E-mail encryption method and system based on group cryptosystem

An e-mail and encryption system technology, applied in the information field, can solve the problems of cumbersome certificate verification, complex key management, and low encryption efficiency, and achieve the effects of simple storage and maintenance, simple key management, and a small number of verifications

Active Publication Date: 2018-05-08
UNIV OF SCI & TECH BEIJING
View PDF7 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) Difficulty in monitoring emails: Since the server is not responsible for managing user keys, client-side encryption makes it impossible to monitor the content of user emails;
[0005] 2) Difficulty in obtaining certificates: users must obtain the public key certificate of each receiver, and the public key certificate has no designated storage location, so it is difficult to obtain;
[0006] 3) Certificate verification is cumbersome: the user needs to verify the legitimacy of the obtained rece

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • E-mail encryption method and system based on group cryptosystem
  • E-mail encryption method and system based on group cryptosystem
  • E-mail encryption method and system based on group cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] The email encryption method based on the group cryptosystem comprises a group email encryption scheme, an embodiment of the scheme is as follows:

[0089] 1) Get mail operation: Get the mail Mail sent by the user through the client connection protocol and interface UPI.

[0090] 2) Encryption request judging operation: the client encryption agent unit UEPU detects the encrypted identification information from the mail Mail, and if it exists, proceed to step 3); otherwise, execute step 8). Among them, the encrypted identification information in this embodiment is defined as follows:

[0091] ①Select the encryption method using the "#" sign and the following form to define:

[0092] {username1, username2, ..., usernamen} #Mail server.

[0093] ② The exclusion encryption method is defined with the sign "%" and the following form:

[0094] {username1, username2, ..., usernamen}% mail server.

[0095] Here, {username 1, username 2, ..., username n} represent the user ID ...

Embodiment 2

[0106] Based on the e-mail encryption method based on the group cryptography system comprising encrypted mail encapsulation format, an embodiment of the scheme is as follows:

[0107] 1) Authorization information ciphertext generation operation: for a given mail recipient set S={ID 1 ,...,ID n}, get the receiver ID respectively k The group public key certificate Cert of the mail server where it is located k , and form the certificate set Cert S ={Cert 1 ,...,Cert m}, where each Cert k Contains the group public key mpk k ; Then respectively call the encryption algorithm SBE-Encrypt in the logo-based group encryption SBE scheme in "Embodiment 3" to complete the encryption of the session key ek, that is, for all m public keys mpk k (k=1,...,m), calculate respectively:

[0108] SBE-Encrypt (mpk k ,Pattern,ek)→C k (1),

[0109] Finally, the ciphertext set C is obtained SBE =(C 1 ,...,C m ), where the session key ek for all ciphertexts C 1 ,...,C m all the same.

...

Embodiment 3

[0120] The email encryption method based on the group cipher system includes a logo-based group encryption SBE scheme, an embodiment of the scheme is as follows:

[0121] 1) System parameter generation algorithm SBE-Setup(S)→(mpk, msk): given a bilinear mapping group S=(p, G 1 ,G 2 ,G T ,e(·,·)) as input, randomly select two elements G←G 1 and H←G 2 , two random exponents calculate and for any k∈[1,m] compute and choose a hash function Finally, output the master private key And group public key mpk={S,H,R,{G k} k∈[1,m] ,hash()}.

[0122] 2) User key generation algorithm SBE-GenKey(msk, ID k )→sk k : Enter msk and the ID of the kth user k , the given user ID in this example k is the user's Email address, define x k =hash(ID k ) will ID k maps to a random element Calculate the private key of the kth user:

[0123]

[0124] And the public information of the kth user and put (ID k ,H k ) to the group public key mpk.

[0125] 3) Encryption algorithm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information technology, in particular to an E-mail encryption method and system based on a group cryptosystem for secure data exchange. The E-mail encryption system manages a group public key based on the group cryptosystem, generates a different private key for each user, and implements an encryption mechanism for one or more designated authorized users through the group public key, and the user key is issued and managed by a server, so the system can supervise the encrypted mail content; the mail encryption only needs to acquire a group public key certificate of a recipient's mail system, this certificate is managed by the mail system, and compared with a personal public key certificate, the storage and maintenance are relatively simple; for multiplerecipients in the same mail system, the group public key certificate only needs to be acquired once; and the method and the system have the advantages of simple certificate verification and high encryption efficiency.

Description

technical field [0001] The invention relates to the field of information technology, in particular to an e-mail encryption method and system based on a group password system for secure data exchange. Background technique [0002] E-mail is currently the most widely used communication tool and service on the Internet. Through e-mail, users can quickly contact network users in any corner of the world at a very low price. E-mail protocols currently used in the Internet include: Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP3) and Internet Mail Access Protocol (IMAP), but the e-mail system based on these protocols is not safe, which may lead to e-mail leakage and harm National security and personal privacy; on the other hand, from a regulatory point of view, documents related to national security need to be backed up and archived for supervision, which requires the introduction of regulatory encryption mechanisms in emails to ensure the security of email informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/58H04L9/14
CPCH04L9/14H04L63/0428H04L63/0435H04L63/06H04L63/065H04L51/42
Inventor 朱岩龙隆周志远宋晓旭
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products