Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Public key encryption and decryption method and system with double supervisors

A public key encryption, public key technology, applied in transmission systems, digital transmission systems, key distribution, can solve problems such as asset insecurity, and achieve the effect of solving supervision problems

Active Publication Date: 2020-06-30
麦希科技(北京)有限公司
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, an administrator knowing a user's private key will render the user's assets unsafe
[0007] Therefore, there is still no solution to solve the problem between user privacy protection and strict supervision in the public key cryptosystem, and this problem is crucial in the field of digital currency, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public key encryption and decryption method and system with double supervisors
  • Public key encryption and decryption method and system with double supervisors
  • Public key encryption and decryption method and system with double supervisors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Step S1: The first administrator generates system public parameters according to the security parameters, and the specific formula is:

[0067] Param←Initialize(1 λ );

[0068] Among them, 1 λ is the security parameter, Initialize is the initialization algorithm, Param is the system public parameter, Param={e,G,g,H 1 ,H 2}, symmetric bilinear map e:G×G→G T , the generator of the group G is g, and the hash function H 1 :{0, 1} 2n → {0, 1} n ; Hash function H 2 :G T →{0,1} n .

[0069] Step S2: The sender, the receiver, the first administrator and the second administrator respectively generate their own private key and public key according to the system public parameters, specifically including:

[0070] Step S21: The sender uses the secret key generation algorithm to determine the private key and public key of the sender according to the system public parameters and the first secret random number. The specific formula is:

[0071] (SK 1 , PK 1 )←KGen(Param,...

Embodiment 2

[0103] Step S1: The first administrator generates system public parameters according to the security parameters, and the specific formula is:

[0104] Param←Initialize(1 λ );

[0105] Among them, 1 λ is the security parameter, Initialize is the initialization algorithm, Param is the system public parameter, Param={e,G,g,H 1 ,H 2}, symmetric bilinear map e:G×G→G T , the generator of the group G is g, and the hash function H 1 :{0, 1} 2n → {0, 1} n ; Hash function H 2 :G T →{0,1} n .

[0106] Step S2: The sender, the receiver, the first administrator and the second administrator respectively generate their own private key and public key according to the system public parameters, specifically including:

[0107] Step S21: The sender uses the secret key generation algorithm to determine the private key and public key of the sender according to the system public parameters and the first secret random number. The specific formula is:

[0108] (SK 1 , PK 1 )←KGen(Param,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a public key encryption and decryption method and system with double supervisors. The method comprises the following steps that: a sender, a receiver, a first administrator and a second administrator respectively generate respective private keys and public keys according to system public parameters, the sender adopts an encryption algorithm to encrypt according to the system public parameter, the private key of the sender, the public key of the first administrator and the public key of the second administrator to generate a ciphertext, the receiver adopts a decryptionalgorithm to decrypt according to the system public parameter, the ciphertext and the private key of the receiver to generate a message, the first administrator generates a message by adopting a supervision algorithm according to the system public parameter, the public key of the sender, the private key of the first administrator, the ciphertext, the public key of the receiver and the public key of the second administrator, and the second administrator generates a message by adopting the supervision algorithm according to the system public parameter, the ciphertext and the private key of the second administrator by adopting a supervision algorithm, thereby realizing strict supervision of double supervisors, and solving the supervision problem in the digital currency system.

Description

technical field [0001] The invention relates to the technical field of encryption and decryption, in particular to a method and system for public key encryption and decryption with double regulators. Background technique [0002] In a cryptographic system, users expect their data to have the highest possible confidentiality and privacy protection, while administrators expect strict supervision of user data to prevent malicious users or illegal activities. Therefore, privacy protection and strict supervision seem to be irreconcilable contradictions in the cryptosystem. [0003] Protecting user privacy has great application requirements. For example, Apple has a high level of user privacy protection, and has a large number of users who register and upload private data to the Apple cloud service system. However, many domestic users will reject Baidu and other websites' requests for user data. Similarly, researchers have found that blockchain-based cryptosystems, such as Bitco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0819H04L9/0869H04L63/0442
Inventor 赵峰何畅彬钟林
Owner 麦希科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products