Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blind Signcryption Method for Elliptic Curve in Certificateless Environment

An elliptic curve, certificate-free technology, applied in the field of cryptography, can solve problems such as high calculation costs

Active Publication Date: 2019-10-29
XIAN UNIV OF POSTS & TELECOMM +1
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the blind signcryption methods in the certificateless environment are designed using bilinear pairings, and the calculation cost is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blind Signcryption Method for Elliptic Curve in Certificateless Environment
  • Blind Signcryption Method for Elliptic Curve in Certificateless Environment
  • Blind Signcryption Method for Elliptic Curve in Certificateless Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0077] In this embodiment, the elliptic curve y 2 ≡x 3 +ax+bmodp, large prime number p is 2 192 -2 64 -1 as an example, the elliptic curve blind signcryption method in a certificate-free environment consists of the following steps:

[0078] A. System initialization

[0079] (A1) The key generation center chooses a large prime number p, where p is 2 192 -2 64 -1, define a finite field F p Elliptic curve E on :y 2 ≡x 3 +ax+b, where a,b∈F p is satisfied with 4a 3 +27b 2 ≠0 constant, choose a base point G on the elliptic curve E with order n, E(a,b) and infinite point O form an additive cyclic group G p , G is the additive cyclic group G p A generator of , n is a positive integer whose prime number is finite.

[0080] (A2) The key generation center selects a cryptographically secure Hash function h 1 , Hash function h 2 , Hash function h 3 : Hash function h 1 is {0,1} t ×G p → Z p , Hash function h 2 is {0,1} l ×G p → Z p , Hash function h 3 is G p ×G p ...

Embodiment 2

[0145] In this embodiment, the elliptic curve y 2 ≡x 3 +ax+bmodp, large prime number p is 2 224 -2 96 +1 as an example, the elliptic curve blind signcryption method in a certificate-free environment consists of the following steps:

[0146] A. System initialization

[0147] (A1) The key generation center chooses a large prime number p, where p is 2 224 -2 96 +1, for defining a finite field F p Elliptic curve E on :y 2 ≡x 3 +ax+b, where a,b∈F p is satisfied with 4a 3 +27b 2 ≠0 constant, choose a base point G on the elliptic curve E with order n, E(a,b) and infinite point O form an additive cyclic group G p , G is the additive cyclic group G p A generator of , n is a positive integer whose prime number is finite.

[0148] (A2) The key generation center selects a cryptographically secure Hash function h 1 , Hash function h 2 , Hash function h 3 : Hash function h 1 is {0,1} t ×G p → Z p , Hash function h 2 is {0,1} l ×G p → Z p , Hash function h 3 is G p ...

Embodiment 3

[0156] In this embodiment, the elliptic curve y 2 ≡x 3 +ax+bmodp, large prime number p is 2 256 -2 224 +2 192 +2 96 +1 as an example, the elliptic curve blind signcryption method in a certificate-free environment consists of the following steps:

[0157] A. System initialization

[0158] (A1) The key generation center chooses a large prime number p, where p is 2 256 -2 224 +2 192 +2 96 +1, for defining a finite field F p Elliptic curve E on :y 2 ≡x 3 +ax+b, where a,b∈F p is satisfied with 4a 3 +27b 2 ≠0 constant, choose a base point G on the elliptic curve E with order n, E(a,b) and infinite point O form an additive cyclic group G p , G is the additive cyclic group G p A generator of , n is a positive integer whose prime number is finite.

[0159] (A2) The key generation center selects a cryptographically secure Hash function h 1 , Hash function h 2 , Hash function h 3 : Hash function h 1 is {0,1} t ×G p → Z p , Hash function h 2 is {0,1} l ×G p → Z ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for blind signcryption of elliptic curves under certificate-free environment consists of following steps:initializinga system, generating a user's public and private key, generating a user'spartial public and private key, blind signcryption, decryption and verification. The invention extends blind signcryption technology to certificateless cryptosystem and elliptic curve cryptosystem, ablind signcryption method for elliptic curves in certificateless environment is proposed, as that network must have a trusted cent to generate a public key for a user in the prior art, the invention overcome the problem that the network must have a trusted center to generate a public key for a user. The secure channel is required to transmit secret information, the computational complexity is high, and the key needs to be entrusted to the trusted center. The blind signcryption party and the message owner generate the ciphertext of the message m for the receiver through interaction, and the other people besides the receiver can not see the real message, and the receiver can be sure of the source of the message. The invention has the advantages of strong security, low cost of calculation andcommunication, and is suitable for the technical fields of electronic voting, electronic payment, electronic contract and the like.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and in particular relates to elliptic curve cryptography or certificateless public key cryptography or blind sign encryption. Background technique [0002] In order to achieve both confidentiality and authentication, Professor Zheng Yuliang proposed the concept of signcryption in 1997. Signcryption has the advantages of flexible design and high computing efficiency, and is one of the most important applications of public key cryptosystems. In 2003, Al-Riyami and Paterson proposed a certificateless public key cryptosystem, which overcomes the certificate management problem in the traditional public key infrastructure and the key escrow problem in the identity cryptosystem. Blind signcryption in a certificateless environment formed by integrating certificateless cryptography and blind signcryption technology has become an important means of encryption and authentication due to its outstanding...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/06
CPCH04L9/0643H04L9/3033H04L9/3066H04L9/3257H04L2209/72
Inventor 俞惠芳王之仓
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products