Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificate-based agent heavy encryption method and system

A proxy re-encryption and certificate technology, applied to public keys for secure communications, user identity/authority verification, and key distribution, can solve key escrow, complex certificate management, key escrow, and key distribution issues

Inactive Publication Date: 2014-03-19
HOHAI UNIV
View PDF5 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing proxy re-encryption methods are proposed under the traditional public key cryptosystem or identity-based cryptosystem, so these methods either have complex certificate management problems, or key distribution and key escrow problems.
However, although the certificateless proxy re-encryption method proposed by Sur et al. effectively solves the complex certificate management and key escrow problems, it still has the problem of key distribution.
Therefore, the application of existing proxy re-encryption methods in open network environments will be limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificate-based agent heavy encryption method and system
  • Certificate-based agent heavy encryption method and system
  • Certificate-based agent heavy encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0047] The certificate-based proxy re-encryption method of the present invention can be realized based on bilinear pairing. The basic definition of bilinear pairing and the properties it satisfies will be briefly introduced below.

[0048] Let G be an additive cyclic group of order p, G T is a multiplicative cyclic group of order p, and P is a generator of the group G, where p is a large prime number. Suppose G and G T The discrete logarithm problem on both groups is hard. If defined in group G and group G T Previous mapping e:G×G→G T Satisfy the following three properties, then the mapping is called a valid bilinear pairing. Bilinear pair e: G×G→G T is the Cartesian product G×G of the group G and itself to the group G T The mapping, that is, the bilinear pairing e:G×G→G T refers to the function z=e(P 1 ,P 2 ), where P 1 ,P 2 ∈G is an i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of data encryption in information security, and discloses a certificate-based agent heavy encryption method and system, for solving the defect of a conventional agent heavy encryption method. The invention provides a certificate-based agent heavy encryption method by combining a certificate password system and agent heavy encryption. The method comprises the steps of generating system parameters, generating a user public key and private key pair, generating a user certificate, encrypting messages, generating agent heavy encryption secret key, agent heavy encrypting and message recovery. The invention also provides a certificate-based agent heavy encryption system. The system comprises a system parameter generation module, a user secret key generation module, a certificate generation module, an encryption module, an agent heavy encryption secret key generation module, an agent heavy encryption module and a decryption module. The technical scheme provided by the invention not only simplifies a certificate management process, but also eliminates the problems of secret key distribution and secret key hosting and facilitates application in open network environment.

Description

technical field [0001] The invention relates to the technical field of data encryption in information security, in particular to a certificate-based proxy re-encryption method and system. Background technique [0002] With the rapid development of information technology, the security of electronic data has been paid more and more attention by data owners. Data encryption technology is the core and key technology to ensure the confidentiality of electronic data. It converts data into meaningless ciphertext through encryption keys and encryption algorithms, thereby preventing data from being accessed by unauthorized persons and effectively ensuring data confidentiality. . [0003] Decryption authorization is often encountered in real society. For example, a company manager needs to go on a business trip. In order not to affect the company's business, the manager needs to entrust a reliable assistant to help him handle some business-related encrypted emails during his busines...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32
Inventor 陆阳李继国
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products