Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Heterogeneous aggregation signcryption method in Internet of Things environment

An Internet of Things and environmental technology, applied in the field of information security, can solve the problems of inability to use secure communication, lack of aggregation verification, etc., to achieve the effect of improving execution efficiency, reducing computational overhead, and facilitating processing

Active Publication Date: 2020-09-08
陕西链诚致远科技有限公司
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although many heterogeneous signcryption schemes have been proposed, these heterogeneous signcryption schemes cannot be used for many-to-one secure communication because they do not have aggregate verification.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Heterogeneous aggregation signcryption method in Internet of Things environment
  • Heterogeneous aggregation signcryption method in Internet of Things environment
  • Heterogeneous aggregation signcryption method in Internet of Things environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] refer to figure 1 , the implementation steps of the present invention are as follows:

[0036] Step 1, system initialization.

[0037] (1a) The key generation center KGC in the CLC system generates system public parameters params={q,k,E / F q ,G,P,P pub ,H 1 ,H 2 ,H 3 ,H 4}, where k is a security parameter; q is a large prime number, q>2 k ;E / F q is a prime field F q The elliptic curve on the elliptic curve; G represents the additive cyclic group composed of points on the elliptic curve; P is the generator of G; P pub is the public key of KGC; H 1 , H 2 , H 3 and H 4 are four collision-free safe hash functions, H 1 is to map 0 / 1 sequences of different lengths to Hash function in H 2 is a hash function that maps the elements in G to bits of the same length as the message to be signed encrypted, H 3 is to map 0 / 1 sequences of different lengths to Hash function in H 4 is to map 0 / 1 sequences of different lengths to Hash function in;

[0038] (1b) KGC ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an efficient aggregation signcryption scheme under the Internet of Things environment, which mainly solves the problems that the existing aggregation signcryption scheme has a small application range and poor practicability due to large calculation overhead. The implementation steps are: 1) The key generation center KGC and the certificate authority CA perform system initialization; 2) The perception entity N under the CLC system i and the user U in the PKI system register with KGC and CA respectively; 3) The user U in the PKI system broadcasts public random numbers and public key certificates, and N i Authenticate and receive; 4) Sensing entity N in the CLC system i Select the message to generate a signcrypted ciphertext and send it to the aggregator N n Form an aggregate signcryption, the aggregator N n Send the aggregated signcryption to user U; 5) User U performs aggregated signcryption to recover the corresponding plaintext information. The invention has heterogeneity and stronger practicability, and can be used for smart home, smart transportation, smart medical treatment and smart industrial detection.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an aggregation signcryption method under a heterogeneous public key cryptosystem, which can be used for secure data transmission under an Internet of Things environment. Background technique [0002] The Internet of Things is known as the third wave of the world's information industry. As early as 1995, there was a related concept of the Internet of Things in Bill Gates' "The Road to the Future". With the rapid development of the Internet and communication networks, the International Telecommunication Union (ITU) formally proposed the concept of the Internet of Things in 2005. However, due to the incomplete theoretical system of the Internet of Things, there is no recognized precise definition so far. The definition of the Internet of Things generally recognized by various countries is: through various information sensing devices, in accordance with the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/3236H04L9/3247H04L9/3263
Inventor 刘景伟李超亚孙蓉介玺
Owner 陕西链诚致远科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products