An authenticated proxy re-encryption system and method based on symmetric cryptography

A proxy re-encryption and symmetric cipher technology, applied in the field of proxy re-encryption systems, can solve problems such as security threats, practical discounts, and inability to verify message reliability

Active Publication Date: 2019-08-20
SOUTH CHINA UNIV OF TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The traditional proxy re-encryption scheme uses the public key cryptography system. Its obvious disadvantages are the large amount of calculation and the slow encryption speed, which cannot meet the needs of today's big data era, and its practicability is greatly reduced.
Moreover, the current proxy re-encryption scheme cannot verify the reliability of the message, and cannot guarantee that the message will not be maliciously tampered with, which also poses a great threat to security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authenticated proxy re-encryption system and method based on symmetric cryptography
  • An authenticated proxy re-encryption system and method based on symmetric cryptography
  • An authenticated proxy re-encryption system and method based on symmetric cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0076] This embodiment discloses an authenticated proxy re-encryption system based on symmetric cryptography, as shown in the attached figure 1 As shown, the system includes:

[0077] 1) Client

[0078] The client is used to initiate a re-encryption request to the agent. It includes random number generator, key generation module, encryption module, decryption module and key update module. When the data needs to be re-encrypted, the random number generator first generates a random number, uses the key generation module to generate a new encryption key and a new authentication key, and then generates a re-encryption key and authentication key through the key update module The key is changed, and then the random number, the re-encryption key and the authentication change key are sent to the re-encryption module of the agent. In addition to being able to initiate a re-encryption request to the agent, the client can also encrypt and decrypt data.

[0079] Random number generato...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authenticable agent re-encryption system and method based on symmetric cryptography. The system is composed of a client and an agent. The client is used to initiate a re-encryption request to the agent, and comprises a random number generator, a key generation module, an encryption module, a decryption module and a key update module. The agent is mainly composed of a re-encryption module and re-encrypts data. Each module performs the corresponding operation to produce the corresponding output. The system does not use a public key encryption system but uses symmetric cryptography, which greatly improves the processing speed. A pseudo-random function PRF in the encryption system is generated by using Ring-LWR, SHA1 and SHA256 methods, and has the property of homomorphism. The system realizes agent re-encryption and message integrity authentication to verify whether a message is maliciously tampered.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an authenticated proxy re-encryption system and method based on symmetric ciphers. Background technique [0002] Cryptography technology is the core and foundation of information security, and it is widely used in network communication, e-commerce, banking, national defense and military and other fields. Cryptographic techniques include symmetric cryptography and asymmetric cryptography, and asymmetric cryptography is also called public key cryptography. [0003] In the current cloud service model, users store encrypted data in unreliable cloud servers. Due to reasons such as security policies or information sharing, data encryption keys may need to be changed frequently. The traditional solution is to retrieve the data from the cloud server and decrypt it with the original key, then encrypt it with a new key and send it back to the cloud server. But this solution...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 吴宸彭峙酿唐韶华
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products