Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Cross-domain identity-based broadcasting encryption method in space information network

A technology of spatial information network and broadcast encryption, applied in the field of identity-based broadcast encryption, can solve the problems of linear growth in size, affecting the performance of broadcast encryption scheme, unable to broadcast encryption, etc. dynamic effect

Active Publication Date: 2016-09-28
XIDIAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The shortcomings of this method are: First, although the fixed-length ciphertext constructed by this scheme is conducive to the rapid transmission of information, the size of its public parameters will increase linearly with the increase of the total number of users in the system
The shortcomings of this method are: firstly, the public parameters of users are linearly related to the total number of system users. When the number of system users is too large, it will inevitably affect the performance of the broadcast encryption scheme.
Secondly, the construction process of this scheme only considers the broadcast encryption process in the same security domain, and it cannot be directly used in the broadcast encryption in the space information network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-domain identity-based broadcasting encryption method in space information network
  • Cross-domain identity-based broadcasting encryption method in space information network
  • Cross-domain identity-based broadcasting encryption method in space information network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0042] refer to figure 1 , the identity-based broadcast model applicable to the present invention includes an encryption party, a decryption party and a private key issuing center. Among them, the sender encrypts the plaintext message into a ciphertext message and sends it to the receiver; the receiver asks for its own private key from the private key issuing center, and the private key issuing center generates the receiver's private key and returns it to the receiver; The text message is decrypted to obtain the plain text message.

[0043] refer to figure 2 , the network model applicable to the present invention includes three security domains: the source security domain S, the proxy security domain A and the destination security domain D. Among them, the source-side security domain S has the source-side security domain agent Agent S , the source securi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cross-domain identity-based broadcasting encryption method in space information network. The implementation method includes 1, performing system safety initialization; 2, performing broadcasting encryption on transmission information in a source-end safety domain; 3, judging whether a source end safety domain agent belongs to a receiving user or not; 4, performing broadcasting encryption on transmission information in an agent safety domain; 5, judging whether a target safety domain belongs to a receiving user or not; 6, performing broadcasting encryption on transmission information in the target safety domain; 7, completing the operation and quitting. According to the invention, under the premise that the safety domain uses the identify-based broadcasting encryption, the cross-domain broadcasting encryption is performed on information transmission in three phases of the source end safety domain, the agent safety domain and the target safety domain, so that a sending party does not need to be involved in a safety mechanism in a domain with a receiving path and information transmission among different domains is realized further. The method can be applied to technical fields such as space information networks and the like.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and further relates to a cross-domain identity-based broadcast encryption method in a spatial information network in the technical field of network security. Based on the identity-based broadcast encryption system, the present invention proposes a secure transmission method that can be used in a space information network to realize that receiving users can be distributed between multiple security domains and perform broadcast encryption on each other. Background technique [0002] With the rapid development of aerospace technology, my country's space information network is also constantly being built and improved. The space information network is a network information system composed of spacecraft with space communication capabilities, such as satellites, space shuttles, etc., and ground stations. It can realize the interconnection and intercommunication functions between ground st...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08
CPCH04L9/0869H04L9/3033H04L63/0442H04L63/062
Inventor 刘俊南张俊伟马建峰徐尚书龙奔杜方琼阙梦菲马爽
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products