SM2-based multi-receiver public key encryption method

A public key encryption and receiver technology, applied in the field of information security, can solve the problems of low encryption efficiency and high communication bandwidth requirements

Active Publication Date: 2020-10-30
JINAN UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above methods can meet the actual application needs in terms of security, but they are all based on traditional public key encryption methods, and have the d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM2-based multi-receiver public key encryption method
  • SM2-based multi-receiver public key encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] The SM2-based multi-recipient public key encryption method disclosed by the invention can be applied in the technical field of information security to encrypt and protect data. For example, when the sender needs to send secret information to multiple receivers in a one-to-many manner, the present invention can be used to encrypt the relevant data into ciphertext and broadcast it to multiple receivers. Each recipient obtains the corresponding ciphertext, and relies on its own private key to perform decryption operations to obtain the corresponding secret information, so as to carry out safe data sharing on the premise of ensuring user data security and efficiency.

[0023] Combine below figure 1 The specific process of an SM2-based multi-receiver public key encryption method disclosed in this embodiment will be described in detail.

[0024] A multi-recipient public key encryption method based on SM2 (the use case is shown as figure 2 shown), which mainly includes two ...

Embodiment 2

[0030] An SM2-based multi-recipient public key encryption method disclosed in the present invention can be applied to data encryption protection on a block chain. For example, in the blockchain system of the financial industry, users only want to share asset information and asset transaction information with some designated partners for commercial sharing. The present invention can be used to encrypt relevant data and then broadcast and upload it to the blockchain system. Each partner, as the recipient, obtains the corresponding user's ciphertext on the blockchain, and relies on its own private key to decrypt the operation to obtain the user's asset information, so as to carry out safe data sharing on the premise of ensuring the security of user data.

[0031] Combine below figure 1 The specific process of an SM2-based multi-receiver public key encryption method disclosed in this embodiment will be described in detail.

[0032] A multi-recipient public key encryption method b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a SM2-based multi-receiver public key encryption method. A traditional multi-receiver public key encryption method depends on a traditional public key encryption method, and has the defects of low encryption efficiency and high communication bandwidth requirement. Aiming at the defects, the invention provides the SM2-based multi-receiver public key encryption method for random number reuse, so that the method has the advantages of high encryption efficiency and low communication bandwidth requirement. A sender may encrypt a message into a ciphertext by using the method,and broadcasts the ciphertext to a plurality of receivers in a network; after receiving the ciphertext, the receivers can decrypt the ciphertext through a private key to obtain the message of the sender. According to the method, formalization proves that the safety of the RR-IND-CCA can be achieved, the calculated amount of the sender can be effectively reduced, and the actual work application requirements in the aspects of safety and efficiency are met.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SM2-based multi-recipient public key encryption method. Background technique [0002] The multi-recipient public key encryption method was first proposed by Bellare and Boldyreva et al. in the document "Public-key encryption in a multi-user setting: Security proofs and improvements". The method is extended to multiple receivers, that is, the same message is encrypted n times with n different public keys to obtain the broadcast ciphertext, and the receiver decrypts it with its own private key to obtain the message. However, in the case of multiple receivers, the sender needs to reselect the random number every time it encrypts, which requires a huge amount of calculation and reduces the overall efficiency. [0003] Subsequently, Bellare and Boldyreva et al. proposed the concept of "reproducible PKE" in the document "Multirecipient encryption schemes: How to save o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/06H04L9/00H04L9/30
CPCH04L9/0863H04L9/0869H04L9/0643H04L9/30H04L9/002
Inventor 赖俊祚黄正安翁健吴永东
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products