Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method, device and system for processing cipher text

A technology of ciphertext and secret value, applied in the field of communication, can solve the problems of poor scalability of public key infrastructure, inability to support large-scale user groups, and messages are no longer secure, etc., to achieve good scalability, flexible processing, and message security. Effect

Inactive Publication Date: 2014-03-12
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The existing ciphertext re-encryption technology has defects in collusion, that is, if user B and user C collude, they can calculate part of the private key information of user A, so that the encrypted message of user A is no longer safe
[0005] At the same time, the existing ciphertext re-encryption technology relies on the public key infrastructure (PKI), and the scalability of the public key infrastructure is poor, and it cannot support a large-scale user group.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for processing cipher text
  • Method, device and system for processing cipher text
  • Method, device and system for processing cipher text

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0039] See figure 1 , is a schematic structural diagram of a ciphertext processing system according to an embodiment of the present invention. The system in this embodiment includes: a ciphertext sending end 10 , a ciphertext receiving end 20 , and a key generation mechanism 30 . Wherein, the key generation mechanism 30 is a server for key generation and issuance. In this embodiment, the ciphertext sending end 10 is marked as the user A end, and the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose a ciphertext processing method, apparatus, and system. The method includes: selecting, by a ciphertext sending end, a random secret value; calculating a private key of a local end according to a partial private key acquired by the local end and the random secret value; calculating a proxy key according to the private key of the local end and a public key publicized by a ciphertext receiving end, where the public key publicized by the ciphertext receiving end is calculated by the ciphertext receiving end according to a random secret value selected by the ciphertext receiving end and a system public parameter; and sending the proxy key, so that the ciphertext receiving end acquires a ciphertext obtained after a re-encryption operation is performed, according to the proxy key, on a ciphertext sent by the ciphertext sending end, and performs decryption. Existing defects of a ciphertext re-encrypting technology in a collusion aspect can be effectively avoided by adopting the embodiments of the present invention, thereby better ensuring information security, and meanwhile, implementation of the present invention avoids using a public key infrastructure (PKI), thereby having better extensibility.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method, device and system for processing ciphertext. Background technique [0002] The ciphertext re-encryption technology is a technology that transforms the ciphertext without revealing the ciphertext information, and converts the received ciphertext into a ciphertext encrypted by the public key of the ciphertext receiving end. [0003] Specifically, suppose there are two users A and B, where the public key of user A is pk A , the private key is sk A ; User B's public key is pk B , the private key is sk B . Using the public / private key information of users A and B, a proxy key rk can be calculated AB . If user C holds proxy key rk AB , then user C can use pk A Encrypted messages are converted to use pk B An encrypted message, during the conversion process, User C cannot see the plaintext of the message. After the conversion is completed, user B can use his own ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3073H04L9/0819H04L9/0869H04L2209/76H04L9/30
Inventor 徐磊吴晓昕张新文
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products