Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for re-encryption based on certificate proxy

A proxy re-encryption and certificate technology, which is applied to the public key of secure communication, user identity/authority verification, and key distribution, and can solve the problems of key escrow, complex certificate management, complex certificate management and key escrow.

Inactive Publication Date: 2016-07-06
HOHAI UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most of the existing proxy re-encryption methods are proposed under the traditional public key cryptosystem or identity-based cryptosystem, so these methods either have complex certificate management problems, or key distribution and key escrow problems.
However, although the certificateless proxy re-encryption method proposed by Sur et al. effectively solves the complex certificate management and key escrow problems, it still has the problem of key distribution.
Therefore, the application of existing proxy re-encryption methods in open network environments will be limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for re-encryption based on certificate proxy
  • A method and system for re-encryption based on certificate proxy
  • A method and system for re-encryption based on certificate proxy

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0047] The certificate-based proxy re-encryption method of the present invention can be realized based on bilinear pairing. The basic definition of bilinear pairing and the properties it satisfies will be briefly introduced below.

[0048] Let G be an additive cyclic group of order p, G T is a multiplicative cyclic group of order p, and P is a generator of the group G, where p is a large prime number. Suppose G and G T The discrete logarithm problem on both groups is hard. If defined in group G and group G T Previous mapping e:G×G→G T Satisfy the following three properties, then the mapping is called a valid bilinear pairing. Bilinear pair e: G×G→G T is the Cartesian product G×G of the group G and itself to the group G T The mapping, that is, the bilinear pairing e:G×G→G T refers to the function z=e(P 1 ,P 2 ), where P 1 ,P 2 ∈G is an i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certificate-based proxy re-encryption method and system, and relates to the technical field of data encryption in information security. In order to solve the deficiencies in existing proxy re-encryption methods, the present invention combines certificate-based cryptosystem and proxy re-encryption to provide a certificate-based proxy re-encryption method, which includes generating system parameters and generating user public keys and private key pair, generate user certificate, encrypt message, generate proxy re-encryption key, proxy re-encryption, and recover message. The invention also provides a certificate-based proxy re-encryption system, including a system parameter generation module, a user key generation module, a certificate generation module, an encryption module, a proxy re-encryption key generation module, a proxy re-encryption module and a decryption module. The technical scheme of the invention not only simplifies the certificate management process, but also does not have the problems of key distribution and key trusteeship, and is convenient for application in an open network environment.

Description

technical field [0001] The invention relates to the technical field of data encryption in information security, in particular to a certificate-based proxy re-encryption method and system. Background technique [0002] With the rapid development of information technology, the security of electronic data has been paid more and more attention by data owners. Data encryption technology is the core and key technology to ensure the confidentiality of electronic data. It converts data into meaningless ciphertext through encryption keys and encryption algorithms, thereby preventing data from being accessed by unauthorized persons and effectively ensuring data confidentiality. . [0003] Decryption authorization is often encountered in real society. For example, a company manager needs to go on a business trip. In order not to affect the company's business, the manager needs to entrust a reliable assistant to help him handle some business-related encrypted emails during his busines...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
Inventor 陆阳李继国
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products