Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Construction Method of One-time Public Key Anonymous Signcryption

A construction method and one-off technology, applied in the field of information security, which can solve the problems of inability to determine the identity of malicious users, inability to resist malicious attacks by trusted centers, and lack of traceability.

Inactive Publication Date: 2016-02-03
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] In view of the problems existing in the above-mentioned prior art, the purpose of the present invention is to provide a construction method of one-time public key anonymous signcryption, which solves the existing problems in the prior art: excessive certificate management overhead in the certificate-based public key system; long-term Using the same identity will expose the user’s sensitive information; lack of traceability, the identity of malicious users cannot be determined; illegal users can forge private keys and certificates, and create signatures for deception; registered and non-registered users can forge signatures; in a pervasive environment The receiving side faces the threat of a one-time attack by malicious entities; it cannot resist malicious attacks by trusted centers and other issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Construction Method of One-time Public Key Anonymous Signcryption
  • A Construction Method of One-time Public Key Anonymous Signcryption
  • A Construction Method of One-time Public Key Anonymous Signcryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The technical solution of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0062] 1. Description of symbols

[0063] The symbols involved in the text are shown in Table 1 below

[0064] Table 1 Symbol Description

[0065]

[0066]

[0067] Two, the embodiment

[0068] exist Figure 3 to Figure 7 Among them, for the convenience of explanation, i=A or B in the figure, that is:

[0069] Table 2 Figure 3 to Figure 7 Explanation of Chinese symbols

[0070]

[0071]

[0072] Such as figure 2 Shown: Let G 1 , G 2 are respectively the cyclic addition group and the cyclic multiplication group generated by P, P is a point on the elliptic curve, the elliptic curve is an algebraic curve, and the equation of the elliptic curve is: y 2 =x 3 +ax+b, where a and b are constants; the elliptic curve has no singularity, no sharp point or self-intersection. G 1 , G 2 The discr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a construction method for one-time anonymous signcryption of public key and aims to complete the construction method for the one-time anonymous signcryption of the public key by the aid of a computer system. The computer system comprises a UA (user A), a UB (user B) and a TC (trusted center), and the UA, the UB and the TC are mutually communicated. The construction method includes seven steps of 1), generating computer system public key; 2), generating user partial secret key; 3), generating user secret key; 4), generating one-time public key; 5), subjecting the one-time public key to validity verification; 6), performing signcryption; 7), unsigncrypting. Compared with the prior art, the construction method has both anonymity and traceability, and can effectively prevent one-time attacks of malicious users and untrusted attacks from the TC inside a system. Meanwhile, the construction method has high computational efficiency and low communication costs as compared with conventional methods.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a construction method of anonymous signcryption with a one-time public key. Background technique [0002] Due to the openness and sharing of the network, it is vulnerable to various malicious attacks. Network users often face security issues such as passwords, account numbers and other important information disclosure, loss or damage to data integrity during communication and transmission. To protect sensitive data transmitted by users, there are usually ways such as certificate-based public key system, identity-based and blind signature. [0003] CertificateBasedPublicKeyCryptosystem refers to the user U i According to its own private key s i Calculate and generate public key P i , and then submit a certificate application to the trusted certificate authority CA (CerrificateAuthentication) to obtain the issued certificate Cert i . This certificate a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 张龙军夏昂郭程许钟华张璐麟
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products