E-mail encryption method and system based on group cryptosystem
An e-mail and encryption system technology, applied in the information field, can solve the problems of cumbersome certificate verification, complex key management, and low encryption efficiency, and achieve the effects of simple storage and maintenance, simple key management, and a small number of verifications
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0088] The email encryption method based on the group cryptosystem comprises a group email encryption scheme, an embodiment of the scheme is as follows:
[0089] 1) Get mail operation: Get the mail Mail sent by the user through the client connection protocol and interface UPI.
[0090] 2) Encryption request judging operation: the client encryption agent unit UEPU detects the encrypted identification information from the mail Mail, and if it exists, proceed to step 3); otherwise, execute step 8). Among them, the encrypted identification information in this embodiment is defined as follows:
[0091] ①Select the encryption method using the "#" sign and the following form to define:
[0092] {username1, username2, ..., usernamen} #Mail server.
[0093] ② The exclusion encryption method is defined with the sign "%" and the following form:
[0094] {username1, username2, ..., usernamen}% mail server.
[0095] Here, {username 1, username 2, ..., username n} represent the user ID ...
Embodiment 2
[0106] Based on the e-mail encryption method based on the group cryptography system comprising encrypted mail encapsulation format, an embodiment of the scheme is as follows:
[0107] 1) Authorization information ciphertext generation operation: for a given mail recipient set S={ID 1 ,...,ID n}, get the receiver ID respectively k The group public key certificate Cert of the mail server where it is located k , and form the certificate set Cert S ={Cert 1 ,...,Cert m}, where each Cert k Contains the group public key mpk k ; Then respectively call the encryption algorithm SBE-Encrypt in the logo-based group encryption SBE scheme in "Embodiment 3" to complete the encryption of the session key ek, that is, for all m public keys mpk k (k=1,...,m), calculate respectively:
[0108] SBE-Encrypt (mpk k ,Pattern,ek)→C k (1),
[0109] Finally, the ciphertext set C is obtained SBE =(C 1 ,...,C m ), where the session key ek for all ciphertexts C 1 ,...,C m all the same.
...
Embodiment 3
[0120] The email encryption method based on the group cipher system includes a logo-based group encryption SBE scheme, an embodiment of the scheme is as follows:
[0121] 1) System parameter generation algorithm SBE-Setup(S)→(mpk, msk): given a bilinear mapping group S=(p, G 1 ,G 2 ,G T ,e(·,·)) as input, randomly select two elements G←G 1 and H←G 2 , two random exponents calculate and for any k∈[1,m] compute and choose a hash function Finally, output the master private key And group public key mpk={S,H,R,{G k} k∈[1,m] ,hash()}.
[0122] 2) User key generation algorithm SBE-GenKey(msk, ID k )→sk k : Enter msk and the ID of the kth user k , the given user ID in this example k is the user's Email address, define x k =hash(ID k ) will ID k maps to a random element Calculate the private key of the kth user:
[0123]
[0124] And the public information of the kth user and put (ID k ,H k ) to the group public key mpk.
[0125] 3) Encryption algorithm...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com