Signcryption method based from identity environment to certificateless environment
A certificate-free, identity-free technology, applied in the direction of user identity/authority verification, etc., can solve the problem of not being applicable to the sender, only satisfying external security, and increasing the amount of user calculation.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0034] see image 3 , the specific execution steps include setting system parameters, generating a key based on an identity environment, generating a key in an environment without a certificate, signcryption, and decryption. The specific description is as follows:
[0035] (1) Set system parameters
[0036] (1.1) Let G 1 is a cyclic additive group generated by P, with order p, G 2 is a cyclic multiplicative group with the same order p, is a bilinear map. Define four secure Hash functions H 1 ,H 2 ,H 3 and H 4 . h 1 、H 3 are all from {0,1} * map to h 2 from {0,1} * maps to {0,1} t , H 4 is from {0,1} * map to where {0,1} * Represents a collection of binary sequences of arbitrary bit length, Represents the additive group obtained by removing the identity element, {0,1} t Indicate that the bit length is t (t is a preset parameter, and in this embodiment, the value is set to the bit length l of the message m m ) set of binary sequences, Denotes a finite...
Embodiment 2
[0062] see Figure 4 , the specific execution steps include setting system parameters, generating a key based on an identity environment, generating a key in a non-certificate environment, signcryption and decryption. The main difference between Embodiment 2 and Embodiment 1 is that the generators selected based on the identity environment and the non-certificate environment are different.
[0063] (1) Set system parameters
[0064] (1.1) In the same way as in Example 1, set the system parameters
[0065] (1.2) Private key generation center selection group G 1 A generator P of 1 and a master private key Calculate the corresponding public key P pub1 =s 1 P 1 .
[0066] (1.3) Key generation center selection group G1 A generator P of 2 and a master private key Calculate the corresponding public key P pub2 =s 2 P 2 .
[0067] (2) Generate a key based on the identity environment
[0068] The sender submits the identity information ID A To the private key generat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com