Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based generalized multi-recipient anonymous signcryption method

A multi-receiver, receiver technology, applied in the field of identity-based generalized multi-receiver anonymous signcryption

Inactive Publication Date: 2017-10-24
NORTHWESTERN POLYTECHNICAL UNIV
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the complex deficiency of the existing multi-receiver anonymous signcryption method, the present invention provides an identity-based generalized multi-receiver anonymous signcryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based generalized multi-recipient anonymous signcryption method
  • Identity-based generalized multi-recipient anonymous signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Symbolic descriptions of variables and operations in this embodiment.

[0049]

[0050]

[0051] This example implements an identity-based generalized multi-receiver anonymous signcryption method for the application occasion of group-oriented cloud service customization. The present invention will be described in detail below:

[0052] The specific steps of the identity-based generalized multi-receiver anonymous signcryption method of the present invention are as follows:

[0053] Step 1: Establish system parameters. This step is performed by a private key generation center (Private Key Generator, PKG).

[0054] Choose security parameter k, let G 1 and G 2 are additive cyclic groups and multiplicative cyclic groups of order q, respectively, where q≥2 k is a prime number, let P be G 1 The generator of , choose a bilinear map e:G 1 ×G 1 →G 2 ; choose an integer at random As the system master key, let P pub =sP∈G 1 is the system public key. In addition, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based generalized multi-recipient anonymous signcryption method, aiming at solving the technical problem that a current multi-recipient anonymous signcryption method is complicated. The technical scheme of the identity-based generalized multi-recipient anonymous signcryption method is characterized in that a sgn() function is used as an identity function to achieve the aim of generalized signcryption; in a signature mode, a sender is determined, but a receiver is vacant, and a sign function can be used to eliminate the algebraic items associated with the recipient and a signature scheme is automatically switched; the situations of an encryption mode and a signcryption mode are similar to the signature mode, and the encryption mode and the signcryption mode are also implemented according to the above method; more importantly, the identity-based generalized multi-recipient anonymous signcryption method still maintains the characteristic of identity-based cryptosystem, complete anonymity, authentication, confidentiality and decryption fairness of the basic scheme; the identity-based generalized multi-recipient anonymous signcryption method can be adaptively switched to the signcryption method, the signature method or the encryption method as required; and compared with the background technology which uses the three algorithms: the signature algorithm, the encryption algorithm and the signcryption algorithm, the signature method or the encryption method only uses one algorithm, thus being simple and being higher in adaptability.

Description

technical field [0001] The invention relates to a multi-receiver anonymous signcryption method, in particular to an identity-based generalized multi-receiver anonymous signcryption method. Background technique [0002] In group-oriented multicast and broadcast services, one-to-many is a commonly used data transmission method. Identity-based multi-receiver signcryption is a key technology for multicast and broadcast key management. In this method, the sender only needs to perform one signcryption operation, and different receivers can decrypt the signcryption from their corresponding ciphertexts to obtain different messages. Identity-based multi-receiver signcryption can provide authentication and confidentiality at the same time, and has high communication efficiency. It is an ideal one-to-many secure data transmission method. [0003] The document "Pang L, Li H. NMIBAS: a novel multi-receiver ID-based anonymous signature encryption with decryption fairness. Computing and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0861H04L9/3247H04L63/0421
Inventor 李慧贤高瑾庞辽军
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products