Supercharge Your Innovation With Domain-Expert AI Agents!

SM9-based efficient hierarchical encryption method

An encryption method and efficient technology, applied in the field of information security, can solve the problems that the SM9 encryption algorithm cannot realize layered encryption, and achieve the effect of promoting implementation, realizing layered encryption, and reducing load

Active Publication Date: 2021-12-21
FUJIAN NORMAL UNIV
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an efficient layered encryption method based on SM9 to solve the problem that the SM9 encryption algorithm cannot realize layered encryption

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM9-based efficient hierarchical encryption method
  • SM9-based efficient hierarchical encryption method
  • SM9-based efficient hierarchical encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0043] The SM9 identification cipher algorithm is a commercial cipher independently designed by our country and has become a national standard. It has strong security and high efficiency and has been widely used in our country. The SM9 public key encryption algorithm belongs to identity encryption, and the decryption key of the user in the system is generated by a trusted key generation center. When the number of users in the system is large, the key generation center needs to generate keys for each user, and the load is heavy, which leads to low system efficiency and cannot better meet the new needs of new applications such as the Internet of Things, hinder...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM9-based efficient hierarchical encryption method, which optimizes a user key generation algorithm and an encryption algorithm on the basis of an SM9 identification encryption algorithm overall architecture, and realizes an SM9 efficient hierarchical encryption function. The cipher text is fixed in length, is composed of three elements and is irrelevant to the number of layers. The decryption key of the user can be generated by the user on the upper layer and does not need to be generated by a key generation center. The key is equivalent to a key generated by the key center. Users on the same layer cannot obtain the keys of the users on the upper layer even if collusion. According to the method, high safety and high efficiency are guaranteed, meanwhile, the load of a key generation center is effectively reduced, the system efficiency is remarkably improved, and a certain promotion effect is achieved for perfecting SM9 identification passwords.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an efficient layered encryption method based on SM9. Background technique [0002] The identification cryptosystem can effectively eliminate the certificate management and certificate verification problems in the traditional public key system. In this system, the public key of each user can be any character string that can uniquely identify the user, such as phone number, email address, etc. The user's key is generated by a trusted third-party key generation center. Since the key generation center needs to generate a key for each user, when the number of users in the system is large, the load on the key generation center is large, resulting in low system efficiency. In order to reduce the load of the key generation center without affecting the security of the user key, Horwitz and Lynn proposed the concept of hierarchical identity encryption in 2002. [0003] In a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L29/06
CPCH04L9/0861H04L9/0894H04L63/0478
Inventor 黄欣沂赖建昌郭福春何德彪
Owner FUJIAN NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More