Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for encrypting and decrypting broadcast of network information

A technology for encryption, decryption, and network information, which is applied in the field of ensuring information security in network information broadcasting, can solve problems such as complex algorithms, and achieve the effect of simple decryption algorithms, strong practicability, and simple encryption algorithms

Inactive Publication Date: 2007-12-26
JIANGSU WENTRY TECH
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Technical problem: The purpose of the present invention is to provide an encryption and decryption method for network information broadcasting to solve the problem of complex algorithms in the broadcasting process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting and decrypting broadcast of network information
  • Method for encrypting and decrypting broadcast of network information
  • Method for encrypting and decrypting broadcast of network information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] As shown in Figure 1, the method for encrypting and decrypting network broadcast information provided by the present invention is that users in the network are recorded as Idi, i is a natural number, and each user Idi has a pair of keys (Qi, Si), and Qi is the user Idi’s Ha Western function value, Si is the key; the encryption and decryption method of the network information broadcast adopts the asymmetric encryption algorithm of the identity identification, and the parameter in the asymmetric encryption algorithm is: π={q, G 1 , G 2 , n, P, P pub , H 1 , H 2 }, where q is a randomly generated prime number, G 1 And G 2 Are two groups of order q, such as G 1 Is the additive group, G 2 Is the subtraction group, Is a bilinear function operation, n is the length of the plaintext, P and P pub For G 1 Element in H 1 And H 2 Is a hash function; plaintext space M = {0, 1} n , Randomly selected r ∈ Z q * ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method for encrypting and decrypting a network broadcast comprises: after first encryption, getting n intermediate results QV1,QV2......QVN. Said first encryption comprises: 11) figuring out the value Qi of the hash function H1 of the user Idi in network, namely Qi= H1(Idi); 12) after encryption, figuring out n intermediate results, namely QV1,QV2......QVN; The decryption process is a process of solving a linear equation system.

Description

Technical field [0001] The present invention relates to a method for guaranteeing network information security, in particular to a method for guaranteeing information security in network information broadcasting. Background technique [0002] In recent years, the Internet and communication networks have developed rapidly on a global scale. It has had a great impact and changes on the way of life of human society, and the subsequent network information security issues have become more and more important. , Especially the security of multicast and broadcast information needs more effective protection means. The encryption method of broadcast information has always been a hotspot of research. [0003] There are two main encryption methods: symmetric encryption algorithm and asymmetric encryption algorithm. The symmetric encryption algorithm has only one key, and the amount of calculation for encryption and decryption is small, but the management of the key is more complicated becaus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/28
Inventor 杨庚陈建新王江涛陈珊珊
Owner JIANGSU WENTRY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products