Heterogeneous polymerization signcryption method in Internet-of-things environment

A technology of the Internet of Things and the environment, applied in the field of information security, can solve problems such as inability to be used for secure communication, lack of aggregation verification, etc., to achieve the effects of improving execution efficiency, reducing computing overhead, and facilitating processing

Active Publication Date: 2018-02-16
陕西链诚致远科技有限公司
View PDF2 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although many heterogeneous signcryption schemes have been proposed, these heterogeneous signcryption sch

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous polymerization signcryption method in Internet-of-things environment
  • Heterogeneous polymerization signcryption method in Internet-of-things environment
  • Heterogeneous polymerization signcryption method in Internet-of-things environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] refer to figure 1 , the implementation steps of the present invention are as follows:

[0036] Step 1, system initialization.

[0037] (1a) The key generation center KGC in the CLC system generates system public parameters params={q,k,E / F q ,G,P,P pub ,H 1 ,H 2 ,H 3 ,H 4}, where k is a security parameter; q is a large prime number, q>2 k ;E / F q is a prime field F q The elliptic curve on the elliptic curve; G represents the additive cyclic group composed of points on the elliptic curve; P is the generator of G; P pub is the public key of KGC; H 1 , H 2 , H 3 and H 4 are four collision-free safe hash functions, H 1 is to map 0 / 1 sequences of different lengths to Hash function in H 2 is a hash function that maps the elements in G to bits of the same length as the message to be signed encrypted, H 3 is to map 0 / 1 sequences of different lengths to Hash function in H 4 is to map 0 / 1 sequences of different lengths to Hash function in;

[0038] (1b) KGC ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a high-efficiency polymerization signcryption solution in an Internet-of-things environment, wherein the high-efficiency polymerization signcryption solution mainly settles theproblems of relatively small application range and relatively low practicability caused by relatively high calculation expenditure in an existing polymerization signcryption solution. The high-efficiency polymerization signcryption solution comprises the following realizing steps of 1, performing system initialization by a secret key generating center KGG and a certificate issuing mechanism CA; 2, registering a perception entity Ni in a CLC system and a user U in a PKI system to KGC and CA; 3, broadcasting a common random number and a public key certificate by the user U in the PKI system, and performing verification and receiving by the Ni; 4, selecting a message generating signcryption cryptograph by the perception entity Ni in the CLC system, transmitting the message generating signcryption cryptograph to an aggregator Nn for forming aggregated signcryption, and transmitting the aggregated signcryption to the user U by the aggregator Nn; and 5, performing polymerization de-signcryption and restoring corresponding plaintext information. The high-efficiency polymerization signcryption solution has isomerism and higher practicability. The high-efficiency polymerization signcryption solution can be used for smart home, intelligent traffic, intelligent medical service and intelligent industrial detection.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an aggregation signcryption method under a heterogeneous public key cryptosystem, which can be used for secure data transmission under an Internet of Things environment. Background technique [0002] The Internet of Things is known as the third wave of the world's information industry. As early as 1995, there was a related concept of the Internet of Things in Bill Gates' "The Road to the Future". With the rapid development of the Internet and communication networks, the International Telecommunication Union (ITU) formally proposed the concept of the Internet of Things in 2005. However, due to the incomplete theoretical system of the Internet of Things, there is no recognized precise definition so far. The definition of the Internet of Things generally recognized by various countries is: through various information sensing devices, in accordance with the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/3236H04L9/3247H04L9/3263
Inventor 刘景伟李超亚孙蓉介玺
Owner 陕西链诚致远科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products