Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

241 results about "Signcryption" patented technology

In cryptography, signcryption is a public-key primitive that simultaneously performs the functions of both digital signature and encryption. Encryption and digital signature are two fundamental cryptographic tools that can guarantee the confidentiality, integrity, and non-repudiation. Until 1997, they were viewed as important but distinct building blocks of various cryptographic systems. In public key schemes, a traditional method is to digitally sign a message then followed by an encryption (signature-then-encryption) that can have two problems: Low efficiency and high cost of such summation, and the case that any arbitrary scheme cannot guarantee security. Signcryption is a relatively new cryptographic technique that is supposed to perform the functions of digital signature and encryption in a single logical step and can effectively decrease the computational costs and communication overheads in comparison with the traditional signature-then-encryption schemes.

Multi-receiver signcryption method based on keyless trusteeship problem of elliptic curve

ActiveCN106027239AOvercome the problem of not being able to resist malicious KGC attacksResistance to malicious KGC attacks hasKey distribution for secure communicationPublic key for secure communicationSigncryptionKey escrow
This invention discloses a multi-receiver signcryption method based on keyless trusteeship problem of elliptic curve, and solves the technical problem of private key trusteeship existed in the existing multi-receiver signcryption method. The method comprises the following steps: a user randomly selects a secret value as own private key, calculates a verification share according to own private key, and sends the verification share and own identity information to a private key generating center KGC; the private key generating center KGC generates a public key, a public key verification parameter and a public key hiding parameter of the user according to the verification share and the identity information sent by the user, and sends the public key, the public key verification parameter and the public key hiding parameter to the user; and after receiving the parameters sent by the private key generating center KGC, the user verifies the public key. Since the private key of the user is the secret value randomly selected by the user, the private key generating center KGC only knows the public key and corresponding identity information of the user, and cannot acquire the private key of the user to realize keyless trusteeship. Simultaneously, the signcryption efficiency is improved; and the bandwidth is reduced.
Owner:XIDIAN UNIV

Signcryption method from certificateless environment to identity environment

The invention discloses a signcryption method from a certificateless environment to an identity environment and belongs to the field of secure communication. In order to enable a sending end based on the certificateless environment to send messages to a receiving end based on the identity environment through the signcryption method, the signcryption method includes the steps that after system parameters are initialized, a key generation center generates a part private key DA and sends the part private key DA to the sending end, and the sending end generates a secrete value randomly based on the system parameters, and a complete private key SA and a public key PKA are arranged with the part private key DA; a private key generation center generates a private key SB and sends the private key SB to the receiving end; the sending end generates a signcryption ciphertext according to the system parameters, the identity of the sending end, the complete private key SA, the public key PKA, the identity of the receiving end and the messages m, and the ciphertext, the identity of the sending end and the public key PKA are sent to the receiving end to conduct signcryption treatment. The signcryption method is used for signcryption communication of a heterogeneous network, and end-to-end secrete, complete, certificated and undeniable services are provided for users in the certificateless environment and users based on the identity environment.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA

Certificateless multi-receiver signcryption method with multivariate-based cryptosystem

The invention discloses a certificateless multi-receiver signcryption method with a multivariate-based cryptosystem. The certificateless multi-receiver signcryption method is used for solving the technical problem of poor security of an existing certificateless signcryption method. The technical scheme includes that the method includes: firstly, using a key generation center to generate system parameters, and selecting a secure multivariable encryption algorithm to generate keys; and enabling a user U to obtain system private keys of the key generation center and generate the private keys to user keys prior to that a user Alice with the identity IDA sends signcryption messages to a user group L={ID1, ID2,...,IDt}, and accepting or refusing ciphertext sigma by means of un-signcryption. By the aid of the multivariate-based cryptosystem, high security of anti-quantum computation is achieved, and the certificateless multi-receiver signcryption method is still high in security facing attack of a quantum computer. Compared with the background art, the certificateless multi-receiver signcryption method is small in computation and high in security, has the advantages of completeness, confidentiality, unforgeability, forward security, backward security, receiver privacy protection and the like and is capable of resisting existing known attack.
Owner:NORTHWESTERN POLYTECHNICAL UNIV

Method and system for certificateless and pairing-free identity-based proxy signcryption

The embodiment of the invention provides a method and a system for certificateless and pairing-free identity-based proxy signcryption. The method mainly comprises the following steps: a sender generates a private key and a public key thereof according to common parameters of the system and identity information parameters of the sender, generates proxy information based on the private key and the public key thereof, and sends the proxy information to a proxy; after the proxy information passes verification of the proxy, the proxy generates a proxy key, performs signcryption on a message needing to be sent based on the proxy key and the common parameters of the system to obtain a signcrypted message and an intermediate parameter, and sends the signcrypted message and the intermediate parameter to a receiver; and the receiver recovers the signcrypted message with the use of the intermediate parameter and the common parameters of the system to obtain a recovered message, and verifies the recovered message. The certificateless and pairing-free identity-based proxy signcryption scheme provided by the embodiment of the invention has both signature and encryption characteristics and has the feature of proxy. A key generation center only generates part of keys of a user, no certificate is needed, and the problem of key escrow is solved.
Owner:AEROSPACE INFORMATION

Elliptic curve-based efficient and anonymous certificateless multi-receiver signcryption method

The invention discloses an elliptic curve-based efficient and anonymous certificateless multi-receiver signcryption method. The method is used for solving the technical problem in the prior art that an existing certificateless multi-receiver signcryption method is low in operation efficiency. According to the technical scheme of the invention, firstly, a user public key and a partial private key, generated by a private key generation center PKG, are sent to a user. Secondly, after the user receives the user public key and the partial private key, the user calculates its own private key. Meanwhile, the user verifies whether the received user public key and the received partial private key are valid or not. If valid, the operation is continued. Otherwise, the operation is stopped. Thirdly, the signcryption algorithm is adopted to design an elliptic curve and the ciphertext information does not include the identity information of a sender and a recipient. Finally, the ciphertext information is broadcasted. Only authorized recipients can fairly decrypt and verify the ciphertext information. According to the technical scheme of the invention, the signcryption process is designed to conduct based on the elliptic curve. Therefore, the multiplication operation on the elliptic curve is reduced, and the calculation efficiency is improved.
Owner:XIDIAN UNIV

Internet-of-vehicles-based auxiliary cloud traffic safety method

The invention discloses an internet-of-vehicles-based auxiliary cloud traffic safety method. With the method, defects of high cost and insecure communication of calculation and communication based on the existing method can be overcome. According to the technical scheme, the method comprises: firstly, a trust institution TA initializes a internet-of-vehicles communication system and issues a certificate to a service cloud (SC) and a road side unit (RSU); secondly, a user vehicle V identifies the RSU based on the certificate issued by the trust institution TA and sends encrypted route information; thirdly, the RSU verifies authenticity of the route and aggregates an actual route; fourthly, the SC decrypts the aggregated route to generate traffic guidance information; and fifthly, the user vehicle V selects a corresponding route based on the traffic guidance information. According to the invention, effectiveness of internet-of-vehicles communication can be guaranteed with less computation and communication costs; and the user route information is encrypted and signed by means of homomorphic signcryption algorithm, thereby guaranteeing privacy of the user route information. The provided method can be applied to intelligent management and intelligent dynamic information service of the traffic system.
Owner:XIDIAN UNIV

Real anonymous certificateless multi-message multi-receiver signcryption method

The invention discloses a real anonymous certificateless multi-message multi-receiver signcryption method, and the method is used for solving a technical problem that a conventional certificateless multi-message multi-receiver signcryption method is poor in practicality. The technical scheme is that the method comprises the steps: enabling a user to select a secret value as a part of a private key, calculating a part of a public key through the secret value, and then enabling a part of the public key and the identity information of the user to be transmitted to a KGC (key generation center); enabling the KGC to generate verification parameters of the corresponding part of the private key and the corresponding part of the public key, and then transmitting the parameters to the user througha safety cahnnel; verifying the validity of the corresponding parts of the private key and public key after the user receives the corresponding parts of the private key and public key: continuing to calculate a public key and a private key of the user if the validity passes the verification and disclosing the public key, or else stopping the operation. The signcryption process does not comprise the identity information of a transmitter and a receiver, and the method achieves the overall encryption of a plurality of different messages to be transmitted. Only an authorized receiver can decrypt aciphertext message, so the method is high in practicality and is high in efficiency.
Owner:XIDIAN UNIV

Heterogeneous polymerization signcryption method in Internet-of-things environment

The invention discloses a high-efficiency polymerization signcryption solution in an Internet-of-things environment, wherein the high-efficiency polymerization signcryption solution mainly settles theproblems of relatively small application range and relatively low practicability caused by relatively high calculation expenditure in an existing polymerization signcryption solution. The high-efficiency polymerization signcryption solution comprises the following realizing steps of 1, performing system initialization by a secret key generating center KGG and a certificate issuing mechanism CA; 2, registering a perception entity Ni in a CLC system and a user U in a PKI system to KGC and CA; 3, broadcasting a common random number and a public key certificate by the user U in the PKI system, and performing verification and receiving by the Ni; 4, selecting a message generating signcryption cryptograph by the perception entity Ni in the CLC system, transmitting the message generating signcryption cryptograph to an aggregator Nn for forming aggregated signcryption, and transmitting the aggregated signcryption to the user U by the aggregator Nn; and 5, performing polymerization de-signcryption and restoring corresponding plaintext information. The high-efficiency polymerization signcryption solution has isomerism and higher practicability. The high-efficiency polymerization signcryption solution can be used for smart home, intelligent traffic, intelligent medical service and intelligent industrial detection.
Owner:陕西链诚致远科技有限公司

Anonymous participant identity-based signcryption method for multiple receivers

The invention discloses an anonymous participant identity-based signcryption method for multiple receivers, solving the technical problem that the safety of the current signcryption method for multiple receivers is poor. The technical scheme comprises the steps of (1) sender signcryption: a sender IDs selects n authorization receivers ID1, ID2, ellipsis, IDn, builds an authorization receiver identity information list L={ID1, ID2, ellipsis, IDn}, constructs a signcryption ciphertext C=<Y, X, U, sigma, W, T, J>, and broadcasts the signcryption ciphertext C so as to complete signcryption operation; and (2) receiver decryption: a receiver IDi calculates h'=H4 (sigma, X, U, T, J) according to elements in the signcryption ciphertext C firstly, then judges whether an equation e (W, P)=e (X+h'Y, Ppub) is workable, decodes a message ciphertext sigma by using a symmetrical decipherment algorithm Dk() to obtain a cleartext M=DK(sigma), and completes the decryption process. The sender is anonymous through constructing a pseudo public key, meanwhile Lagrange's interpolation is adopted for fusing identity information of all the authorization receivers to realize that the identities of the authorization receivers are anonymous for non-authorization receivers, and the safety of the signcryption method for multiple receivers is improved.
Owner:XIDIAN UNIV +1

Certificateless-based signcryption method and certificateless-based signcryption system

The invention discloses a certificateless-based signcryption method and a certificateless-based signcryption system, belonging to the field of signcryption technologies. The certificateless-based signcryption method and the certificateless-based signcryption system comprise a third-party KGC (Key Generation Center partial private key generation center) and a user module, wherein the third-party module comprises an online task distributor, a partial private key generator and an Hash arithmetic unit which are connected through a secure channel; the user module comprises a user secret value generator, a user full private key generator, an offline signcryption machine, an online signcryption machine and a decipher, and the signcryption operation is carried out on a user through the steps of generating system parameters, generating a user secret value, generating a user partial private key, generating a user full private key, carrying out offline signcryption, carrying out online signcryption and decoding in sequence. According to the certificateless-based signcryption method and the certificateless-based signcryption system, signcryption effectively replaces a simple method of combining encryption and a signature through a logic unit, so that the online/offline signcryption can be implemented under the certificateless environment safely and effectively, and determination of identity of a receiver is not needed in an offline stage, and the certificateless-based signcryption method and the certificateless-based signcryption system have the advantages of high efficiency, good safety, large flexibility and strong applicability.
Owner:马鞍山城智信息技术有限公司

Anonymous signcryption method from identity public key system to certificate public key system

The invention discloses an anonymous signcryption method from an identity public key system to a certificate public key system. The anonymous signcryption method specifically comprises the steps that parameters are randomly selected from a public key function database and system public keys and system private keys of the identity public key system and the certificate public key system are generated; a public key and a private key of a user are generated according to the public keys and the private keys and the system parameters; anonymous signcryption is performed to a message by using a bilinear pair, the private key of the user of the identity public key system and the public key of the user of the certificate public key system, and a ciphertext is sent to a receiver; the receiver performs designcryption to the ciphertext according to the bilinear pair and the private key of the receiver and simultaneously authenticates the identity of a sender. The anonymous signcryption method from the identity public key system to the certificate public key system has the advantages of simple implementation process and high transmission efficiency, and can be used for realizing the confidentiality, authentication and anonymity of information transmitted from the identity public key system to the certificate public key system.
Owner:西安千喜网络科技有限公司

Signcryption method from certificateless environment to public key infrastructure environment

InactiveCN104767612ANo public parameters requiredAchieving authenticityPublic key for secure communicationCiphertextConfidentiality
The invention discloses a signcryption method from a certificateless environment to a public key infrastructure environment, and belongs to the field of secret communications. The signcyption method comprises the steps that system initialization of the certificateless environment is conducted; system initialization of the public key infrastructure environment is conducted; a secret key of a certificateless environment sender is generated; a secret key of a public key infrastructure environment receiver is generated; the certificateless environment sender generates a signcryption text sigma according to system parameters, a complete private key and public key of the sender, a public key of the receiver and a message m and sends results to the receiver; the public key infrastructure environment receiver verifies the correctness of the signcryption text sigma according to the system parameters, an identity and the public key of the sender and the public key of the receiver and decrypts the signcryption text sigma by using a private key of the receiver. The signcryption method from the certificateless environment to the public key infrastructure environment can achieve that the sender of the certificateless environment sends the signcryption text to the receiver of the public key infrastructure environment and provides confidentiality and authentication for the receiver of the public key infrastructure environment; the features that the authentication can be verified publicly and a sharing system and common parameters of the receiver and the sender are not necessary are achieved.
Owner:JIUJIANG UNIVERSITY

Signcryption method based from identity environment to certificateless environment

The invention discloses a signcryption method based from identity environment to certificateless environment, and belongs to the field of secret communication. In order to enable a sending end based on the identity environment to be capable of utilizing the signcryption method for sending messages to a receiving end based on the certificateless environment, the method comprises the steps that systematic parameters are initialized, and then a private key generation center generates a private key SA and sends the private key SA to the sending end; a secret key generation center generates a partial private key DB and sends the partial private key DB to the receiving end; the receiving end randomly generates a secrete value based on the systematic parameters, and a complete secrete key SB and a public key PKB are set according to the secrete value and the partial private key DB; the sending end generates signcryption ciphertexts according to the systematic parameters, the identity and the private key SA of the sending end, and the identity, the public key PKB and messages m of the receiving end, the ciphertexts and the identity of the sending end are sent to the receiving end, and then unsigncrypt treatment is carried out on the ciphertexts and the identity of the sending end. The method is used for signcryption communication of a heterogeneous network, and the end-to-end confidentiality, integrity, authentication and non-repudiation service is provided for a user based on the identity environment and a user based on the certificateless environment.
Owner:UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products