Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CCA secure proxy re-encryption method with delegable verifiability

A proxy re-encryption and re-encryption technology, which is applied in the computer field, can solve problems such as the inability to forge legal public key encrypted ciphertexts and insufficient security of encryption methods, and achieve the effects of avoiding damage to rights and interests, safe and efficient transmission, and improving security

Active Publication Date: 2017-08-22
XIDIAN UNIV
View PDF4 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to address the deficiencies of the above-mentioned prior art, and propose a proxy re-encryption method with CCA security that can be delegated for verification. The signature algorithm is used to ensure that even illegal users can obtain public key encryption and private encryption from the stage of entrusting third-party verification. key, illegal users cannot forge legal public key encrypted ciphertexts, so as to achieve CCA security, which is used to solve the problem of insufficient security of encryption methods existing in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CCA secure proxy re-encryption method with delegable verifiability

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0027] Step 1. The data owner generates system parameters param according to their own security requirements, including: seven randomly selected members g in the first group G 1 , g 2 , h 1 , h 2 , u, v, w, encryption parameters L, four hash functions H 0 , H 1 , H 2 , H 3 , Multiplicative cyclic group Finite field and bilinear map e, the implementation steps are:

[0028] Step 1a, the data owner randomly selects a prime number p according to their own security requirements, and constructs the first group G and the second group G with p members respectively T , a multiplicative cyclic group with members p-1 and a finite field with p members Finally, according to the construction method of bilinear mapping in algebra, using the first group G and the second group G T Construct bilinear map e:G×G→G T ;

[0029] Step 1b, the data owner randomly ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a CCA secure proxy re-encryption method with delegable verifiability and is used for solving the problem that in the prior art, an encryption method is insufficient in security. The method comprises the realization steps that a data owner generates a system parameter and calculates own public key and private key; a data receiver calculates own public key and private key; the data owner carries out second-layer ciphertext encryption on a plaintext, uploads a result to a cloud server, moreover calculates a re-encryption key and sends the re-encryption key to the cloud server; the cloud server carries out composite encryption on a second-layer ciphertext, signs the result, moreover, calculates a signature verification key and sends the second-layer ciphertext, a public key encrypted ciphertext, a signature value and the signature verification key to the data receiver; the data receiver sends the received data and the public key encrypted private key to a client; the client carries out legality verification on the public key encrypted ciphertext; the client carries out integrity and legality verification on a re-encrypted ciphertext; and the data receiver decides whether to decrypt the ciphertext or not according to verification results.

Description

technical field [0001] The invention belongs to the technical field of computers, and relates to a proxy re-encryption method capable of entrusting verification to achieve CCA security, which can be applied to cloud computing, distributed file systems, mail systems and the like. Background technique [0002] Cloud computing is an emerging computing model. It provides convenient, on-demand network access. This advantage enables users with poor computing resources to obtain powerful computing and storage capabilities through the cloud platform. Therefore, cloud computing technology has developed rapidly in recent years, and the user base is also increasing day by day. In this process, in order to protect the privacy of user data, it is necessary to encrypt user data before performing other operations to avoid damage to user rights. Proxy re-encryption technology, as a special type of public key encryption technology, allows a proxy to re-encrypt ciphertext without revealing...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L29/06H04L29/08
CPCH04L9/0822H04L9/083H04L9/0861H04L9/0894H04L9/3247H04L63/0884H04L67/10H04L67/56
Inventor 詹宇王保仓
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products