Certificateless parallel key isolation signcryption method

A technology without certificates and keys, applied in the field of information security and communication, to avoid certificate management and key escrow, save computing and communication costs, and avoid key escrow problems

Inactive Publication Date: 2019-04-19
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the disadvantages of the prior art, the present invention provides an efficient and safe parallel key-isolated signcryption scheme based on no certificate, which reduces the cost of expensive certificate management required by the PKI-based key-isolated signcryption scheme, and also avoids identity-based Key isolation for key escrow issues in signcryption schemes while providing frequent key update functionality without increasing the risk of key leaks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0015] Method of the present invention is made up of seven algorithms, and concrete construction process is as follows:

[0016] (1) System establishment Setup: input the safety parameter l and the total number of time periods N, and construct an additive cyclic group of prime number order q and a multiplicative cyclic group of prime order q Where q satisfies the condition q>2 160 , defining a bilinear map Let P be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a certificateless parallel key isolation signcryption method. Two different and independent assistors are imported in the configuration, the two assistors help a signcryption user and an unsigncryption user to generate initial private keys, temporary private keys can be alternately updated without affecting each other, and even the frequent update of the temporary private key of the signcryption user does not increase the leakage risk of the key of the assistor. The signcryption user performs signcryption on a plaintext by using his own private key and a public key of the unsigncryption user to generate a signcryption ciphertext; and after receiving the signcryption ciphertext, the unsigncryption user performs unsigncryption on the signcryption ciphertext by using his own private key and the public key of the signcryption user to restore the plaintext. According to the certificateless parallel key isolation signcryption method disclosed by the invention, a key isolation mechanism is imported into a certificateless signcryption scheme, which not only reduces the computation and communication costs, but also satisfies the characteristics of confidentiality, non-repudiation, parallelism and strong key isolation and the like, and also supports frequent key update without increasing the key leakage risk.

Description

technical field [0001] The present invention relates to the field of information security and communication, in particular to a certificate-free parallel key isolation signcryption method, which can not only realize the confidentiality and authentication of messages in one step, but also realize the anti-key leakage function , while allowing users to perform frequent key updates to consolidate the security of the system. Background technique [0002] With the widespread use of Internet technology and communication technology in the fields of finance, medical care, services and daily life, information security and privacy protection have also become a widely concerned issue. In order to ensure the confidentiality and authentication of information in the communication process, the confidentiality of information is generally realized by encrypting the transmitted message, and the authentication of information is realized by signing the transmitted message. In 1997, Zheng et al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0861H04L9/0866H04L9/0869H04L9/0891
Inventor 梅倩熊虎赵亚楠
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products