Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Generalized signcryption method based on coding

A generalized encoding technology, applied to key distribution, can solve the problems of no longer safe security methods and no longer safe and reliable public key cryptography methods, and achieve the effects of high security, reduced key storage, and improved use efficiency

Active Publication Date: 2020-03-27
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the generalized signcryption method has relatively good functions, with the rapid development of quantum technology today, the traditional public key cryptography method will no longer be safe and reliable, which will not only cause the current security method to be no longer safe and based on the traditional public key The same is true for the generalized signcryption method of key cryptography, so how to provide a method for security protection in the quantum era is very necessary

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generalized signcryption method based on coding
  • Generalized signcryption method based on coding
  • Generalized signcryption method based on coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The present invention is described in further detail below in conjunction with accompanying drawing:

[0042] refer to figure 1 , the encoding-based generalized signcryption method of the present invention comprises the following steps:

[0043] 1) Set public parameters;

[0044] The concrete operation of step 1) is:

[0045]The public parameters are set through a unified policy server, and then broadcast to all users. Among them, the system parameters that need to be set include the security parameter k, the prime number q with a length of k bits, and the finite field GF q and two Hash functions h 1 and h 2 ,in, * represents that the lengths of 0-bit strings and 1-bit strings are arbitrary, and n and n-k are the lengths of 0-bit strings and 1-bit strings.

[0046] 2) Generate public and private keys for registered users;

[0047] The concrete operation of step 2) is:

[0048] Randomly select (n,k,d)-dimensional QC-LDPC codes on the finite field GFq, n=2 a , d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a generalized signcryption method based on coding. The generalized signcryption method comprises the following steps: 1) setting public parameters; 2) generating a public key and a private key for a registered user; 3) defining a distinguishing function, and judging the existence condition of the public key of the user; (4) carrying out signcryption operation on the transmission information, that is, the public key of the receiver is firstly used for encryption, and then the private key of the sender is used for signature; 5) carrying out unsigncryption operation on thesigncryption text, that is to say, decryption is performed by using a private key of a receiver, signature verification is carried out by using the public key of the sender to complete code-based generalized signcryption. According to the method, the conversion among encryption, signature and signcryption functions can be realized according to the existence of the public key by the users of the transmitting party and the receiving party, so that the generalized signcryption function of quantum computing resistance is realized, meanwhile, the key storage amount can be reduced, and the securityis relatively high.

Description

technical field [0001] The invention belongs to the field of network information security and relates to a coding-based generalized signcryption method. Background technique [0002] Signcryption technology can complete the encryption and authentication functions in one logical step. Compared with the traditional method of "encrypting" and then "signing" or "signing" and then "encrypting", it can consume less resources and is easy to operate. . Although the signcryption method has the function of encryption and signature, the signcryption method, the encryption method and the signature method are still different or even mutually exclusive, because the signcryption method requires both the sender and the receiver to have a key, while the encryption method only The receiver is required to have a key, and the signature method only requires the sender to have a key, and the three cannot be converted to each other. The generalized signcryption method realizes the adaptive conve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06H04L1/00
CPCH04L9/3247H04L9/0825H04L63/0428H04L63/12H04L1/0061H04L2209/72
Inventor 韩益亮王众刘镇吴旭光
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products