Method for adaptively performing data encryption and authentication without authentication center

A data encryption technology that does not require authentication. It is used in the usage of multiple keys/algorithms, user identity/authority verification, electrical components, etc. It can solve large computing burdens, communication burdens and data expansion, increase application system space resources, and limit Technology promotion and application, to avoid the computational burden, improve the application prospects, and reduce the workload

Inactive Publication Date: 2010-12-29
WUHAN UNIV OF TECH
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In the existing application system, in order to meet the application requirements of these three situations, it is usually necessary to prepare multiple independent functional components such as encryption protection and electronic signature, which respectively meet the above three different requirements, but increases the application system The space resources consumed cannot meet the application requirements in the time and space resource-constrained environments such as embedded environment, mobile communication, wireless communication, etc.
[0008] In addition, in the actual operation process of the above three cases, due to the use of technologies such as electronic signature, key distribution and data encryption, it is strongly dependent on a trusted third-party organization as the certification center, in the electronic signature, key distribution and data encryption. In the authentication process of data encryption, the verifier and the authentication center need to complete the relevant authentication through real-time interaction, which brings a large calculation burden, communication burden, and data expansion, which not only greatly increases the workload of the system, but also reduces the system. Work efficiency cannot meet the needs of practical applications, which seriously limits the promotion and application of related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for adaptively performing data encryption and authentication without authentication center
  • Method for adaptively performing data encryption and authentication without authentication center
  • Method for adaptively performing data encryption and authentication without authentication center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Embodiments of the present invention will now be described with reference to the drawings, in which like reference numerals represent like elements.

[0022] In this embodiment, the self-adaptive data encryption and authentication method without an authentication center includes the following steps:

[0023] Step S1, determine system parameters: select a large integer p, elliptic curve E(GF(p)): y 2 =x 3 +ax+b(modp) is a safe elliptic curve defined on the finite field GF(p), a base point G is randomly selected on the elliptic curve E, and n=#E(GF(p)) is the elliptic curve E order, q is a large prime factor of n, and the private key of the key distribution center SA is SK SA , where SK SA is a random positive integer less than q-1, then the public key PK of the key distribution center SA =SK SA × G;

[0024]Step S2, the information sender and receiver, that is, the information sender A and the information receiver B, respectively execute the user registration proto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for adaptively performing data encryption and authentication without an authentication center, which comprises the following steps that: (1) system parameters are determined; (2) information is sent and received and both parties are registered; (3) a sender carries out data encryption and authentication protection operation on a plaintext message to be sent to a receiver; and (4) the receiver carries out reading and verification operation on the received data message. The step (3) is realized by computing a key parameter, computing a signature parameter, outputting an electronic signature which is equal to zero when only carrying out data encryption on the plaintext message, outputting an encrypted ciphertext which is equal to the plaintext message when only carrying out electronic signing, computing the electronic signature when carrying out both data encryption and electronic signing, carrying out encryption operation on the combination of the plaintext message and the electronic signature, combining the ciphertext, the signature parameter and the electronic signature to form a data message and sending the data message. The plaintext message can be adaptively subjected to data encryption and content integrity authentication; and the problems caused by adoption of the authentication center and a plurality of functional parts in the conventional method are solved.

Description

technical field [0001] The invention belongs to data protection technology in the fields of e-commerce, e-government, information security, etc., and in particular relates to an adaptive data encryption and authentication method without an authentication center. Background technique [0002] In various fields related to information such as e-commerce system, e-government system, information security system, network communication system, etc., data encryption technology and electronic signature technology are two extremely basic data protection technologies. Among them, data encryption technology protects the confidentiality of data. It converts data into meaningless ciphertext through encryption keys and data encryption algorithms to prevent data from being accessed by unauthorized persons. The electronic signature technology authenticates the integrity and source of the data, completely simulating the function of a handwritten signature in real life, and has the capabilitie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/14H04L29/06
Inventor 肖攸安刘泉周祖德
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products