A Universal Hierarchical Signature Encryption System and Construction Method

A construction method and encryption system technology, applied in the field of general hierarchical signature encryption system and construction, can solve the problems of not supporting public key reuse, not supporting private key layering, etc.

Active Publication Date: 2022-03-25
SHANDONG UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing related solutions either do not support public key reuse, or do not support private key hierarchy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Universal Hierarchical Signature Encryption System and Construction Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present invention will be further described below in conjunction with the accompanying drawings and embodiments.

[0028] It should be noted that the following detailed description is exemplary and intended to provide further explanation of the present invention. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.

[0029] It should be noted that the terminology used here is only for describing specific embodiments, and is not intended to limit exemplary embodiments according to the present invention. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinations thereof.

[0030] Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a general-purpose hierarchical signature encryption system and construction method, which operates the system parameter generation algorithm of public key encryption and non-interactive zero-knowledge knowledge proof to obtain corresponding parameters, selects a one-way function F, and comprehensively obtains public parameters; generates Sign the private key and public key, calculate the one-way function value of the signature private key as a random number, run the underlying public key encryption key generation algorithm, and output the obtained decrypted private key; The public key obtained by the key generation algorithm, according to the function G and the one-way function F, constructs the one-way relationship between the signature private key and the public key, and generates the knowledge proof of the signature private key as the signature of the message; the verifier uses the public key And the message to be signed and the signature are input, the public key is parsed into an instance, the message is parsed into an auxiliary input, the signature is parsed into a certificate, and the signature is verified; the present invention can add a signature function to the public key encryption scheme of the deployed application, and convert it to Upgrade to a hierarchical signature encryption scheme.

Description

technical field [0001] The invention belongs to the technical field of communication encryption, and in particular relates to a general hierarchical signature encryption system and construction method. Background technique [0002] The statements in this section merely provide background information related to the present invention and do not necessarily constitute prior art. [0003] Public key encryption and digital signatures are the most commonly used cryptographic algorithms. In most privacy protection applications, it is necessary to use public key encryption and digital signature to provide confidentiality protection and authentication protection of communication respectively. [0004] As far as the inventor knows, the current common deployment method adopts the key separation strategy, that is, each user runs the key generation algorithm of public key encryption and digital signature separately to generate two independent key pairs. The advantage of this method is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/40
CPCH04L9/3247H04L9/3218H04L9/0825H04L63/0428H04L63/0442H04L63/083
Inventor 陈宇
Owner SHANDONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products