Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for combining identity-based cryptography and conventional public key cryptography

A public key cryptography system and identification cryptography technology, applied in the direction of public key of secure communication, user identity/authority verification, etc., which can solve the problems of public key cryptography system limitation, loss of user identification and private key, and information leakage.

Inactive Publication Date: 2011-10-12
BEIJING ZTE DIGITAL TECH
View PDF2 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Correspondingly, the ciphertext generated by the identification cryptosystem can be decrypted in the key center, and there is a risk of information leakage
The second is the problem after the user ID private key is lost
[0013] Assuming that the key center is trustworthy, that is, although the key center can calculate the user's identity private key, it will not replace the user's public key. CBE, SC-PKC, and CL-PKC can all solve the identity password The private key escrow problem of the system, but the public key cryptosystem adopted by them is limited by the original identification cryptosystem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for combining identity-based cryptography and conventional public key cryptography
  • Method for combining identity-based cryptography and conventional public key cryptography
  • Method for combining identity-based cryptography and conventional public key cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Various details involved in the technical solution of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be pointed out that the described embodiments are only intended to facilitate the understanding of the present invention, rather than limiting it in any way.

[0041] see figure 1 , a block diagram of the components of the present invention. Firstly, an identification signature is generated, and then based on the identification signature, operations such as message signature, verification of message signature, encryption of message, decryption and restoration of message can be performed.

[0042] figure 1 Generating Identity Signatures section in , see figure 2 , the user first obtains the identification private key d_ID from the key center of the identification cryptosystem, such as BF-IBE, SK-IBE, etc., assuming that the signature and verification algorithms of the selected identification cryptosyste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for combining an identity-based cryptography and a conventional public key cryptography. Potential hazards in the private key hosting of the identity-based cryptography can be solved. Compared with other similar methods such as certificate-based encryption (CBE), a certificateless public key cryptography (CL-PKC) or a self-certified public key cryptography (SC-PKC), the method has the advantage of avoiding the limitations of the public key cryptography. The method provided by the invention comprises a signature method and an encryption method. The signature method comprises the following three steps of: 1, generating an identity signature; 2, generating a message signature; and 3, verifying the message signature. The encryption method comprises the following three steps of: 1, generating the identity signature; 2, encrypting a message; and 3, decrypting and recovering the message.

Description

technical field [0001] The invention belongs to the field of information security, and in particular relates to public key encryption technology and identification or identity-based encryption technology. Background technique [0002] Public key cryptography is a widely used technology for encrypting files, messages and other information sent to designated recipients. The system using this cryptographic technology needs to generate a pair of mathematically related public key and private key for each user. The public key is publicly released in a certain way, so that any sender can obtain the receiver's public key and private key. It is then kept secret by the recipient. [0003] An important security in the application of public key cryptography is to ensure that the public key used exactly belongs to the designated recipient, that is, a security mechanism that binds the user identification (ID) and its public key is required. [0004] In traditional public key cryptosyste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
Inventor 周苏静王勇刚
Owner BEIJING ZTE DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products