Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificateless key packaging method for resisting leakage of bounded secret information

A technology of secret information and encapsulation method, applied in the field of key encapsulation system, can solve the problems of weak resistance to leakage attacks, long ciphertext length, low computational efficiency and practicability, etc., and achieves high security, high security, The effect of improving computing efficiency and practicality

Active Publication Date: 2020-08-14
SHAANXI NORMAL UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] "Leakage-Resilient Certificateless Key EncapsulationScheme.Informatica" (Lithuanian Academy of Sciences, January 2018), published by Jui-Di et al., proposed an anti-leakage certificateless key encapsulation method, which used the Complex bilinear mapping, and the length of the ciphertext is long, resulting in low computational efficiency and practicality of the construction, and the method is weak against leak attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless key packaging method for resisting leakage of bounded secret information
  • Certificateless key packaging method for resisting leakage of bounded secret information
  • Certificateless key packaging method for resisting leakage of bounded secret information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] exist figure 1 Among them, the certificateless key encapsulation method against bounded secret information leakage in this embodiment consists of the following steps.

[0065] (1) System initialization

[0066] 1) Run the group generation algorithm to generate the corresponding tuple (q, G, P), where G is an additive cyclic group whose order is a large prime number q, and P is the generator of the group G.

[0067] 2) Choose a safe hash function H, hash function H', password diffraction function KDF:

[0068]

[0069]

[0070]

[0071] Where ID is the identity of the user, is an integer group of order q.

[0072] 3) From the group of integers of order q Randomly select a finite integer a as the master private key of the system and keep it secret, and set the master public key P of the system pub , the global parameter params, and expose:

[0073] P pub = a·P

[0074] params={q,G,P,P pub ,H,H′,KDF}.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certificateless secret key packaging method for resisting the leakage of bounded secret information. The certificateless secret key packaging method comprises the steps of system initialization, user secret key generation, packaging and de-packaging. Complex bilinear mapping is not used in each step, so the operation efficiency and the practicability are improved; on thepremise of ensuring that the public parameter form is not changed, the length of the user key is increased, and the secret information leakage length tolerable by the method is increased; all elementsin the packaging ciphertext are completely random to any enemy; any enemy cannot obtain secret information of a related private key from a packaging cipher, leakage parameters are kept fixed and areirrelevant to the size of a packaging secret key space, the anti-leakage capacity is not reduced due to increase of the packaging secret key space, and high safety is still kept in a real environmentwith leakage. The method has the advantages of high safety, wide application range, high practicability and the like, and can be applied to the technical field of digital transmission with limited network environment.

Description

technical field [0001] The invention belongs to the technical field of key encapsulation systems, and in particular relates to a non-certificate key encapsulation method that resists leakage of bounded secret information. [0002] technical background [0003] In 2003, AL-Riyami and others proposed a certificateless public key cryptography system, which solved the certificate management problem under the traditional public key cryptography system, and also solved the certificate management problem based on the identity cryptography system. In recent years, the study of certificateless cryptographic primitives has attracted extensive attention from cryptography researchers. In 2007, Huang et al. proposed a new cryptographic primitive called the certificateless key encapsulation system. In the study of this cryptographic primitive, the impact of leaking secret state information on the security of the system was ignored. In a real environment, the adversary can obtain secret in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0816H04L9/0819Y02D30/50
Inventor 周彦伟胡冰洁杨波
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products