present, databases that support mobile access have been proposed, but the security issues in them have not been widely concerned. [0003] Because it can avoid cumbersome certificate management and verification work, the identity-based encryption system has been favored by scholars and enterprises since it was proposed. In an identity-based encryption scheme, the user's identity can be any binary string, such as mobile phone number, e-mail address, etc., but the user's key is generated by a trusted central organization. When sending a message to the recipie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3236H04L63/0876H04L63/0884H04L63/105
Inventor 胡扬波王成现郝悍勇李夫宝
Owner JIANGSU ELECTRIC POWER INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products