Identity-based generalized multi-receiver anonymous signcryption method

A multi-receiver, receiver technology, applied in the field of identity-based generalized multi-receiver anonymous signcryption

Inactive Publication Date: 2020-04-03
NORTHWESTERN POLYTECHNICAL UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the complex deficiency of the existing multi-receiver anonymous signcryption method, the present invention provides an identity-based generalized multi-receiver anonymous signcryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based generalized multi-receiver anonymous signcryption method
  • Identity-based generalized multi-receiver anonymous signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Symbol description of variables and operations in this embodiment.

[0049]

[0050]

[0051] This example implements an identity-based generalized multi-receiver anonymous signcryption method for the application of group-oriented cloud service subscription. The following describes the present invention in detail:

[0052] The specific steps of the identity-based generalized multi-receiver anonymous signcryption method of the present invention are as follows:

[0053] Step 1. System parameter establishment. This step is performed by the Private Key Generator (PKG).

[0054] Select the safety parameter k, let G 1 And G 2 They are additive cyclic group and multiplicative cyclic group with the same order of q, where q≥2 k Be a prime number, let P be G 1 Generator of, choose a bilinear mapping e:G 1 ×G 1 →G 2 ; Randomly select an integer As the system master key, let P pub =sP∈G 1 Is the system public key. In addition, randomly select P 0 ∈G 1 ,Calculate ω=e(P pub ,P 0 ); Choose ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based generalized multi-recipient anonymous signcryption method, aiming at solving the technical problem that a current multi-recipient anonymous signcryption method is complicated. The technical scheme of the identity-based generalized multi-recipient anonymous signcryption method is characterized in that a sgn() function is used as an identity function to achieve the aim of generalized signcryption; in a signature mode, a sender is determined, but a receiver is vacant, and a sign function can be used to eliminate the algebraic items associated with the recipient and a signature scheme is automatically switched; the situations of an encryption mode and a signcryption mode are similar to the signature mode, and the encryption mode and the signcryption mode are also implemented according to the above method; more importantly, the identity-based generalized multi-recipient anonymous signcryption method still maintains the characteristic of identity-based cryptosystem, complete anonymity, authentication, confidentiality and decryption fairness of the basic scheme; the identity-based generalized multi-recipient anonymous signcryption method can be adaptively switched to the signcryption method, the signature method or the encryption method as required; and compared with the background technology which uses the three algorithms: the signature algorithm, the encryption algorithm and the signcryption algorithm, the signature method or the encryption method only uses one algorithm, thus being simple and being higher in adaptability.

Description

Technical field [0001] The invention relates to a multi-receiver anonymous signcryption method, in particular to an identity-based generalized multi-receiver anonymous signcryption method. Background technique [0002] In group-oriented multicast and broadcast services, one-to-many is a common data transmission method. Identity-based multi-receiver signcryption is a key technology to realize multicast and broadcast key management. In this method, the sender only needs to perform a signcryption operation once, and different receivers can unsigncryption from their corresponding ciphertexts to obtain different messages. Identity-based multi-recipient signcryption can provide authentication and confidentiality at the same time, and the communication efficiency is very high. It is an ideal one-to-many secure data transmission method. [0003] The document "Pang L, Li H. NMIBAS: a novel multi-receiver ID-based anonymous signcryption with decryption fairness. Computing and Informatics, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/32
CPCH04L9/0861H04L9/3247H04L63/0421
Inventor 李慧贤高瑾庞辽军
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products