Method and system for realizing cross-domain secure communication

A secure communication, cross-domain technology, applied in the field of cross-domain secure communication, can solve the problem of not being able to resist the security of temporary keys

Active Publication Date: 2019-03-01
NANCHANG UNIV
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] Most of the existing secure communication methods based on homogeneous or heterogeneous ciphers cannot resist the sec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing cross-domain secure communication
  • Method and system for realizing cross-domain secure communication
  • Method and system for realizing cross-domain secure communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The technical method of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0064] Such as figure 1 with figure 2 As shown, a method for realizing cross-domain secure communication provided in this embodiment is implemented according to the following steps:

[0065] System parameter generation phase:

[0066] In order to ensure the versatility of this method, the sender chooses any matching KGC, and the receiver chooses any matching PKG. Both the sender and KGC are in the CLC environment, and the receiver and PKG are both in the IBC environment. KGC exposes its system parameters params 0 , and randomly select a master key s 0 , PKG exposes its system parameters params 1 , and randomly select a master key s 1 , KGC system parameter params 0 And the system parameter params of PKG 1 Are not the same.

[0067] Specifically, the KGC system parameter params 0 The generati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a system for realizing cross-domain secure communication, and belongs to the field of secure communication. The method for realizing the cross-domain secure communication is implemented according to the following steps: a system parameter generation phase: a KGC discloses its system parameter params0 and randomly selects a master key s0, and a PKG discloses itssystem parameter params1 and randomly selects a master key s1; a user key generation phase: a partial public key QA and a partial private key DA of a sender are calculated, the sender selects a random number xA, another partial public key PKA and another partial private key A are calculated, and public keys QB and DB of a receiver are generated; a signcryption phase: the sender performs signcryption on a plaintext m to form a signcryption message sigma, and sends the signcryption message sigma to the receiver; and a de-signcryption phase: the receiver obtains the plaintext m by using the signcryption message sigma and the private key DB of the receiver. By adoption of the method and the system for realizing the cross-domain secure communication disclosed by the invention, temporary key security and cross-domain functional characteristics are achieved.

Description

technical field [0001] The invention belongs to the field of secure communication, and in particular relates to a method and system for realizing cross-domain secure communication. Background technique [0002] Security requirements are becoming more and more important in communication networks, and the use of encryption technology is the core of realizing secure communication. Most of the current methods are mainly based on traditional public key cryptosystem, identity-based cryptosystem (IBC, Identity-Based Cryptosystem) and certificateless cryptosystem (CLC, Certificateless Cryptosystem). However, the traditional public key cryptography system has the disadvantage of complicated certificate management. IBC and CLC do not need to use certificates. The public key and the user's private key are calculated by a trusted third party called PKG (Private Key Generator). The core of CLC is that the user's private key is composed of two parts, one part is selected by the user, an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0844H04L9/0866H04L9/0869H04L9/3073H04L9/3247H04L2209/72
Inventor 罗铭黄海凤李向军李子健
Owner NANCHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products