Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity based aggregate signcryption method

A technology of identity and signcipher text, applied in the field of identity-based aggregated signcryption, which can solve the problems of poor scalability and achieve the effects of increasing processing speed, reducing length, and improving information transmission efficiency

Inactive Publication Date: 2014-10-22
ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
View PDF1 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, currently existing signciphertext aggregation signcryption schemes can only aggregate one of the three parameters of the signciphertext, that is, mainly aggregate the data related to the signature, but cannot aggregate the data related to the ciphertext, so Although the total amount of signed ciphertext data after aggregation has been reduced, it will still increase rapidly with the increase in the number of senders, and the scalability is relatively poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity based aggregate signcryption method
  • Identity based aggregate signcryption method
  • Identity based aggregate signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0038] like figure 1 , 2 As shown, the present invention provides an identity-based aggregatable signcryption method. In the application scenario of the aggregatable signcryption method for signcryption, there are n peer-to-peer senders, and each sender is responsible for the corresponding plaintext message Independently generate signciphertext; have an aggregator responsible for aggregating signciphertext, and the aggregator can be undertaken by any sender, or by a gateway node that is directly connected to all senders; there is a receiver that receives all , and perform decryption, signcryption and verification operations on the aggregated signciphertext, including the following steps:

[0039] Step 1: The key generation center sets the public parameters of the system, and generates keys for each user before broadcasting;

[0040] (1) The key generation center s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identify based aggregate signcryption method. The identify based aggregate signcryption method includes the following steps that (1) a key management center sets system public parameters and produces user keys; (2) each sending party signcrypts respective data to produce a signcryption text; (3) an aggregate party aggregates all signcryption texts to produce aggregated signcryption texts; (4) a receiving party verifies the aggregated signcryption texts. According to the identify based aggregate signcryption method, three parameters in the signcryption texts of each sending party are aggregated, and the data size of the entire signcryption texts is totally the same as that of a single signcryption text; meanwhile, the receiving party can achieve verification of all the signcryption texts only through once verification operation, and the calculated amount of the verification of all the signcryption texts is basically equivalent to that of the verification of the single signcryption text; confidentiality, integrality, and authentication can be simultaneously achieved in the aspect of safety; the defect of low efficiency caused by the fact that each sending party sends the signcryption texts and the receiving party verifies the signcryption texts one by one in traditional methods is overcome, and higher transmission efficiency and computational efficiency are achieved.

Description

technical field [0001] The invention belongs to the field of data confidentiality and authentication in a communication network, in particular to an identity-based aggregatable signcryption method. Background technique [0002] With the continuous development and wide application of computer communication network technology, secure communication among multiple users has become one of the main communication methods, especially in wireless network communication, multi-user communication secure communication is the most important communication method. It is used in vehicle network communication, wireless local area network communication, sensor network and other occasions. In the uplink communication of these networks, multiple senders send different data to the same receiver respectively, and the receiver receives and processes them in sequence. This takes up a lot of bandwidth, especially the receiver takes up a lot of communication resources to receive each sender's data. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/14
Inventor 韩益亮桂小林卢万谊杨晓元张敏情李发根
Owner ENG UNIV OF THE CHINESE PEOPLES ARMED POLICE FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products