Combined hierarchical cryptographic mechanism based on pairs

A hierarchical and cryptographic technology, applied in the field of cryptography, can solve the problems of increasing the difficulty of offline optimization of signature verification and decryption operations, increasing the length of signatures or ciphertexts, and low efficiency of PKG public key interaction, so as to avoid signature or encryption. The text is too long, reduce data transmission, improve the effect of data storage mode

Pending Publication Date: 2020-04-28
湖南安方信息技术有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, if an attacker breaks a certain PKG, the attacker can forge the public and private keys of all PKGs in the lower layer of the PKG, which means that the keys of all the lower nodes of the PKG can be forged by the attacker, and the robustness of the key system is poor.
(2) Hierarchical PKG public key interaction efficiency is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Combined hierarchical cryptographic mechanism based on pairs
  • Combined hierarchical cryptographic mechanism based on pairs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below. Apparently, the described embodiments are only some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other implementations obtained by persons of ordinary skill in the art without making creative efforts fall within the protection scope of the present invention.

[0031] The specific implementation manner of the present invention will be described in detail below in combination with domain names and accompanying drawings. Such as figure 1 Shown, overall process of the present invention comprises the following steps:

[0032] S1: Top-level domain name node initialization.

[0033] A1. The top-level domain name node (referred to as the cn node in the figure) first selects three specific elliptic curves (the order is a pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a combined hierarchical cryptographic mechanism based on pairs. The mechanism comprises the following steps: S1, initializing a root PKG; S2, generating a private key; S3, performing signing; s4, performing signature verification. On the basis of an HIBC encryption mechanism, a combined public and private key idea is introduced, a data storage mode is improved, data transmission is reduced, and the robustness of the system is improved while the information transmission and signature verification efficiency is improved; a combined public key idea is introduced into generation and verification of public and private keys of the layer of the PKG, so under the condition that the PKG of a certain i layer is broken through, only the private keys of the nodes of the i + 1 layer can be forged under the PKG, the security of the nodes larger than the i + 1 layer is not affected, and the robustness of the system is greatly improved. A flat hierarchical identification password encryption and decryption and signature verification algorithm is designed, so the problem of overlong signature or ciphertext caused by interactive transmission of a plurality of PKG local layer public keys is avoided, and a support is provided for signature verification and ciphertext decryption offline optimization.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a pair-based combined hierarchical cipher mechanism. [0002] technical background [0003] IBC (Identity-Based Cryptography) technology can directly use user-related information as a public key, canceling the certificate authentication of the public key, which greatly facilitates the management and application of asymmetric cryptography. In the hierarchical HIBC (Hierarchical IBC) algorithm system, each layer of PKG (Private Key Generator) can assign the task of key generation and distribution to the lower layer PKG layer by layer, which solves the problem that the root PKG load of the private key generation mechanism in the IBC scheme is too heavy , limited scale expansion and other issues. [0004] The existing HIBC scheme based on private key superposition has the following problems: (1) The robustness of hierarchical private keys is poor. In the existing HIDC system, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0861H04L9/3247
Inventor 李彪
Owner 湖南安方信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products