Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Secret key isolation signcryption method

A signcryption and key technology, applied in the field of communication, which can solve the problems of non-repudiation, forward security and public verifiability.

Inactive Publication Date: 2014-09-17
STATE GRID CORP OF CHINA +1
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although Zheng's original scheme can satisfy confidentiality and verifiability, it does not satisfy non-repudiation, forward security and public verifiability; Anyone can decrypt the signcrypted ciphertext of the signcryptor's current and previous communications, thereby recovering the message

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key isolation signcryption method
  • Secret key isolation signcryption method
  • Secret key isolation signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] If Alice writes a letter, she signs the letter, then puts the letter in an envelope, and if she puts a letter without a signature in the envelope and signs the envelope, then Bob, the recipient, has reason to fear that the letter has been Instead, if Bob shows Carol Alice's letter and envelope, Carol may sue Bob for lying because the letter is not in the right envelope. Therefore, it is natural to sign before encryption. The digital signature with encryption combines the public key algorithm and digital signature Combined, unforgeability, non-repudiation, and confidentiality of communications are simultaneously achieved. However, once the private key of Alice or Bob is leaked, all their previous or subsequent operations will no longer be safe. Therefore, the present invention introduces a key isolation mechanism, and the entire life cycle of the system is divided into discrete N time segments. Throughout the life cycle, the public keys of Alice and Bob remain unchanged,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A secret key isolation signcryption method includes the steps that a credible assisting device is arranged between a computer of a message sender and a computer of a message receiver, the assisting device assists the message sender and the message receiver in generating initial private keys and initial public keys, the private keys are updated at the start point of each period, when the message sender sends messages, signcryption is conducted on the messages through the private keys of the message sender and the public keys of the message receiver, unsigncryption is conducted on the messages through the private keys of the message receiver and the public keys of the message sender after the message receiver receives ciphertexts, and the messages are recovered. According to the method, digital signature and public key encryption are combined into one step, a secret key isolation mechanism is introduced to a signcryption system, so that the calculated amount and communication cost can be saved, and the requirements for confidentiality, non-repudiation, forward security and public verifiability are met.

Description

technical field [0001] The invention relates to a digital signcryption method capable of saving calculation amount and communication cost and reducing the hazard of key leakage, which belongs to the technical field of communication. Background technique [0002] With the development of the network, online e-commerce, e-government, etc. are also booming. In order to ensure the integrity and authenticity of the information disseminated on the Internet, it is imperative to realize secure communication. Confidentiality and authentication are two basic requirements for communication. The confidentiality of transmitted messages is obtained through encryption, and the authentication of messages is realized through digital signatures. If we need to obtain confidentiality, integrity, authentication, and non-repudiation at the same time, a traditional method is to sign the message first and then encrypt it, which is called the "sign first and then encrypt" method. The calculation amo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/14
Inventor 李新宝宰洪涛常晋兵赵晋芳王军龙王威扬
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products