Unlock instant, AI-driven research and patent intelligence for your innovation.

Time-controlled encryption method and system based on multiple time servers

A technology of a time server and an encryption method, applied in the field of information security, can solve the hidden dangers of the TRE scheme and the failure of the receiver to decrypt on time, and achieve the effect of strong security

Active Publication Date: 2022-04-29
HENAN UNIVERSITY
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the problem that the existing TRE scheme relies on a single time server and has security risks or the receiver cannot decrypt on time, the present invention provides a time-controlled encryption method and system based on multiple time servers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Time-controlled encryption method and system based on multiple time servers
  • Time-controlled encryption method and system based on multiple time servers
  • Time-controlled encryption method and system based on multiple time servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0058] Such as figure 1 As shown, the embodiment of the present invention provides a time-controlled encryption method based on multiple time servers, which mainly involves three entities, namely: a sender, a receiver, and a time server; the method includes the following steps:

[0059] S101: Generate general parameters, and generate public-private key pairs of the receiver and the time server; specifically include:

[0060] S1011: According to the given security parameter λ, generate in advance the general parameters params={λ,q,G needed in the time-controlled encryption method 1 ,G 2 ,e,P,H 1 ,H 2 ,n,N}.

[0061] Specifically, G 1 Denotes the ECDLP cyclic addition group over finite fields of order q, G 2 Represents the DLP cyclic multiplicative group over a finite field of order q; q is a prime number, which is generated according to the security parameter λ; e represents a bilinear mapping, e:G 1 ×G 1 →G 2 ;P means generator, P∈G 1 ;H 1 and H 2 Indicates the ha...

Embodiment 2

[0085] In practical applications, the above-mentioned embodiment 1 may face the following situation: when one or two or a small number of time servers are down, or are attacked by an attacker, then the time server in embodiment 1 cannot generate and broadcast Time trapdoor, the receiver cannot decrypt normally on time. Therefore, the embodiment of the present invention also provides a time-controlled encryption method based on multiple time servers. In the method embodiment, the Shamir (t, n) secret sharing technology is introduced, which mainly involves five entities, which are respectively: A sender, a receiver, a time server, a time server authority and a private key generator; the method includes the following steps:

[0086] S201: Generate general parameters and a receiver's public-private key pair, specifically including:

[0087] S2011: According to the given security parameter k, pre-generate the general parameters {p, P, G needed in the time-controlled encryption metho...

Embodiment 3

[0117] In practical applications, the above-mentioned embodiment 2 may face the following situation: the time server management organization may be untrustworthy, and at this time, the key issued by the time server management organization cannot be directly used as the key of the time server. Therefore, On the basis of the above-mentioned embodiment 2, the embodiment of the present invention also provides a time-controlled encryption method based on multiple time servers. The difference from the above-mentioned embodiment 2 is that in this embodiment, each time server is using After its own temporary private key decrypts the Shamir shadow secret ciphertext through the decryption algorithm of the IBE mechanism to obtain the Shamir shadow secret, it does not directly use the obtained Shamir shadow secret itself as its own private key, but: N time servers A shared random number is obtained through secret negotiation based on the IBE mechanism, and each time server generates its ow...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a time control encryption method and system based on multiple time servers. The method comprises the following steps: step 1, a sender sets decryption time T, encrypts a to-be-sent file M to obtain a ciphertext C of the to-be-sent file M, and sends the ciphertext C to a receiver before the decryption time T; 2, when the decryption time is T, the N time servers simultaneously release time trap doors of the time servers; step 3, the receiver receives the ciphertext C before the decryption time T; and when the time T is decrypted, the time trapdoors published by the N time servers are obtained, and then the ciphertext C is decrypted in combination with the time trapdoors of the time servers. According to the method, the number of the time servers is increased from 1 to N, in the scene of multiple time servers, for a dishonest receiving party, all the time servers need to be corrupted instead of corrupting only one time server, and compared with a single time server TRE scheme, the scheme of the invention is higher in security.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a time-controlled encryption method and system based on multiple time servers. Background technique [0002] In real life, there are many similar application scenarios: the sender completes the encryption operation of the message and sends it to the receiver in advance, but the receiver can only decrypt it at a specified time in the future, such as sealed bidding, regular release of film and television works, etc. How to provide security solutions for these application scenarios with time characteristics? As a cryptographic primitive with the feature of "sending a message to the future", Timed-Release Encryption (TRE) technology can solve this problem. TRE is a cryptographic technology that incorporates time factors. The ciphertext can only be decrypted in the future, and it also has the additional property of combining other cryptographic technologies. [0003] Th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/40
CPCH04L63/0428H04L63/0442H04L9/0847H04L9/3073H04L9/0869H04L9/085
Inventor 袁科程自伟汤茜何源杨龙威翟晨旭陈曦
Owner HENAN UNIVERSITY