Generalized signcryption method based on certificate

A generalized, certificated technology, applied in the field of information security, can solve problems that few studies have covered

Inactive Publication Date: 2021-03-26
JIUJIANG UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] At present, generalized signcryption has achieved very rich research results, but in the aspect of certificate-based generalized signcryption, there are few studies involving

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generalized signcryption method based on certificate
  • Generalized signcryption method based on certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in detail below with reference to the accompanying drawings.

[0037] like figure 1 , 2 As shown, the present invention provides a certificate-based generalized signcryption method. In the application scenario of the generalized signcryption method, when the sender only needs confidentiality, he uses the encryption mode of the algorithm; when only authentication is required In the case of security, he uses the signature mode of the algorithm; in the case where both confidentiality and authentication are required, he uses the signcryption mode of the algorithm. The sender only needs to use one algorithm and save a pair of keys, which reduces the management overhead of keys and the complexity of system implementation. The concrete process of the present invention is as follows:

[0038] Step 1. System initialization.

[0039] The security parameter k is a positive integer; the certification center selects two prime numbers p and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a generalized signcryption method based on a certificate, and belongs to the secret communication field. The method comprises the steps that an authentication center sets system parameters; the user generates a private key and a public key of the user; the authentication center generates a certificate of the user; the sender generates a generalized signcryption ciphertext sigma according to the system parameters, the private key of the sender, the identity and public key of the sender, the identity and public key of the receiver and the message, and sends a result to the receiver; the receiver verifies the correctness of sigma according to the system parameters, the identity and the public key of the receiver, the identity and the public key of the sender and the generalized signcryption ciphertext: if the receiver is correct, the receiver decrypts the message by using the private key and the certificate of the receiver, otherwise, rejection is performed. According to the invention, a sender can realize three functions of encryption, signcryption and signcryption by only using one algorithm and only storing a pair of keys. A cryptosystem based on a certificate is adopted for implementation, the key escrow problem is solved, and the high management cost of the certificate is reduced; and a secure channel is not required between the user and the authentication center.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a certificate-based generalized signcryption method. Background technique [0002] Each user in the public key cryptosystem has a pair of keys, while the traditional public key cryptosystem is to determine the user's private key first and then calculate the user's public key, so the public key is a string of meaningless binary strings, which has nothing to do with the user's identity. Therefore, a trusted third party, a Certificate Authority (hereinafter referred to as CA), is required to issue a certificate to bind the user's public key with its identity information. During the entire life cycle of certificates from generation to destruction, the management fee is very expensive, which hinders the widespread use of traditional public key cryptosystems. [0003] In order to reduce the high cost of certificate management, Shamir proposed an identity-based...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0861H04L9/3255H04L9/3263
Inventor 周才学王凌敏邓安远
Owner JIUJIANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products