Unlock instant, AI-driven research and patent intelligence for your innovation.

Heterogeneous blind signcryption method capable of proving security

A heterogeneous and secure technology, applied in the field of key security, can solve problems such as low efficiency, few blind signcryption schemes, and large amount of computation

Pending Publication Date: 2021-07-23
LIAONING TECHNICAL UNIVERSITY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2005, Yuen T H, Wei V K. Fast and proven secureblind identity-based signcryption from pairings[C] / / Cryptographers'Track at the RSA Conference. Springer, Berlin, Heidelberg, 2005: 305-322. An efficient and A provably secure blind signcryption scheme, and the corresponding blind signcryption security model is given, but this scheme uses a total of 5 bilinear pairing operations in the blind signcryption and decryption phases, which has a large amount of calculation and relatively low efficiency. Low
[0003] Among the existing signcryption schemes, there are mostly blind signcryption schemes under a single system, and there are relatively few blind signcryption schemes under a heterogeneous environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous blind signcryption method capable of proving security
  • Heterogeneous blind signcryption method capable of proving security
  • Heterogeneous blind signcryption method capable of proving security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0029] A provably secure heterogeneous blind signcryption method, such as figure 1 shown, including the following steps:

[0030] Step 1: generate the system parameters of the heterogeneous cryptosystem;

[0031] Set the security parameter k of the heterogeneous cryptographic system, the key generation center (KGC) selects an additive cyclic group G whose order is a prime number q, the generator is P, and defines four secure hash functions H 1 -H 4 : KGC random selection As the system master key, calculate the system public key P pub =sP, public system parameters params={G,P,q,H 1 ,H 2 ,H 3 ,H 4 ,P pub} and keep s, Z q * is the integer multiplication group...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a heterogeneous blind signcryption method capable of proving security, and relates to the technical field of key security. According to the method, security parameters are used for generating system parameters and a master key, user identity information and part of public keys are used as parameters of a hash function for generating part of private keys, so that a complete key of a user in the CLPKC is generated, the key of the user in the TPKI is generated by the user himself / herself, a certificate is issued by the CA, and in the blind signcryption process, the message provider blinds the message by using the blinding factor and then sends the blinded message to the blind signcryption person, the blind signcryption person signs and returns the signed message, the message provider receives the signed message and then de-blinds the signed message, generates a ciphertext and sends the ciphertext to the receiver, and the receiver verifies the legality of the identity of the sender for the ciphertext and returns a plaintext after the verification succeeds. In the verification stage, any user private information is not needed, any trusted third party can verify, and public verification is achieved; and in the signcryption process, the signcryption person cannot see the content of the message and cannot track the ciphertext, so that blindness is achieved.

Description

technical field [0001] The invention relates to the technical field of key security, in particular to a provably secure heterogeneous blind signcryption method. Background technique [0002] Signcryption is to realize the two functions of public key encryption and digital signature in the same operation step, and to ensure the confidentiality and authentication of messages. Compared with the way that signature and encryption are completed in two steps successively, the calculation cost and communication overhead of signcryption are greatly reduced, and the safety factor and efficiency are higher. In 1997, Zheng Y.Digital signcryption orhow to achieve cost(signature&encryption)<<cost(signature)+cost(encryption)[C] / / Annual international cryptology conference. Springer, Berlin, Heidelberg, 1997:165-179. Proposed The idea of ​​signcryption, and a specific scheme design is given to meet the confidentiality and non-repudiation of messages. In 2002, Baek J, Steinfeld R, Zhe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/00H04L9/08
CPCH04L9/3257H04L9/006H04L9/083
Inventor 陈虹周沫
Owner LIAONING TECHNICAL UNIVERSITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More