Encryption system and method of resistance to continuous leakage based on certificate

An encryption method and certificate technology, applied in transmission systems, digital transmission systems, countermeasures against encryption mechanisms, etc., can solve problems such as system attacks

Inactive Publication Date: 2017-04-05
HOHAI UNIV
View PDF2 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In a security system constructed in an ideal environment, if an attacker obtains a small amount of private key information, it may cause a devastating attack on the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption system and method of resistance to continuous leakage based on certificate
  • Encryption system and method of resistance to continuous leakage based on certificate
  • Encryption system and method of resistance to continuous leakage based on certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] A certificate-based anti-persistent leakage encryption system and method proposed by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0046] The terms used in the present invention are explained as follows:

[0047] 1. Bilinear mapping

[0048] make and are two multiplicative cyclic groups with the same prime order p. g is generator of . If mapped Satisfies the following three properties, it is called a bilinear map:

[0049] - Bilinearity: e(g a , g b )=e(g,g) ab ,in

[0050] - Non-degenerate:

[0051] - Computability: e is efficiently computable.

[0052] 2. Strong extractor

[0053] a function in If given any value and Satisfy SD((Ext(X,S),S,I),(U k ,S,I))≤ε Ext , where ε Ext ∈R + , U k and S are two respectively in {0,1} m , {0,1} μ A random variable uniformly distributed on , then this function is called the average case (k,ε Ext ) - strong extractor.

[0054] 3. Bilinear ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an encryption system of resistance to continuous leakage based on a certificate. The system comprises a system parameter arrangement module, a private key generation module, a certificate generation module, an encryption module, a first decryption module and a second decryption module. The system parameter arrangement module generates the common parameters and main private keys of the system, wherein the common parameters are sent to other module; the private key generation module generates user's public and private keys and an initial secret state; the certificate generation module generate a user's certificate; the encryption module performs encryption of the information and sends the encryption information to the decryption modules; the first decryption module and the second decryption module perform decryption of the cryptograph to obtain the plaintext information. The system can resist the continuous leakage, namely in the side channel attack environment, even though the opponent continuously obtain the part of the information of the secret state, the opponent cannot obtain the whole private key. The present invention further provides an encryption method of resistance to continuous leakage based on a certificate.

Description

technical field [0001] The invention belongs to the field of data encryption. Background technique [0002] With the development of information technology, the privacy of users and the security of sensitive data are widely concerned by people, and the research on information security technology has emerged as the times require. Certificate-based encryption (CBE) system has a very wide range of applications, and has received more and more attention. Gentry first proposed the idea of ​​certificate-based encryption in 2003. Similar to traditional public key encryption (PKE), users in CBE generate public and private key pairs and request a certificate from a trusted certification authority (CA). The difference is that the certificate in CBE can not only serve as the certificate in traditional PKE, but also be part of the decryption private key. CBE provides an efficient hidden certificate mechanism. The receiver combines its own private key with the certificate sent by the CA...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/3263H04L9/002
Inventor 李继国郭宇燕张亦辰陈宁宇
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products