Proxy re-designated verifier signcryption method

A technology for specifying verifiers and specifying content, which is applied to key distribution and can solve problems such as signcryption without a designated verifier

Inactive Publication Date: 2017-10-20
SUN YAT SEN UNIV
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a proxy re-designated verifier signcryption method to solve the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy re-designated verifier signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] 1. The steps of generating system parameters and signcryption key pair include:

[0071] 1)云存储平台选择PBC软件库附带提供的A类型参数,其中素数阶q的取值为8780710799663312522437781984754049815806883199414208211028653399266475630880222957078625179422662221423155858769582317459277713367317481324925129998224791,生成元g是群 The random elements in are provided by the "pairing" operation provided by the PBC library;

[0072] 2) The cloud storage platform chooses AES as the content symmetric encryption system, including key generation algorithm Gen, encryption algorithm E′ and decryption algorithm E ′-1 , whose symmetric encryption key is a 256-bit random 0, 1 bit string;

[0073] 3) The cloud storage platform chooses the method disclosed by Tian et al. in the appendix of the ACISP 2012 paper "A short non-delegatablestrong designated verifier signature" to set the symmetric encryption and decryption operations in which both the plaintext space and the ciphertext space are in the group;

[0074]4) The cloud s...

Embodiment 2

[0123] Embodiment 2 is the same as Embodiment 1, except that the system parameters adopt other effective bilinear pairing mappings, such as other types of parameters in the PBC library.

Embodiment 3

[0125] Embodiment 3 is the same as Embodiment 1, except that other effective hash functions, such as SHA384, are adopted for the system parameters.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a proxy re-designated verifier signcryption method. The method comprises the following steps: generating system parameters and a signcryption key pair; performing symmetric encryption on contents by a content provider, performing signcryption on the contents and a symmetric encryption key to generate a first level signcryption ciphertext, and uploading the signcryption ciphertext and a symmetric encryption ciphertext to a service provider; interacting with the content provider by a content consumer, and authorizing the content consumer by the content provider; providing contents designated by the service provider by the content consumer, performing proxy re-signcryption on the designated contents by the service provider to generate a second level signcryption ciphertext, providing the symmetric encryption ciphertext and the second level signcryption ciphertext for the content consumer, decrypting and performing integrity version on the second level signcryption ciphertext by the content consumer, and decrypting the symmetric encryption ciphertext to obtain an original text; and singly generating the second level signcryption ciphertext of the obtained contents by the content consumer by using a signcryption private key.

Description

technical field [0001] The invention relates to the field of information security, in particular to a signcryption method for proxy redesignating a verifier. Background technique [0002] Jakobsson introduced the concept of designated verifier signatures in 1996. In addition to the general signature algorithm and verification algorithm, the specified verifier signature also includes a simulation algorithm. The designated verifier can simulate a digital signature through the simulation algorithm, and the simulated digital signature can also be verified by the verification algorithm. This means that except for the designated verifier, even if any other entity can verify a digital signature through the verification algorithm, it cannot confirm that the digital signature was generated by the signer or the designated verifier. [0003] The designated verifier signature has received a lot of attention after it was proposed, and concepts such as strong designated verifier signatu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0861H04L63/0435H04L63/0478H04L63/0884H04L63/123
Inventor 田海博刘鲁
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products