Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-receiver identity anonymity signcryption method

A multi-receiver, receiver technology, applied in the network field, can solve the problem of user identity anonymity that cannot be realized in communication sessions

Active Publication Date: 2016-03-23
XIDIAN UNIV
View PDF6 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to overcome the problem that the above-mentioned prior art cannot realize the anonymity of the user identity of the communication session when carrying out secure broadcasting, and provide a multi-receiver identity anonymous signcryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-receiver identity anonymity signcryption method
  • Multi-receiver identity anonymity signcryption method
  • Multi-receiver identity anonymity signcryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Attached below figure 1 The present invention is further described.

[0070] Step 1, generate cryptographic system parameters.

[0071] The key generation center selects a large prime number q according to the security parameter z of the cryptographic system, where z64 And q>2 z , to construct two additive cyclic groups G of order q 1 and the multiplicative cyclic group G 2 ;The key generation center maps the additive cyclic group to the multiplicative cyclic group, and obtains a bilinear map, namely e:G 1 ×G 1 →G 2 , from the additive cyclic group G 1 Randomly select the generator P; randomly select the master key of the cryptosystem from the additive cyclic group The result of multiplying the generator of the additive cyclic group and the master key of the cryptosystem is used as the public key P of the cryptosystem pub =sP, save the cryptosystem master key s; the key generation center respectively constructs the identity hash function H 1 : {0,1} * →G 1 ;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-receiver identity anonymity signcryption method. The method specifically includes steps: 1, generating password system parameters; 2, registering senders and receivers; 3, performing signcryption of the senders; 4, determining whether a validity condition of a signcryption ciphertext is established; 5, determining whether a permission verification condition is established; 6, performing de-signcryption of the receivers; and 7, exiting the de-signcryption. According to the method, the LaGrange interpolation technique is replaced by the new polynomial technique, identity anonymity between registered receivers is realized, the calculation of intermediate parameters is reduced in a signcryption process, the efficiency of encryption and decryption is improved, the overall security and the anonymity of the system are improved, the receivers can no longer verify the identity of other receivers, and the method can be applied to the application field of distributed network.

Description

technical field [0001] The invention belongs to the field of network technology, and further relates to an anonymous signcryption method with multiple receiver identities in the field of network security technology. Based on the identity-based signcryption system, the present invention proposes a multi-receiver identity-anonymous signcryption method, that is, a multi-recipient signcryption method in which each registered recipient identity cannot be obtained by an attacker. The invention can be used in distributed network applications, and can provide security protection for the privacy of network service providers and all authorized user identities. Background technique [0002] Multi-receiver communication plays an important role in distributed network applications, and multi-receiver signcryption technology is considered to be an effective means to ensure its security. The multi-receiver signcryption scheme can be used in network conferences, round table conferences, pay...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/0442H04L63/06
Inventor 庞辽军胡雨霏
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products