Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for encrypting and authenticating efficient data without authentication center

A data encryption technology that does not require authentication. It is used in user identity/authority verification and key distribution. It can solve problems such as large computing burden, communication burden and data expansion, inability to perform offline data protection operations, and restrict technology promotion and application. Avoid the computational burden, reduce the workload, and have a good application prospect.

Inactive Publication Date: 2010-12-29
WUHAN UNIV OF TECH
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in practical applications, since such methods use technologies such as electronic signatures, data encryption, and key distribution, they strongly rely on a trusted third-party organization as the certification center, in the authentication of electronic signatures, data encryption, and key distribution. In the process, the verifier and the certification center need to complete the relevant certification through real-time interaction, which not only brings a large calculation burden, communication burden and data expansion, but also limits the occasion of online operation, resulting in increased workload of the system. The work efficiency is reduced, offline data protection operations cannot be performed, and the needs of practical applications cannot be met, which seriously limits the promotion and application of related technologies.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting and authenticating efficient data without authentication center
  • Method for encrypting and authenticating efficient data without authentication center
  • Method for encrypting and authenticating efficient data without authentication center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Embodiments of the present invention will now be described with reference to the drawings, in which like reference numerals represent like elements.

[0020] In this embodiment, the efficient data encryption and authentication method without an authentication center includes the following steps:

[0021] Step S1, determine system parameters: select a large integer p, elliptic curve E(GF(p)): y 2 =x 3 +ax+b(modp) is a safe elliptic curve defined on the finite field GF(p), a base point G is randomly selected on the elliptic curve E, and n=#E(GF(p)) is the elliptic curve E order, q is a large prime factor of n, and the private key of the key distribution center SA is SK SA , where SK SA is a random positive integer less than q-1, then the public key of the key distribution center SA is PK SA =SK SA × G;

[0022] Step S2, the information sender and receiver, that is, the information sender A and the information receiver B, respectively execute the user registration pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting and authenticating efficient data without an authentication center, which comprises the following steps of: (1) determining system parameters; (2) registering information receiving and transmitting parties; (3) performing data encryption and authentication protection on plaintext messages to be sent to a receiver by a sender; and (4) reading and authenticating the received data messages by the receiver, wherein in the step (3), ciphertexts, signature parameters and electronic signatures are combined by calculating secret key parameters, calculating the ciphertexts and the signature parameters on the plaintext messages according to the secret key parameters and calculating the electronic signatures according to the plaintext messages, the signature parameters and the like to form and send the data messages. Through the method of the invention, data encryption and the authentication of content integrity on the plaintext messages can be performed simultaneously and efficiently, and a series of problems caused by adopting the authentication center in the conventional method can be prevented.

Description

technical field [0001] The invention relates to data protection technology in the fields of e-commerce, e-government, information security and network communication, in particular to an efficient data encryption and authentication method without an authentication center. Background technique [0002] In various fields related to information such as e-commerce system, e-government system, information security system, and network communication system, data encryption technology and electronic signature technology are two basic data protection technologies. Among them, data encryption technology protects the confidentiality of data. It converts data into meaningless ciphertext through encryption keys and data encryption algorithms to prevent data from being accessed by unauthorized persons. The electronic signature technology authenticates and protects the integrity and source of data, completely simulating the functions of handwritten signatures in real life, and has the capab...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L29/06
Inventor 肖攸安刘泉周祖德
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products