A re-random identification encryption and decryption method

An encryption, decryption and identification technology, applied in the field of re-random identification encryption and decryption

Active Publication Date: 2021-02-05
NAT UNIV OF DEFENSE TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] So far, there is no published literature related to a re-randomized identity encryption and decryption method that can resist the above attack (also known as identity-based replayable chosen ciphertext attack)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A re-random identification encryption and decryption method
  • A re-random identification encryption and decryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0078] Such as figure 2 Shown, the present invention comprises the following steps:

[0079] Step 1: Build an encryption and decryption system. Such as figure 1 As shown, there are four roles in the encryption and decryption system, namely key generation center, sender, receiver and public server. The encryption and decryption system consists of five modules, which are initialization module, key extraction module, encryption module, decryption module and rerandom module. The initialization module and key extraction module are deployed in the key generation center, the encryption module is deployed in the sender, the decryption module is deployed in the receiver, and the re-random module is deployed in the public server.

[0080] Step 2: The key generation center runs the initialization module, generates public parameters and master private...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a re-randomized identification encryption and decryption method, aiming to solve the security defect existing in the existing re-random identification encryption and decryption method. The technical solution is: build an encryption and decryption system consisting of an initialization module, a key extraction module, an encryption module, a decryption module and a rerandom module; the key generation center runs the initialization module, generates public parameters and master private keys, and makes the public parameters public ;The key generation center runs the key extraction module, uses the receiver's identification id to generate a private key for the receiver; the sender runs the encryption module, uses the receiver's identification id to generate ciphertext C, and sends C to the public server; the public server Run the re-random module to re-randomize C, and send the new ciphertext C' to the receiver; the receiver runs the decryption module to decrypt C'. The invention can resist the replayable selected ciphertext attack based on the logo, and the operation of the re-random module does not need the logo of the receiver, which avoids the distribution of the logo.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to an identification encryption and decryption method, in particular to a re-random identification encryption and decryption method with high security. Background technique [0002] At present, representative re-random identification encryption and decryption methods in the field of encryption include BB04 method, Waters05 method and Gentry06 method. However, these three methods can only achieve identity-resistant chosen plaintext security (ID-CPA security). In practical applications, some attackers with stronger capabilities can crack the secure encryption and decryption method of ID-CPA. The following will take the Gentry06 method as an example to illustrate. [0003] Gentry06 method: proposed by Gentry in the 2006 EuroCrypt conference. Specifically include the following steps: [0004] In the first step, the key generation center (referring to the server responsible fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/30H04L29/06H04L9/32
CPCH04L9/3066H04L9/3073H04L9/3236H04L63/0442
Inventor 陈荣茂王小峰王毅彭伟邢倩倩陈锦榕
Owner NAT UNIV OF DEFENSE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products