Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A key isolation signcryption method

A key and signcryption technology, applied in the field of communication, can solve the problems of non-repudiation, forward security and public verifiability

Inactive Publication Date: 2017-08-11
STATE GRID CORP OF CHINA +1
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, although Zheng's original scheme can satisfy confidentiality and verifiability, it does not satisfy non-repudiation, forward security and public verifiability; Anyone can decrypt the signcrypted ciphertext of the signcryptor's current and previous communications, thereby recovering the message

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A key isolation signcryption method
  • A key isolation signcryption method
  • A key isolation signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] If Alice writes a letter, she signs the letter, then puts the letter in an envelope, and if she puts a letter without a signature in the envelope and signs the envelope, then Bob, the recipient, has reason to fear that the letter has been Instead, if Bob shows Carol Alice's letter and envelope, Carol may sue Bob for lying because the letter is not in the right envelope. Therefore, it is natural to sign before encryption. The digital signature with encryption combines the public key algorithm and digital signature Combined, unforgeability, non-repudiation, and confidentiality of communications are simultaneously achieved. However, once the private key of Alice or Bob is leaked, all their previous or subsequent operations will no longer be safe. Therefore, the present invention introduces a key isolation mechanism, and the entire life cycle of the system is divided into discrete N time segments. Throughout the life cycle, the public keys of Alice and Bob remain unchanged,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A key-segregated signcryption method, the method sets up a trusted assistant between the computers of the message sender and the message receiver, and the assistant helps the message sender and the message receiver generate initial private keys and public keys And update the private key at the starting point of each time period. When sending a message, the message sender uses his own private key and the receiver's public key to sign-encrypt the message. After receiving the ciphertext, the message receiver uses his own private key and The sender's public key decrypts the ciphertext and restores the message. The invention combines digital signature and public key encryption into one step, and introduces the key isolation mechanism into the signcryption system, which not only saves calculation and communication costs, but also satisfies confidentiality, non-repudiation, and forward security. and public verifiability.

Description

technical field [0001] The invention relates to a digital signcryption method capable of saving calculation amount and communication cost and reducing the hazard of key leakage, which belongs to the technical field of communication. Background technique [0002] With the development of the network, online e-commerce, e-government, etc. are also booming. In order to ensure the integrity and authenticity of the information disseminated on the Internet, it is imperative to realize secure communication. Confidentiality and authentication are two basic requirements for communication. The confidentiality of transmitted messages is obtained through encryption, and the authentication of messages is realized through digital signatures. If we need to obtain confidentiality, integrity, authentication, and non-repudiation at the same time, a traditional method is to sign the message first and then encrypt it, which is called the "sign first and then encrypt" method. The calculation amo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/14
Inventor 李新宝宰洪涛常晋兵赵晋芳王军龙王威扬
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products