Deniable aggregation signcryption method

A ciphertext and collection technology, applied in key distribution, can solve problems such as high computational overhead, unfriendly equipment, and inability to protect user location information, reducing pressure, reducing computational overhead, and improving transmission efficiency.

Inactive Publication Date: 2019-09-13
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the large computational overhead of public key encryption technology, this method of signing first and then encrypting is not friendly to devices with limited resources. This problem was not solved until 1997.
Based on this idea, Basudan S et al. proposed an aggregated signcryption scheme to protect user privacy in 2017, and applied the scheme to the Internet of Vehicles based on fog computing. However, this scheme can only protect the identity privacy of users, but cannot The user's location information will not be disclosed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Deniable aggregation signcryption method
  • Deniable aggregation signcryption method
  • Deniable aggregation signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the objectives, technical solutions and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention and not to limit the present invention, that is, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. The components of the embodiments of the present invention generally described and illustrated in the drawings herein may be arranged and designed in various different configurations. Therefore, the following detailed description of the embodiments of the present invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the present invention. Based on the embodiments of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a deniable aggregation signcryption method. The deniable aggregation signcryption method comprises the following steps: step 1, setting public parameters by a system; step 2, the system generating a public key and a private key for each user; step 3, performing signcryption on the message by each sender according to the public key and the private key of the sender and the public key of the receiver, and then generating a ciphertext; step 4, aggregating all the ciphertext by the aggregator to generate an aggregated ciphertext; and step 5, the receiver carrying out unsigncryption on the aggregated ciphertext according to the public key and the private key of the receiver and the public keys of all the senders. According to the deniable aggregation signcryption methodprovided by the invention, message confidential transmission and message authenticity verification are completed, so that the calculation expenditures of a message sender and a message receiver are reduced. Besides, aiming at a many-to-one communication scene, the ciphertext data volume transmitted on the network bandwidth is reduced by means of aggregating the ciphertext. When a plurality of messages are sent, the total data volume of the ciphertext can be reduced by about 25%, the pressure of the network bandwidth is reduced, and the transmission efficiency is improved.

Description

Technical field [0001] The invention relates to the technical field of data authentication and encryption, in particular to a repudable aggregate signcryption method. Background technique [0002] Since scholars Diffie and Hellman first proposed public key encryption in their paper "New Direction in Cryptography" in 1976, the industry has always adopted signature first and then encryption as a standard practice for implementing network data encrypted transmission and identity authentication. The reason for this is because encryption can protect the confidentiality of data, and signatures can achieve identity authentication. Therefore, the computational cost of simultaneously realizing data confidential transmission and user identity authentication is the sum of the computational cost of the encryption scheme and the signature scheme. Due to the high computational overhead of public key encryption technology, this method of signing and then encrypting is not friendly to resource-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0825H04L9/3226
Inventor 廖永建张刚林刘雨露周紫君梁艺宽吴宇王栋何一川
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products