Rerandomizable identifier encryption and decryption method

A technology of encryption, decryption and identification, applied in the field of re-random identification encryption and decryption

Active Publication Date: 2020-10-09
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] So far, there is no published literature related to a re-randomized identity encryption and decryptio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rerandomizable identifier encryption and decryption method
  • Rerandomizable identifier encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0078] Such as figure 2 Shown, the present invention comprises the following steps:

[0079] Step 1: Build an encryption and decryption system. Such as figure 1 As shown, there are four roles in the encryption and decryption system, namely key generation center, sender, receiver and public server. The encryption and decryption system consists of five modules, which are initialization module, key extraction module, encryption module, decryption module and rerandom module. The initialization module and key extraction module are deployed in the key generation center, the encryption module is deployed in the sender, the decryption module is deployed in the receiver, and the re-random module is deployed in the public server.

[0080] Step 2: The key generation center runs the initialization module, generates public parameters and master private...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a rerandomizable identifier encryption and decryption method, and aims to solve the security defect of an existing rerandomizable identifier encryption and decryption method. According to the invention, the technical scheme is that the method comprises the steps: constructing an encryption and decryption system composed of an initialization module, a key extraction module,an encryption module, a decryption module and a re-random module; enabling the key generation center to operate the initialization module, generating a public parameter and a main private key, and disclosing the public parameter; enabling the key generation center to operate a key extraction module, and generating a private key for the receiver by adopting the identifier id of the receiver; enabling a sender to operate the encryption module, generating a ciphertext C by adopting the identifier id of the receiver, and sending the ciphertext C to the public server; enabling a public server to operate a re-randomization module to re-randomize the C, and sending the new ciphertext C' to a receiver; and enabling a receiver to operate the decryption module to decrypt the C'. According to the invention, the replayable selective ciphertext attack based on the identifier can be resisted, and the operation of the rerandom module does not need the identifier of a receiver, so the distribution ofthe identifier is avoided.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to an identification encryption and decryption method, in particular to a re-random identification encryption and decryption method with high security. Background technique [0002] At present, representative re-random identification encryption and decryption methods in the field of encryption include BB04 method, Waters05 method and Gentry06 method. However, these three methods can only achieve identity-resistant chosen plaintext security (ID-CPA security). In practical applications, some attackers with stronger capabilities can crack the secure encryption and decryption method of ID-CPA. The following will take the Gentry06 method as an example to illustrate. [0003] Gentry06 method: proposed by Gentry in the 2006 EuroCrypt conference. Specifically include the following steps: [0004] In the first step, the key generation center (referring to the server responsible fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L29/06H04L9/32
CPCH04L9/3066H04L9/3073H04L9/3236H04L63/0442
Inventor 陈荣茂王小峰王毅彭伟邢倩倩陈锦榕
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products