An email encryption method and system based on group cryptography

An email and encryption system technology, applied in the information field, can solve the problems of cumbersome certificate verification, complex key management, and low encryption efficiency, and achieve the effects of simple storage and maintenance, simple key management, and a small number of verifications

Active Publication Date: 2020-12-15
UNIV OF SCI & TECH BEIJING
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1) Difficulty in monitoring emails: Since the server is not responsible for managing user keys, client-side encryption makes it impossible to monitor the content of user emails;
[0005] 2) Difficulty in obtaining certificates: users must obtain the public key certificate of each receiver, and the public key certificate has no designated storage location, so it is difficult to obtain;
[0006] 3) Certificate verification is cumbersome: the user needs to verify the legitimacy of the obtained receiver's public key certificate, and the PKI or PGP verification process requires additional overhead on the client side;
[0007] 4) Low encryption efficiency: For multiple receivers, multiple encryptions are required;
[0008] 5) Key management is complex: users need to complete functions such as key generation, storage, endorsement, distribution, and cancellation by themselves, and the maintenance cost is large
[0009] 6) High user cost: PKI endorsement still requires real-name authentication and payment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An email encryption method and system based on group cryptography
  • An email encryption method and system based on group cryptography
  • An email encryption method and system based on group cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0088] The email encryption method based on the group cryptosystem comprises a group email encryption scheme, an embodiment of the scheme is as follows:

[0089] 1) Get mail operation: Get the mail Mail sent by the user through the client connection protocol and interface UPI.

[0090] 2) Encryption request judging operation: the client encryption agent unit UEPU detects the encrypted identification information from the mail Mail, and if it exists, proceed to step 3); otherwise, execute step 8).

[0091] Among them, the encrypted identification information in this embodiment is defined as follows:

[0092] ①Select the encryption method using the "#" sign and the following form to define:

[0093] {Username 1, Username 2, ..., Username n}#mail server

[0094] ② The exclusion encryption method is defined with the sign "%" and the following form:

[0095] {username1,username2,...,usernamen}% mail server

[0096] Here, {username 1, username 2, ..., username n} represent the us...

Embodiment 2

[0107] Based on the e-mail encryption method based on the group cryptography system comprising encrypted mail encapsulation format, an embodiment of the scheme is as follows:

[0108] 1) Authorization information ciphertext generation operation: for a given mail recipient set S={ID 1 ,...,ID n}, get the receiver ID respectively k The group public key certificate Cert of the mail server where it is located k , and form the certificate set Cert S ={Cert 1 ,...,Cert m},in,

[0109] per Cert k Contains the group public key mpk k ; and then respectively call the encryption algorithm SBE-Encrypt in the logo-based group encryption SBE scheme in "Example 3" to complete the encryption of the session key ek, that is, for all m public keys mpk k (k=1,...,m), calculate respectively

[0110] SBE-Encrypt (mpk k ,Pattern,ek)→C k (1)

[0111] Finally, the ciphertext set C is obtained SBE =(C 1 ,...,C m ), where the session key ek for all ciphertexts C 1 ,...,C m all the same...

Embodiment 3

[0122] The email encryption method based on the group cipher system includes a logo-based group encryption SBE scheme, an embodiment of the scheme is as follows:

[0123] 1) System parameter generation algorithm SBE-Setup(S)→(mpk, msk): given a bilinear mapping group S=(p, G 1 ,G 2 ,G T ,e(·,·)) as input, randomly select two elements G←G 1 and H←G 2 , two random exponents Calculate R=e(G,H) ò and for any k∈[1,m] compute and choose a hash function hash Finally, output the master private key msk=(γ,ò,G,G ò ) and group public key mpk={S,H,R,{G k} k∈[1,m] ,hash()}.

[0124] 2) User key generation algorithm SBE-GenKey(msk, ID k )→sk k : Enter msk and the ID of the kth user k , the given user ID in this example k is the user's Email address, define x k =hash(ID k ) will ID k maps to a random element Calculate the private key of the kth user

[0125]

[0126] And the public information of the kth user and put (ID k ,H k ) to the group public key mpk.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information technology, in particular to an email encryption method and system based on a group password system, which are used for secure data exchange. The email encryption system manages a group public key based on the group password system, and generates a different private key for each user, and implements an encryption mechanism for one or more designated authorized users through the group public key, and the user password The key is issued and managed by the server, so the system can supervise the content of encrypted emails; email encryption only needs to obtain the group public key certificate of the email system where the recipient is located, and the certificate is uniformly managed by the email system. Compared with the personal public key certificate Storage and maintenance are relatively simple; and for multiple recipients in the same mail system, the group public key certificate only needs to be obtained once, and it has the advantages of simple certificate verification and high encryption efficiency.

Description

technical field [0001] The invention relates to the field of information technology, in particular to an e-mail encryption method and system based on a group password system for secure data exchange. Background technique [0002] E-mail is currently the most widely used communication tool and service on the Internet. Through e-mail, users can quickly contact network users in any corner of the world at a very low price. E-mail protocols currently used in the Internet include: Simple Mail Transfer Protocol (SMTP), Post Office Protocol (POP3) and Internet Mail Access Protocol (IMAP), but the e-mail system based on these protocols is not safe, which may lead to e-mail leakage and harm National security and personal privacy; on the other hand, from a regulatory point of view, documents related to national security need to be backed up and archived for supervision, which requires the introduction of regulatory encryption mechanisms in emails to ensure the security of email informa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/58H04L9/14
CPCH04L9/14H04L63/0428H04L63/0435H04L63/06H04L63/065H04L51/42
Inventor 朱岩龙隆周志远宋晓旭
Owner UNIV OF SCI & TECH BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products