Supercharge Your Innovation With Domain-Expert AI Agents!

SM9-based fuzzy identity-based encryption method

A technology based on encryption and identity, applied in the field of information security, which can solve problems such as data transmission errors

Active Publication Date: 2022-02-11
FUJIAN NORMAL UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a fuzzy identity-based encryption method based on SM9 to solve the problem that errors occur in the data transmission process that cannot be realized by the SM9 identification encryption algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SM9-based fuzzy identity-based encryption method
  • SM9-based fuzzy identity-based encryption method
  • SM9-based fuzzy identity-based encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application.

[0046] Such as Figure 1 to Figure 3 As shown in one of them, the most critical idea of ​​the present invention is: based on the SM9 identification encryption scheme, the identification of the user in the identification encryption scheme is expressed as a set of descriptive attributes, combined with the threshold cryptography technology, when the attribute set corresponding to the key and the encryption key When the number of common attributes between the attribute sets corresponding to the text reaches the threshold value, it can be decrypted, so a fuzzy identity-based encryption scheme based on SM9 with fault tolerance to identity information is proposed. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SM9-based fuzzy identity-based encryption method. The method comprises the following steps that: S1, a key generation center generates a system parameter according to an SM9 algorithm, sets a threshold value, and discloses the generated system parameter to a user in a system; S2, the key generation center generates main public and private keys of the system according to the attribute space of the user, discloses the main public key to the user in the system, and stores the main private key; S3, the key generation center outputs a private key of the user corresponding to an attribute set according to the attribute set corresponding to the user identity and the main public and private keys of the system; S4, a sender obtains an encrypted ciphertext of a to-be-encrypted message under the attribute set according to the attribute set corresponding to the identity of a receiver, the to-be-encrypted message and the system public key; and S5, after the receiver obtains the ciphertext, the receiver compares the attribute set represented by the identity of the receiver with the attribute set used by the ciphertext, when the number of common attributes in the two attribute sets reaches a preset threshold value, correct decryption can be carried out, otherwise, the decryption fails. The method supports a SM9-based fuzzy identity base-based encryption scheme and is widely applied to encryption scenes needing error correction capability.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SM9-based fuzzy identity-based encryption method. Background technique [0002] In recent years, with the rapid development of the Internet of Things, people have paid more and more attention to security issues in the Internet of Things, especially how to transmit data safely and how to deal with errors that often occur during data transmission. Passwords are used to process data encryption. Commonly used means, the traditional encryption technology is public key encryption, but public key encryption requires a third party to issue a certificate, and when encrypting, the encryptor needs to obtain the receiver's certificate first, which brings about the management and maintenance of certificates. In order to effectively Troubleshoot certificate issues. [0003] Shamir first proposed the concept of identity encryption in 1984. Identity encryption is a cryptographic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08
CPCH04L9/0861H04L9/083H04L9/0869Y02D30/50
Inventor 黄欣沂刘晓红伍玮何德彪
Owner FUJIAN NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More