Time-controlled encryption method and system based on multiple time servers
A technology of a time server and an encryption method, applied in the field of information security, can solve the hidden dangers of the TRE scheme and the failure of the receiver to decrypt on time, and achieve the effect of strong security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] Such as figure 1 As shown, the embodiment of the present invention provides a time-controlled encryption method based on multiple time servers, which mainly involves three entities, namely: a sender, a receiver, and a time server; the method includes the following steps:
[0059] S101: Generate general parameters, and generate public-private key pairs of the receiver and the time server; specifically include:
[0060] S1011: According to the given security parameter λ, generate in advance the general parameters params={λ,q,G needed in the time-controlled encryption method 1 ,G 2 ,e,P,H 1 ,H 2 ,n,N}.
[0061] Specifically, G 1 Denotes the ECDLP cyclic addition group over finite fields of order q, G 2 Represents the DLP cyclic multiplicative group over a finite field of order q; q is a prime number, which is generated according to the security parameter λ; e represents a bilinear mapping, e:G 1 ×G 1 →G 2 ;P means generator, P∈G 1 ;H 1 and H 2 Indicates the ha...
Embodiment 2
[0085] In practical applications, the above-mentioned embodiment 1 may face the following situation: when one or two or a small number of time servers are down, or are attacked by an attacker, then the time server in embodiment 1 cannot generate and broadcast Time trapdoor, the receiver cannot decrypt normally on time. Therefore, the embodiment of the present invention also provides a time-controlled encryption method based on multiple time servers. In the method embodiment, the Shamir (t, n) secret sharing technology is introduced, which mainly involves five entities, which are respectively: A sender, a receiver, a time server, a time server authority and a private key generator; the method includes the following steps:
[0086] S201: Generate general parameters and a receiver's public-private key pair, specifically including:
[0087] S2011: According to the given security parameter k, pre-generate the general parameters {p, P, G needed in the time-controlled encryption metho...
Embodiment 3
[0117] In practical applications, the above-mentioned embodiment 2 may face the following situation: the time server management organization may be untrustworthy, and at this time, the key issued by the time server management organization cannot be directly used as the key of the time server. Therefore, On the basis of the above-mentioned embodiment 2, the embodiment of the present invention also provides a time-controlled encryption method based on multiple time servers. The difference from the above-mentioned embodiment 2 is that in this embodiment, each time server is using After its own temporary private key decrypts the Shamir shadow secret ciphertext through the decryption algorithm of the IBE mechanism to obtain the Shamir shadow secret, it does not directly use the obtained Shamir shadow secret itself as its own private key, but: N time servers A shared random number is obtained through secret negotiation based on the IBE mechanism, and each time server generates its ow...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


