Unlock instant, AI-driven research and patent intelligence for your innovation.

A Time-controlled Encryption Security Enhancement Method Based on Random Oracle Model

A technology of time control and encryption security, which is applied to key distribution, can solve the problems of security degradation, achieve security enhancement, enhance security and effectiveness, and meet the effect of anti-quantum requirements

Active Publication Date: 2021-11-09
HENAN UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the problem that the security of the private key s of the time server gradually decreases as the number of queries increases when the attacker has a large number of plaintext and ciphertext pairs in the existing encryption scheme, the present invention provides a model based on random oracle Time-Controlled Encryption Security Enhancement Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Time-controlled Encryption Security Enhancement Method Based on Random Oracle Model
  • A Time-controlled Encryption Security Enhancement Method Based on Random Oracle Model
  • A Time-controlled Encryption Security Enhancement Method Based on Random Oracle Model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] The implementation of the present invention provides a time-controlled encryption security enhancement method (abbreviated BDH-ES-TRE) based on a random oracle model, including:

[0053] S101: The time server generates system parameters and time server public-private key pairs according to the given security parameter k and randomly selected generators;

[0054] S102: The system user generates his own user public key according to the public parameters issued by the time server;

[0055] Specifically, the public parameters mentioned in this step belong to the system parameters generated in step S101 and the parameters that can be public in the public-private key pair of the time server.

[0056] S103: The sender runs the preset encryption algorithm to obtain the ciphertext according to the given message to be sent, user public key, time server public key and release time, and sends the ciphertext to the receiver;

[0057] S104: The time server generates a random number,...

Embodiment 2

[0061] On the basis of the above-mentioned embodiment 1, the embodiment of the present invention provides a time-controlled encryption security enhancement method based on a random oracle model, including the following steps:

[0062] S201: Run the Setup algorithm: Given a security parameter k, the algorithm outputs system parameters params={k,q,G 1 ,G 2 ,e,P,H 1 ,H 2 ,n} and time server public-private key pair (ts pub ,ts priv ). Among them, G 1 is the additive group of elliptic curve discrete logarithms over finite fields, G 2 is the finite field discrete logarithm multiplicative group, G 1 with G 2 The order is a prime number q, and the mapping e:G 1 ×G 1 →G 2 is a bilinear map; the Hash function H 1 :{0,1} * →G 1 , H 2 :G 2 →{0,1} n , where n is the length of the plaintext; the time server randomly selects the generator time server private key Its corresponding public key ts pub = (P, sP), params and ts pub is a public parameter.

[0063] S202: Run ...

Embodiment 3

[0077] On the basis of the above-mentioned embodiment 1, the embodiment of the present invention provides a time-controlled encryption security enhancement method based on a random oracle model. Before introducing the method provided by the embodiment of the present invention, the following definition is made first: ξPKE=(Setup, Enc ,Dec) is a public key encryption algorithm, where:

[0078] Setup: generate the system public key and the user's public-private key pair (upk, usk) = (uP, u), P is for G 1 generator, G 1 is an additive group.

[0079] Enc: Use the user public key uP to encrypt the plaintext to obtain the ciphertext C PKE =Enc(M,uP).

[0080] Dec: Use the user's private key u to decrypt the plaintext, and get the plaintext M=Dec(C PKE ,u).

[0081] The PKE encryption schemes appearing in the present invention all default to the defined generalized public key encryption scheme, and the algorithms in the PKE scheme are represented by PKE.Setup, PKE.Enc and PKE....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a time control encryption security enhancement method based on a random oracle model. The method includes: the time server generates system parameters and a time server public-private key pair according to a given security parameter k and a randomly selected generator; the system user generates a user public key according to the public parameters issued by the time server; The message to be sent, the public key of the receiver, the public key of the time server and the release time, run the preset encryption algorithm to obtain the ciphertext, and send the ciphertext to the receiver; the time server generates a random number, and generates it according to the random number and the private key of the time server The time trapdoor, and broadcast the time trapdoor to all system users; the receiver runs the preset decryption algorithm to restore the message according to the received ciphertext, the receiver's private key and the time trapdoor corresponding to the release time. The present invention can achieve one-time encryption of the private key of the time server, greatly enhances the security of the private key of the time server, and enhances the security and effectiveness of TRE.

Description

technical field [0001] The invention relates to the technical field of time control encryption, in particular to a time control encryption security enhancement method based on a random oracle model. Background technique [0002] Timed-Release encryption (TRE, Timed-Release encryption) is a cryptographic primitive in which the sender specifies a future decryption time, that is, the sender encrypts a message and sends it to the receiver, and any user including the receiver cannot decrypt it before the specified time. Now TRE has become a basic technology, combined with a variety of other technologies, it is applied to more diversified and fine-grained scenarios to control the storage and access of sensitive data. [0003] The latest research progress shows that the realization of TRE technical means has expanded from based on mathematical problems to based on physical quantum encryption, physically indistinguishable confusing circuits and blockchain-based methods. In particul...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0822H04L9/0863H04L9/0869H04L63/06
Inventor 袁科王亚慧周黎鸣闫永航李征黄雅冰柴秀丽
Owner HENAN UNIVERSITY