Authenticable agent re-encryption system and method based on symmetric cryptography

A proxy re-encryption and symmetric cipher technology, applied in the field of proxy re-encryption systems, can solve the problems of slow encryption, practicality discount, and inability to adapt.

Active Publication Date: 2017-03-22
SOUTH CHINA UNIV OF TECH
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The traditional proxy re-encryption scheme uses the public key cryptography system. Its obvious disadvantages are the large amount of calculation and the slow encryption speed, which cannot meet the needs of today's big data era, and its practicability is greatly reduced.
Moreover, the current proxy re-encryption scheme cannot verify the reliability of the message, and cannot guarantee that the message will not be maliciously tampered with, which also poses a great threat to security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authenticable agent re-encryption system and method based on symmetric cryptography
  • Authenticable agent re-encryption system and method based on symmetric cryptography
  • Authenticable agent re-encryption system and method based on symmetric cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0076] This embodiment discloses an authenticated proxy re-encryption system based on symmetric cryptography, as shown in the attached figure 1 As shown, the system includes:

[0077] 1) User side

[0078] The client is used to initiate a re-encryption request to the agent. It includes random number generator, key generation module, encryption module, decryption module and key update module. When data needs to be re-encrypted, the random number generator first generates a random number, uses the key generation module to generate a new encryption key and a new authentication key, and then uses the key update module to generate the re-encryption key and authentication The key is transformed, and then the random number, the re-encryption key and the authentication transformation key are sent to the re-encryption module of the agent. In addition to being able to initiate a re-encryption request to the agent, the user can also encrypt and decrypt data.

[0079] Random number generato...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authenticable agent re-encryption system and method based on symmetric cryptography. The system is composed of a client and an agent. The client is used to initiate a re-encryption request to the agent, and comprises a random number generator, a key generation module, an encryption module, a decryption module and a key update module. The agent is mainly composed of a re-encryption module and re-encrypts data. Each module performs the corresponding operation to produce the corresponding output. The system does not use a public key encryption system but uses symmetric cryptography, which greatly improves the processing speed. A pseudo-random function PRF in the encryption system is generated by using Ring-LWR, SHA1 and SHA256 methods, and has the property of homomorphism. The system realizes agent re-encryption and message integrity authentication to verify whether a message is maliciously tampered.

Description

Technical field [0001] The present invention relates to the technical field of information security, in particular to an authenticating proxy re-encryption system and method based on symmetric cryptography. Background technique [0002] Cryptography is the core and foundation of information security and is widely used in network communications, e-commerce, banking, national defense and military fields. Cryptography includes symmetric cryptography and asymmetric cryptography. Asymmetric cryptography is also called public key cryptography. [0003] In the current cloud service model, users store encrypted data in unreliable cloud servers. Due to security policies or information sharing, data encryption keys may need to be changed frequently. The traditional scheme is to retrieve the data from the cloud server and decrypt it with the original key, then encrypt it with the new key and send it back to the cloud server. However, this solution is obviously inefficient and not scalable....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 吴宸彭峙酿唐韶华
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products