Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Entrustable authentication encryption method

A technology of authentication encryption and custodian, applied in the field of file authentication and encryption, it can solve the problems of inability to satisfy non-repudiation, lose the meaning of digital signature, users cannot choose the custodian by themselves, and achieve non-repudiation and reduce the number of certificates by half. , the effect of reducing the burden

Active Publication Date: 2018-02-09
HANGZHOU NORMAL UNIVERSITY
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, considering another important branch of cryptography——digital signature, in order to satisfy the non-repudiation of digital signature in the legal sense, only using a set of public / private key pairs to realize the above services has natural defects.
In other words, asking users to submit their decrypted private keys to a trusted escrow center (EA: Escrowagency), although it solves the above problems, it brings another problem: in the traditional public key cryptosystem, the key used for signature The private key is the same as the private key used for decryption. Since the private key is no longer in the sole control of the user, when using the digital signature service, the user's signature will not be able to satisfy non-repudiation and lose the meaning of digital signature
However, in this scheme, users cannot choose the custodian by themselves, and the custodian can rely on its unique escrow decryption private key to decrypt the ciphertext of all users in the system, which is a passive scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Entrustable authentication encryption method
  • Entrustable authentication encryption method
  • Entrustable authentication encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Further illustrate the technical scheme of the inventive method below in conjunction with accompanying drawing

[0021] A kind of trusteeship authentication encryption method of the present invention, comprises the following steps: system initialization (Setup), private key generation (Key-Gen), encryption algorithm (Encryption), decryption algorithm (Decryption), trusteeship decryption algorithm (Escrow-Decrypt) . Specifically include:

[0022] Step 1: Generate system parameters for encryption and decryption; given a security parameter k, where k is an integer, specify its size according to user security requirements; output two cyclic groups G with order q 1 with G 2 , while generating the group G 1 A generator P of and a bilinear map where q is a prime number. Choose a hash function H whose output is at least 160 bits. The plaintext space is M={0,1} n , the ciphertext space is Among them, n integer system public parameters are 1 ,G 2 ,n,P,H>;

[0023] Ste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an entrustable authentication encryption method. The method includes the following steps that: system parameters for encryption and decryption are generated; random numbers and system parameters are selected as the long-term private keys of users, wherein the long-term private keys include a private key of a sender, a private key of a receiver and a private key of a trustee; public keys are obtained according to the system parameters and the long-term private keys of the users, wherein the public keys include a public key of the sender, a public key of the receiver anda public key of the trustee; secret values shared by every two parties only are obtained through calculation; session keys are obtained according to the shared secret values and on the basis of the public key of the trustee, a temporary private key is randomly selected to encrypt a plaintext; the receiver uses the secret value shared with the sender to decrypt a ciphertext; and the trustee decrypts the ciphertext using its own private key.

Description

technical field [0001] The invention relates to a file authentication and encryption method. technical background [0002] With the comprehensive popularization of the Internet, information security has been paid more and more attention by people. In a secure cryptographic system, the key plays a vital role, and only legitimate users who have the key can perform encryption and decryption operations. In some specific environments, users are sometimes required to escrow the key to a trusted third party. For example, users may lose their own keys during the use of the service, resulting in previously encrypted files that cannot be decrypted. At this time, a backup of the key is required to restore the plaintext; Need, often need to get the user's key to decrypt the file. However, considering another important branch of cryptography——digital signature, in order to satisfy the non-repudiation of digital signature in the legal sense, only using a set of public / private key pairs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L29/06
CPCH04L9/0894H04L9/30H04L9/3263H04L63/0442H04L63/08H04L63/0823
Inventor 王圣宝李振宇
Owner HANGZHOU NORMAL UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products