Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption and decryption method and device in multicast communication

A technology of multicast communication and encryption method, which is applied in the field of encryption and decryption methods and devices in multicast communication, can solve problems such as complex algorithms, large calculation overhead, and impact on transmission efficiency, and achieve small calculation, simple process, and guaranteed safe effect

Active Publication Date: 2021-04-09
ADVANCED NEW TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although there are already some encryption and decryption algorithms, these algorithms are often relatively complex, and will generate a lot of computing overhead in the case of broadcast or multicast, affecting transmission efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption and decryption method and device in multicast communication
  • Encryption and decryption method and device in multicast communication
  • Encryption and decryption method and device in multicast communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0183] According to one embodiment, the symmetric encryption unit 63 is configured to: use the initial vector IV and the message plaintext m to perform a first operation to obtain an intermediate operation result; use the symmetric key sk to encrypt the intermediate operation result; Yes, the encrypted message generating unit 66 is configured to: generate an encrypted message based on the message ciphertext C, the initialization vector IV and the w key ciphertexts.

[0184] According to one embodiment, the symmetric encryption unit 63 is configured to: generate a message verification code based on the message ciphertext C; correspondingly, the encrypted message generating unit 66 is configured to: based on the message ciphertext C, the The message verification code and the w secret key ciphertexts are used to generate an encrypted message.

[0185] According to yet another embodiment, a decryption device in multicast communication is also provided. The decryption device is dep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification provides an encryption and decryption method and device in multicast communication. The encryption method is performed by the message sender, including generating a random number k in a finite field, and performing k times multiplication on the base point of the curve in the elliptic curve on the finite field to obtain the encryption point R, and determine the symmetric key based on its abscissa key sk. Then, use the symmetric key sk to encrypt the message plaintext m with a symmetric encryption algorithm to generate the message ciphertext C. On the other hand, obtain the respective public keys Qi of the w selected receivers, use the random number k to perform multiplication operations on the points on the elliptic curve corresponding to each public key Qi, and generate the corresponding secret key ciphertext Ki. Generate an encrypted message based on at least the message ciphertext C and w key ciphertexts, and broadcast it. The specified recipient can use the multiplicative inverse of its private key di in the finite field to perform multiplication operations on the secret key ciphertext to restore the encryption point, and then restore the symmetric secret key sk to decrypt the ciphertext C.

Description

technical field [0001] One or more embodiments of this specification relate to the field of data security, and in particular to methods and devices for encryption and decryption in multicast communication. Background technique [0002] With the development of computer technology, data security has become an important issue. In many scenarios, data transmission needs to be carried out in non-secure channels. At this time, data encryption becomes a guarantee of data security. For example, as a decentralized and trustless network, the blockchain network maintains distributed ledgers jointly by multiple nodes that do not need to reach mutual trust. In the process of recording transactions and forming blocks, a large amount of data will be transmitted between nodes in the form of point-to-point transmission. In order to ensure the authenticity of data, digital signatures are often used to prevent tampering during data transmission. For the data of certain content, it is only h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08
CPCH04L9/0833H04L9/0869H04L9/3066H04L63/045H04L63/065
Inventor 周知远
Owner ADVANCED NEW TECH CO LTD