Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mass transmission method and device based on elliptic curve

An elliptic curve, transmission method technology, applied in the field of data decryption

Active Publication Date: 2020-12-08
梧桐链数字科技研究院(苏州)有限公司
View PDF10 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] d. After the user pays the electronic currency with the price of the corresponding item, he can only get the item he chooses, and knows nothing about the rest of the items

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mass transmission method and device based on elliptic curve
  • Mass transmission method and device based on elliptic curve
  • Mass transmission method and device based on elliptic curve

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0153] On the basis of research on the scheme of inadvertent electronic envelope based on RSA, the present invention proposes a dazed transmission method based on elliptic curve to improve it.

[0154] Such as figure 1 As shown, it is a flow chart of the method of the present invention. The present invention provides a method of dazed transmission based on elliptic curves, comprising the following steps:

[0155] S1: The recipient uses a random algorithm to generate a private key d, and generates a public key Q based on the SM2 elliptic curve;

[0156] S2: The sender constructs multiple choice information, each choice information includes identification and information content, and only sends the identification list of the multiple choice information to the receiver;

[0157] S3: The receiver selects an identifier from the identifier list, assigns an identifier value to the selected identifier, and encrypts the selected identifier and identifier value using an elliptic curve ...

no. 3 example

[0220] In this embodiment, the key is encrypted and decrypted, which is realized by performing an XOR operation on the key, and the length of the selection information is extended. The difference from the first embodiment is that in this embodiment, in step S1, The receiver uses a random algorithm to generate the initial private key d, and generates the initial public key Q based on the elliptic curve algorithm, and uses another method in steps S4 and S5 to realize the process of this scheme. The specific steps are as follows:

[0221] S4": The sender uses the elliptic curve algorithm to generate a key pair for each piece of selection information, uses the public key in the key pair to encrypt the corresponding selection information, and uses the encryption parameters and the initial public key Q to encrypt each The private key in the key pair is encrypted, and the ciphertext is generated based on all encrypted selection information and private key and sent to the receiver:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a mass transmission method and device based on an elliptic curve, and the method comprises the steps that S1, a receiver generates a private key d through employing a random algorithm, and generates a public key Q based on an SM2 elliptic curve; S2, a sender constructs multiple pieces of selection information, each piece of selection information comprises an identifier andinformation content, and only an identifier list of the multiple pieces of selection information is sent to the receiver; S3, the receiver selects an identifier from the identifier list, gives an identifier value to the selected identifier, encrypts the selected identifier and the identifier value by using an elliptic curve algorithm to generate an encryption parameter, and sends the encryption parameter to the sender; S4, the sender encrypts all the selection information by using the encryption parameter and the public key Q, and sends the encrypted ciphertext to the receiver; and S5, the receiver decrypts the ciphertext transmitted by the sender by using an elliptic curve algorithm to obtain the information content corresponding to the selected identifier. According to the method, the problems of privacy data protection and the like involved in a blockchain project scene can be solved.

Description

technical field [0001] The present invention relates to the technical field of data decryption, in particular to a dazed transmission method and device based on elliptic curves. Background technique [0002] With the gradual entry of computers and networks into the lives of the masses, various information systems have been widely used. In the field of electronic commerce, how to protect the interests of all parties involved in transactions is becoming increasingly important. Consumers conducting online transactions are required to provide some authentication, most commonly credit card numbers or account names, which can reveal a consumer's identity. Therefore, how to realize the privacy protection of private data has become a concern in the information society. [0003] Oblivious Transfer (Oblivious Transfer OT) is a cryptographic protocol that can protect privacy, also known as Oblivious Transfer Protocol. It enables the parties involved in the agreement to transfer messa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08G06Q30/02G06Q30/06
CPCG06Q30/0222G06Q30/0615G06Q30/0617H04L9/0852H04L9/3066H04L63/0407H04L2209/463H04L2209/466H04L2209/50H04L2209/56H04L2209/76
Inventor 陈序毛秀泽龚生智叶蔚万强马小峰
Owner 梧桐链数字科技研究院(苏州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products