Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Certificateless threshold signcryption method under secret sharing mechanism

A secret sharing mechanism, certificateless technology, applied in the field of network information security

Active Publication Date: 2021-01-22
青海交通职业技术学院
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to overcome the above-mentioned shortcomings of the prior art, and to provide a secret with good security and low computational complexity under the condition of no absolute authority of the private key owner, no key trusteeship and certificate management problems. Threshold signcryption method without certificate under sharing mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless threshold signcryption method under secret sharing mechanism
  • Certificateless threshold signcryption method under secret sharing mechanism
  • Certificateless threshold signcryption method under secret sharing mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] A large prime number q selected by the key generation center, q is 2 192 -2 64 -1 as an example, such as figure 1 As shown, the steps of the certificateless threshold signcryption method under the secret sharing system in this embodiment are as follows:

[0076] A. System initialization

[0077] (A1) The key generation center selects a large prime number q of k bits, and this embodiment adopts q as 2 192 -2 64 -1, k is a security parameter, a finite positive integer, set G 1 and G 2 are two q factorial cyclic groups, e is G 1 ×G 1 →G 2 is a bilinear map.

[0078] (A2) The key generation center selects three cryptographically secure hash functions H 1 、H 2 、H 3 :H 1 :{0,1} * ×G 1 ×G 1 →G 1 , H 2 :G 1 ×G 1 →{0,1} λ , H 3 :{0,1} λ ×G 1 3 ×G 2 → Z q * , where λ represents the message length, Z q * means {1,2,...,2 192 -2 64 -2}, {0,1} * Represents an identity of arbitrary length consisting of 0 and 1, {0,1} λ Represents a message of length ...

Embodiment 2

[0142] A large prime number q selected by the key generation center, q is 2 224 -2 96 +1 as an example, the steps of the non-certificate threshold signcryption method under the secret sharing mechanism of this embodiment are as follows:

[0143] A. System initialization

[0144] (A1) The key generation center selects a large prime number q of k bits, and this embodiment adopts q as 2 224 -2 96 +1, k is a security parameter, a finite positive integer, set G 1 and G 2 are two q factorial cyclic groups, e is G 1 ×G 1 →G 2 is a bilinear map.

[0145] (A2) The key generation center selects three cryptographically secure hash functions H 1 、H 2 、H 3 :H 1 :{0,1} * ×G 1 ×G 1 →G 1 , H 2 :G 1 ×G 1 →{0,1} λ , H 3 :{0,1} λ ×G 1 3 ×G 2 → Z q * , where λ represents the message length, Z q * means {1,2,...,2 224 -2 96}, {0,1} * Represents an identity of arbitrary length consisting of 0 and 1, {0,1} λ Represents a message of length λ consisting of 0s and 1s, H...

Embodiment 3

[0153] A large prime number q selected by the key generation center, q is 2 256 -2 224 +2 192 +2 96 +1 as an example, the steps of the non-certificate threshold signcryption method under the secret sharing mechanism of this embodiment are as follows:

[0154] A. System initialization

[0155] (A1) The key generation center selects a large prime number q of k bits, and this embodiment adopts q as 2 256 -2 224 +2 192 +2 96 +1, k is a security parameter, a finite positive integer, set G 1 and G 2 are two q factorial cyclic groups, e is G 1 ×G 1→G 2 is a bilinear map.

[0156] (A2) The key generation center selects three cryptographically secure hash functions H 1 、H 2 、H 3 :H 1 :{0,1} * ×G 1 ×G 1 →G 1 , H 2 :G 1 ×G 1 →{0,1} λ , H 3 :{0,1} λ ×G 1 3 ×G 2 → Z q * , where λ represents the message length, Z q * means {1,2,...,2 256 -2 224 +2 192 +2 96}, {0,1} * Represents an identity of arbitrary length consisting of 0 and 1, {0,1} λ Represents a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a certificateless threshold signcryption method under a secret sharing mechanism. The method comprises the steps of initializing a system, determining public and private keys of a user, extracting part of private keys of the user, threshold signcryption and unsigncryption. A certificateless threshold encryption and authentication method is adopted in the threshold signcryption step, so the problems of certificate management and key escrow and the problem of single-point failure caused by the uniqueness of a private key are solved; on the theoretical basis of certificateless public key cryptography, a secret sharing mechanism and threshold signcryption, the security is improved, the problems of dependence on a secure channel, certificate management and key escrow areavoided, the problem that a private key owner has absolute permission is solved, and adaptive selection ciphertext attacks and adaptive selection message attacks can be defended, so the method is suitable for a network information security application environment. The method has the advantages of good security, low computation complexity and the like, and has a good application prospect in the field of network information security.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a certificateless public key cryptography and a threshold signcryption method. Background technique [0002] The certificate-free threshold signcryption method can ensure that multiple users share the signcryption operation authority, so that no less than the threshold value users cooperate to complete the signcryption operation, and less than the threshold value users cannot collude. The certificateless threshold signcryption method not only overcomes the key escrow and certificate management problems, but also avoids the single point of failure problem caused by the unique private key of traditional public key cryptography. These advantages make it especially suitable for e-government, e-commerce, Electronic military affairs and other network information security fields. The certificateless threshold signcryption method can achieve both confide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/32H04L9/06
CPCH04L9/0643H04L9/085H04L9/0869H04L9/0894H04L9/3255
Inventor 俞惠芳廖春生马祥
Owner 青海交通职业技术学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products