A kind of dazed transmission method and device based on elliptic curve

An elliptic curve and transmission method technology, applied in the field of data decryption, to achieve high-strength security, fast processing speed, and simplified calculations

Active Publication Date: 2021-07-23
梧桐链数字科技研究院(苏州)有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] d. After the user pays the electronic currency with the price of the corresponding item, he can only get the item he chooses, and knows nothing about the rest of the items

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A kind of dazed transmission method and device based on elliptic curve
  • A kind of dazed transmission method and device based on elliptic curve
  • A kind of dazed transmission method and device based on elliptic curve

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0153] On the basis of research on the scheme of inadvertent electronic envelope based on RSA, the present invention proposes a dazed transmission method based on elliptic curve to improve it.

[0154] like figure 1 As shown, it is a flow chart of the method of the present invention. The present invention provides a method of dazed transmission based on elliptic curves, comprising the following steps:

[0155] S1: The recipient uses a random algorithm to generate a private key d, and generates a public key Q based on the SM2 elliptic curve;

[0156] S2: The sender constructs multiple choice information, each choice information includes identification and information content, and only sends the identification list of the multiple choice information to the receiver;

[0157] S3: The receiver selects an identifier from the identifier list, assigns an identifier value to the selected identifier, and encrypts the selected identifier and identifier value using an elliptic curve alg...

no. 3 example

[0220] In this embodiment, the key is encrypted and decrypted, which is realized by performing an XOR operation on the key, and the length of the selection information is extended. The difference from the first embodiment is that in this embodiment, in step S1, The receiver uses a random algorithm to generate the initial private key d, and generates the initial public key Q based on the elliptic curve algorithm, and uses another method in steps S4 and S5 to realize the process of this scheme. The specific steps are as follows:

[0221] S4": The sender uses the elliptic curve algorithm to generate a key pair for each piece of selection information, uses the public key in the key pair to encrypt the corresponding selection information, and uses the encryption parameters and the initial public key Q to encrypt each The private key in the key pair is encrypted, and the ciphertext is generated based on all encrypted selection information and private key and sent to the receiver:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a dazed transmission method and device based on an elliptic curve. The method includes: S1: the receiver generates a private key d using a random algorithm, and generates a public key Q based on the SM2 elliptic curve; S2: the sender constructs multiple choice information, Each selection information includes an identification and information content, and only the identification list of the multiple selection information is sent to the receiver; S3: the receiver selects an identification from the identification list, and assigns an identification value to the selected identification, And the selected identification and identification value are encrypted using elliptic curve algorithm to generate encryption parameters, and the encryption parameters are sent to the sender; S4: the sender uses the encryption parameters and public key Q to encrypt all selected information, and encrypts the encrypted key The text is sent to the receiver; S5: The receiver uses the elliptic curve algorithm to decrypt the ciphertext transmitted by the sender, so as to obtain the information content corresponding to the selected identifier. The present invention can solve difficult problems such as privacy data protection involved in the blockchain project scenario.

Description

technical field [0001] The present invention relates to the technical field of data decryption, in particular to a dazed transmission method and device based on elliptic curves. Background technique [0002] With the gradual entry of computers and networks into the lives of the masses, various information systems have been widely used. In the field of electronic commerce, how to protect the interests of all parties involved in transactions is becoming increasingly important. Consumers conducting online transactions are required to provide some authentication, most commonly credit card numbers or account names, which can reveal a consumer's identity. Therefore, how to realize the privacy protection of private data has become a concern in the information society. [0003] Oblivious Transfer (Oblivious Transfer OT) is a cryptographic protocol that can protect privacy, also known as Oblivious Transfer Protocol. It enables the parties involved in the agreement to transfer messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08G06Q30/02G06Q30/06
CPCG06Q30/0222G06Q30/0615G06Q30/0617H04L9/0852H04L9/3066H04L63/0407H04L2209/463H04L2209/466H04L2209/50H04L2209/56H04L2209/76
Inventor 陈序毛秀泽龚生智叶蔚万强马小峰
Owner 梧桐链数字科技研究院(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products