Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity-based anonymous broadcast encryption method under prime order in standard model

A standard model, broadcast encryption technology, applied to digital transmission systems and key distribution, can solve problems such as low efficiency, no security proof, and low efficiency of Freeman technology, and achieve the effect of protecting privacy

Inactive Publication Date: 2016-09-28
CHANGAN UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2006, scholars such as Barth proposed privacy broadcast encryption. In the same year, scholars such as Krzywiecki proposed a privacy public key broadcast encryption scheme, but did not give a formal security proof
In 2012, Lewko and other scholars pointed out that the efficiency of Freeman technology is not high, and proposed a general method to convert the encryption scheme of composite number order into the encryption scheme of prime number order.
[0006] Broadcasting in fields such as multicast communication, pay TV, and satellite-based e-commerce, in order to protect the privacy of users, anonymous broadcast encryption is required. There is anonymous broadcast encryption in the prior art, but the efficiency is very low. Therefore, how to It is of great practical significance to construct an anonymous broadcast encryption method under the group

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based anonymous broadcast encryption method under prime order in standard model
  • Identity-based anonymous broadcast encryption method under prime order in standard model
  • Identity-based anonymous broadcast encryption method under prime order in standard model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Step 1, the system is established:

[0032] 1) Input the security parameter λ, the number of receivers m and the bilinear pairing e:G 1 ×G 2 →G T ;

[0033] 2) The key generation center PKG randomly selects the biorthogonal basis (D, D * ), d 1 ,···,d 4 represents an element in D, means D * elements in

[0034] 3) The key generation center PKG randomly selects α∈Z q , the output system parameter is The master key is

[0035] Step 2, extract the user private key:

[0036] 1) Enter the identity ID i ∈S, S={ID 1 ,···,ID n};

[0037] 2) The key generation center PKG is randomly selected then the private key is

[0038] Step three, encryption:

[0039] 1) Input message M;

[0040] 2) The key generation center PKG randomly selects z∈Z q , then the ciphertext is

[0041] Step 4, decryption:

[0042] When the receiver receives the ciphertext CT={C 1 ,C 2}, perform the following steps:

[0043] 1) If ID i ∈S, with the private key To decrypt t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based anonymous broadcast encryption method under a prime order in a standard model, and the method comprises the steps: firstly carrying out the extraction of a private key of a user, carrying out the identity-based anonymous broadcast encryption after the extraction of the private key, and then carrying out decryption; outputting acceptance if a ciphertext is decrypted and passes the verification when a receiver receives the ciphertext and carries out verification; or else, outputting rejection, and demonstrating that the proposed scheme is completely safe in the standard model based on the identity-based anonymous broadcast encryption under the assumption of symmetry External Diffie-Hellman through employing the technology of double-system encryption and a dual pair vector space. The method can achieve the functions of anonymity and encryption, and protects the privacy of a user. The method provided by the invention can achieve the functions of anonymity and encryption, and protects the privacy of an electronic document.

Description

technical field [0001] The invention belongs to the field of computer information security, and in particular relates to an identity-based anonymous broadcast encryption method under the prime number order in a standard model. Background technique [0002] In 1993, scholars such as Fiat first proposed the concept of broadcast encryption. In the broadcast encryption scheme, the broadcaster can encrypt the message and send it to multiple users through the broadcast channel, and only authorized users can use their own keys to decrypt the message. Broadcast encryption is widely used in multicast communication, pay TV, satellite-based e-commerce and other fields. Since the concept of broadcast encryption scheme was proposed, many broadcast encryption schemes have been proposed one after another. [0003] In 1984, Shamir first proposed the concept of Identity Based Encryption (IBE), whose idea is to allow the sender to use the identity of the receiver (such as IP address, Email ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0861H04L63/0435H04L63/06H04L63/083
Inventor 明洋原红平董玉柱
Owner CHANGAN UNIV