Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Distributed type (k, n) threshold certificate-based encrypting method and system

An encryption method and distributed technology, applied in transmission systems, user identity/authority verification, electrical components, etc., can solve the problem of no security in the system, weak ability to resist denial of service attacks and certificate server failures, master key Weak ability to leak, etc.

Inactive Publication Date: 2014-11-26
HOHAI UNIV
View PDF1 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (1) The ability to resist denial of service attacks and certificate server failures is weak
Since there is only one certificate server in the entire system to complete the work of authenticating users, issuing and revoking certificates, once the certificate server suffers a denial of service attack or fails to work normally, the entire system may be paralyzed
[0006] (2) The ability to resist master key leakage is weak
Since the certificate server needs to use the system master key to complete the issuance of user certificates, once the unique system master key is leaked, the entire system will have no security at all

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed type (k, n) threshold certificate-based encrypting method and system
  • Distributed type (k, n) threshold certificate-based encrypting method and system
  • Distributed type (k, n) threshold certificate-based encrypting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:

[0073] The encryption method based on (k, n) threshold certificates in the present invention can be realized based on bilinear pairing and Shamir secret sharing technology. The bilinear pairing and Shamir secret sharing technology will be briefly introduced below.

[0074] Let G and G T are two p factorial cyclic groups, where p is a large prime number and g is the generator of the group G. Suppose G and G T The discrete logarithm problem on both groups is hard. If defined in groups G and G T Previous mapping e:G×G→G T Satisfy the following three properties, then the mapping is called a valid bilinear pairing. Bilinear pair e: G×G→G T is the Cartesian product G×G to the group G T The mapping, that is, the bilinear pairing e:G×G→G T Refers to the function z=e(u,v), where u, v∈G are independent variables, z∈G T as the dependent variable.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed type (k, n) threshold certificate-based encrypting method and system. The secret sharing technology and certificate-based encrypting are combined. The method comprises the steps of system parameter generating, public user key and private user key generating, user certificate share generating, user certificate share validity verifying, user certificate combining, message encrypting and message decrypting. The system comprises a system parameter generating module, a user key generating module, a certificate share generating module, a certificate share verifying module, a certificate combining module, an encrypting module and a decrypting module. By means of the technical scheme, the capacity of resisting to master key revealing, denial of service attack and certificate server failure of a cryptosystem is greatly enhanced, and the defects of an existing certificate-based encrypting method are effectively overcome.

Description

technical field [0001] The invention relates to the technical field of data encryption in information security, in particular to a distributed encryption method and system based on (k, n) threshold certificates. Background technique [0002] Diffie and Hellman proposed the concept of Public Key Cryptography in 1976. In the public-key cryptosystem, each user has two different keys, the public key and the private key, where the public key can be made public for encryption or signature verification; while the private key needs to be kept secret for decryption or signature. The proposal of public key cryptography has had a profound impact on secure communication, key distribution, digital signature and authentication on the open network, and has played an extremely important role in ensuring information security. [0003] Certificate-Based Cryptography (Certificate-Based Cryptography) is a new public-key cryptosystem proposed by Gentry in 2003. Inherent flaws in this cryptogra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 陆阳张全领李继国
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products