Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Real anonymous certificateless multi-message multi-receiver signcryption method

A multi-receiver, certificate-free technology, applied to public keys for secure communication, user identity/authority verification, key distribution, and can solve problems such as poor practicability

Active Publication Date: 2018-02-09
XIDIAN UNIV
View PDF4 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the shortcomings of poor practicability of the existing certificateless multi-message multi-receiver si

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Real anonymous certificateless multi-message multi-receiver signcryption method
  • Real anonymous certificateless multi-message multi-receiver signcryption method
  • Real anonymous certificateless multi-message multi-receiver signcryption method

Examples

Experimental program
Comparison scheme
Effect test
No Example Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a real anonymous certificateless multi-message multi-receiver signcryption method, and the method is used for solving a technical problem that a conventional certificateless multi-message multi-receiver signcryption method is poor in practicality. The technical scheme is that the method comprises the steps: enabling a user to select a secret value as a part of a private key, calculating a part of a public key through the secret value, and then enabling a part of the public key and the identity information of the user to be transmitted to a KGC (key generation center); enabling the KGC to generate verification parameters of the corresponding part of the private key and the corresponding part of the public key, and then transmitting the parameters to the user througha safety cahnnel; verifying the validity of the corresponding parts of the private key and public key after the user receives the corresponding parts of the private key and public key: continuing to calculate a public key and a private key of the user if the validity passes the verification and disclosing the public key, or else stopping the operation. The signcryption process does not comprise the identity information of a transmitter and a receiver, and the method achieves the overall encryption of a plurality of different messages to be transmitted. Only an authorized receiver can decrypt aciphertext message, so the method is high in practicality and is high in efficiency.

Description

technical field [0001] The invention relates to a non-certificate multi-message multi-receiver signcryption method, in particular to a truly anonymous non-certificate multi-message multi-receiver signcryption method. Background technique [0002] In the document "Zhou Yanwei, Yang Bo, Zhang Wenzheng. Anonymous certificateless multi-receiver signcryption mechanism. Electronic Journal, 2016, 44(8): 1784-1790." An anonymous certificateless multi-message multi-receiver Signcryption method. This method has the following disadvantages: the ciphertext information of this method does not include the identity information of the recipient, but the attacker can judge whether an identity is a legitimate recipient's identity through the ciphertext parameters and public parameters; the signcryption algorithm is designed in the ellipse On the curve, but the elliptic curve has more number multiplication operations, resulting in low operation efficiency in the encryption process; the anonym...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32
Inventor 庞辽军许婷婷贾生盼魏萌萌李慧贤
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products