Intelligent household digital signcryption method and system based on asymmetric key pool

A smart home, asymmetric technology, applied in digital transmission system, transmission system, key distribution, can solve the problem of stealing information, malicious software or malicious operation stealing, cracking, etc., to achieve the effect of ensuring communication security and improving security

Active Publication Date: 2019-08-16
RUBAN QUANTUM TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The home gateway is the central network element of the smart home, and has the ability to access the Internet. It is very likely to be infected with a virus Trojan horse, thereby stealing information; or being attacked and paralyzed, resulting in the paralysis of the entire smart home solution.
[0007] (2) In the prior art, the mobile terminal key is stored in the memory of the mobile terminal, exposed to the threat of viruses and Trojan horses in the mobile terminal, and can be stolen by malicious software or malicious operations
[0008] (3) Since the quantum computer can quickly obtain the corresponding private key through the public key, the existing smart home communication method based on the public-private key is easily cracked by the quantum computer
[0009] (4) In the existing technology, the input and output of digital signatures based on public and private keys can be known by the enemy. In the presence of quantum computers, the private key may be deduced, resulting in a public-private key-based Smart home communication system hacked by quantum computer
[0010] (5) In the prior art, the smart home communication system based on the symmetric key has the problem of difficult key issuance and security loopholes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent household digital signcryption method and system based on asymmetric key pool
  • Intelligent household digital signcryption method and system based on asymmetric key pool
  • Intelligent household digital signcryption method and system based on asymmetric key pool

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] 1. M generates message signcryption based on F and sends it to S

[0095] 1.1. M takes a random number rim, uses the function FM (for example, splitting a number into three segments according to the length of 2:3:5) to act on rim to get three numbers rim1, rim2 and rim3, and then uses rim1 to encrypt from the client Take kim1 / Kim1 from the client asymmetric key pool (private key pool / public key pool) of the key card, and use rim2 to take Kim2 from the home gateway asymmetric key pool (public key pool) of the client key card.

[0096] Let xm=rim3, according to the formula km=Kim2 xm Mod p calculates the value of km, and then uses the function fm1 (for example, splitting a number into two segments according to the length of 1:1) to act on km to obtain two numbers: the first intermediate parameter km1 and the second intermediate parameter km2.

[0097] 1.2. Take the keyed hash function KH and act on the original text F and km2 to obtain the signcryption authentication co...

Embodiment 2

[0113] 1. M generates message signcryption based on F and sends it to C

[0114] 1.1. M takes a random number rim, uses the function FM (for example, splitting a number into three segments according to the length of 2:3:5) to act on rim to get three numbers rim1, rim2 and rim3, and then uses rim1 to encrypt from the client Take kim1 / Kim1 from the client asymmetric key pool (private key pool / public key pool) of the key card, and use rim2 to take Kim2 from the home gateway asymmetric key pool (public key pool) of the client key card.

[0115] Let xm=rim3, according to the formula km=Kim2 xm Mod p calculates the value of km, and then uses the function fm1 (for example, splitting a number into two segments according to the length of 1:1) to act on km to obtain two numbers: the first intermediate parameter km1 and the second intermediate parameter km2.

[0116] 1.2. Take the keyed hash function KH and act on the original text F and km2 to obtain the signcryption authentication co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an intelligent household digital signcryption method based on an asymmetric key pool. The method comprises the following steps of at a sender, extracting a parameter Kim1 froman asymmetric private key pool of a client by utilizing a random number, extracting a parameter Kim1 corresponding to the parameter Kim1 from an asymmetric public key pool of the client, extracting aparameter Kim2 from an asymmetric secret key pool of a home gateway, and calculating by utilizing the parameter Kim2 to obtain a first intermediate parameter and a second intermediate parameter; encrypting the original text F by using the first intermediate parameter to obtain a signcryption ciphertext cm; utilizing a Hash function to act on the original text F and the second intermediate parameter to obtain a signcryption authentication code rm; calculating by using the signcryption authentication code rm and the parameter kim1 to obtain a signcryption signature sm; calculating the parameterKim2 and the parameter Kim1 to obtain a calculation result, using the Hash function to act on the calculation result and the signcryption authentication code rm to obtain a signcryption signature keyrkm, and using the signcryption signature key rkm to encrypt the signcryption signature sm to obtain a parameter srkm; and combining the sender ID, the signcryption ciphertext cm, the signcryption authentication code rm and the parameter srkm, and sending as a signcryption FSM.

Description

technical field [0001] The invention relates to the technical field of smart home equipment, in particular to a smart home digital signcryption method and system based on an asymmetric key pool. Background technique [0002] With the continuous development of information technology and social economy, people's living standards have been continuously improved, and the pace of life has gradually accelerated. Residents can conveniently and quickly enjoy smart, comfortable, efficient and safe home life through mobile phones and other terminals. . With the gradual increase of home smart devices, people put forward higher requirements for the smart operation of home devices. In general smart home device communication methods, asymmetric key encryption is used to ensure data security. Asymmetric key encryption requires the use of different keys to complete the encryption and decryption operations. One is publicly released, that is, the public key, and the other is public. The use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/06H04L9/32
CPCH04L9/0825H04L9/0869H04L9/0877H04L9/0643H04L9/3242H04L9/3247H04L9/3234Y02P90/02
Inventor 富尧钟一民汪仲祥
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products