A Provably Secure Attribute-Based Signcryption Method Under Standard Model

A standard model and attribute technology, which is applied to the public key of secure communication, secure communication device, and key distribution, and can solve problems such as inability to construct instances.

Active Publication Date: 2020-02-04
SHAANXI NORMAL UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, under the random oracle model, the provably secure signcryption scheme cannot be constructed in a specific application.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Provably Secure Attribute-Based Signcryption Method Under Standard Model
  • A Provably Secure Attribute-Based Signcryption Method Under Standard Model
  • A Provably Secure Attribute-Based Signcryption Method Under Standard Model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention is described in further detail below in conjunction with accompanying drawing:

[0037] see figure 1 , 2 , the invention is a secure attribute-based signcryption method under the standard model. The signcryption is to simultaneously realize two functions of digital signature and encryption within one logical step. The signature means that the sender signs a message or file in electronic form, and the signed message or file can be transmitted in the computer network, and indicates that the signer is responsible for the content of the message or file; the encryption is the use of technical means Encode important data for transmission.

[0038] The method is implemented in the following steps

[0039] Step 1. System establishment

[0040] 1) Given a security factor κ, the key generation center (PKG) arbitrarily selects a cyclic group G of prime number p order 1 , G 2 , g is G 1 The generator of bilinear map e: G 1 *G 1 →G 2, all attribute s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security-provable attribute-based signcryption method in a standard model. The signcryption simultaneously realizes the two functions of digital signature and encryption during the single logical step. The signature is a message or a file sent from a sender in the electronic form. The signed message or the signed file can be transmitted in a computer network, and represents that a signer has the responsibility for the content of the message or the file. The encryption is used for encoding and transmitting important data by adopting the technical means. Therefore, the secrecy transmission of the message is realized, and the attribute of a signcryption operator is authenticated at the same time. Meanwhile, the confidentiality is ensured in the standard model. That means, the indistinguishability of adaptive chosen ciphertext attacks in the MBDH hypothesis is realized.

Description

Technical field: [0001] The invention belongs to the technical field of computer information security, and relates to a signcryption method, in particular to an attribute-based signcryption method that is provably safe under a standard model. Background technique: [0002] In 1984, Shamir proposed an identity-based public key cryptosystem. The basic idea is that users use their own identity information as the public key, and the user's private key is generated by a trusted third party. The identity-based public key cryptosystem solves the problem of binding certificates and user identities in the certificate-based public key system at a lower cost, but it also brings another problem that will leak user identity information. The concept of fuzzy identity was first proposed at the OMI Conference in 2005, which is the prototype of the attribute-based cryptosystem. In an attribute-based encryption method, each user has a set of attributes, and a central authority has a master k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0844H04L9/3073H04L9/3249H04L9/3271H04L2209/72
Inventor 宋云李志慧李永明
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products