Asymmetric cross-password system encryption and decryption method and system

A cryptographic system and encryption method technology, applied in the field of communication encryption and decryption, can solve problems such as weak computing power, achieve the effects of ensuring security, saving cumbersome steps, and solving difficult problems of public key management

Inactive Publication Date: 2017-05-31
STATE GRID CORP OF CHINA +2
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In the aforementioned application scenario, the access terminals used by Alice and Bob are different (Alice uses a desktop computer with strong computing power, and Bob uses a handheld terminal with weak computing power), and the encryption system deployed on the access terminal does not need to be deployed (the desktop computer has a powerful deployment function). However, the resource-consuming IBBE encryption system and the IBE encryption system with weak computing power but simple functions deployed on handheld terminals) have led to a problem that most proxy re-encryption cannot solve: how to integrate the encryption system (IBBE encryption system) that requires high terminal computing power ) of the ciphertext is converted into the ciphertext of the encryption system (IBE) with low requirements on the computing power of the terminal through proxy re-encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asymmetric cross-password system encryption and decryption method and system
  • Asymmetric cross-password system encryption and decryption method and system
  • Asymmetric cross-password system encryption and decryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0033] The invention solves the problem that the traditional proxy re-encryption method cannot perform ciphertext conversion between different encryption systems. The asymmetric cross-cipher system re-encryption proposed by the present invention bridges two different encryption systems: identity-based broadcast encryption (IBBE) and identity-based encryption (IBE). These two encryption systems can operate independently and have independent encryption and decryption algorithms . The asymmetric cross-cipher system re-encryption method combines the above two different cryptosystems, and converts the ciphertext of the identity-based broadcast encryption (IBBE) system into ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an asymmetric cross-password system encryption and decryption method and system with an aim to combine with advantage identity-based encryption (IBE) algorithm and effectively solve the problem about difficulty in public key management. Meanwhile, the invention provides cipher test conversion method from an identity-based broadcast encryption system rich in function but high in energy consumption to a simple and efficient identity-based encryption system, and plain texts cannot be revealed during the entire conversion. The asymmetric cross-password system re-encryption method is applicable to data-sharing environment in which accessing terminal computing capabilities are asymmetric, proper encryption systems are deployed to terminals with different computing capabilities, and meanwhile, a safe and effective way is provided for uses with high computing capabilities to share secret data to users with low computing capabilities.

Description

technical field [0001] The present invention relates to the technical field of communication encryption and decryption, and more specifically, to an asymmetric cross-cipher system re-encryption and decryption method and system. Background technique [0002] At present, with the development of information and communication technology, various cryptographic systems have been proposed to realize the security and confidentiality of data transmission. According to whether the keys held by the two communicating parties are the same, the cryptographic system can be divided into two parts: private key encryption system and public key encryption system. In the private key encryption system, the two communicating parties have the same key (private key); in the public key encryption system, the receiver has a pair of keys, namely the encryption key and the decryption key, the encryption key can be made public, and the decryption key The key needs to be kept secret. The algorithms of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0435H04L9/3236H04L63/06H04L63/0876H04L63/0884
Inventor 邓桦周云雅蒋破荒曾少华童一维
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products