Certificateless threshold signcryption method under secret sharing mechanism

A secret sharing mechanism and certificate-free technology, which is applied in the field of network information security to achieve good security, good application prospects, and low computational complexity

Active Publication Date: 2021-11-19
青海交通职业技术学院
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to overcome the above-mentioned shortcomings of the prior art, and to provide a secret with good security and low computational complexity under the condition of no absolute authority of the private key owner, no key trusteeship and certificate management problems. Threshold signcryption method without certificate under sharing mechanism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless threshold signcryption method under secret sharing mechanism
  • Certificateless threshold signcryption method under secret sharing mechanism
  • Certificateless threshold signcryption method under secret sharing mechanism

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0075] A large prime number q selected by the key generation center, q is 2 192 -2 64 -1 as an example, such as figure 1 As shown, the steps of the certificateless threshold signcryption method under the secret sharing system in this embodiment are as follows:

[0076] A. System initialization

[0077] (A1) The key generation center selects a large prime number q of k bits, and this embodiment adopts q as 2 192 -2 64 -1, k is a security parameter, a finite positive integer, set G 1 and G 2 are two q factorial cyclic groups, e is G 1 ×G 1 →G 2 is a bilinear map.

[0078] (A2) The key generation center selects three cryptographically secure hash functions H 1 、H 2 、H 3 :H 1 :{0,1} * ×G 1 ×G 1 →G 1 , H 2 :G 1 ×G 1 →{0,1} λ , H 3 :{0,1} λ ×G 1 3 ×G 2 → Z q * , where λ represents the message length, Z q * means {1,2,...,2 192 -2 64 -2}, {0,1} * Represents an identity of arbitrary length consisting of 0 and 1, {0,1} λ Represents a message of length ...

Embodiment 2

[0142] A large prime number q selected by the key generation center, q is 2 224 -2 96 +1 as an example, the steps of the non-certificate threshold signcryption method under the secret sharing mechanism of this embodiment are as follows:

[0143] A. System initialization

[0144] (A1) The key generation center selects a large prime number q of k bits, and this embodiment adopts q as 2 224 -2 96 +1, k is a security parameter, a finite positive integer, set G 1 and G 2 are two q factorial cyclic groups, e is G 1 ×G 1 →G 2 is a bilinear map.

[0145] (A2) The key generation center selects three cryptographically secure hash functions H 1 、H 2 、H 3 :H 1 :{0,1} * ×G 1 ×G 1 →G 1 , H 2 :G 1 ×G 1 →{0,1} λ , H 3 :{0,1} λ ×G 1 3 ×G 2 → Z q * , where λ represents the message length, Z q * means {1,2,...,2 224 -2 96}, {0,1} * Represents an identity of arbitrary length consisting of 0 and 1, {0,1} λ Represents a message of length λ consisting of 0s and 1s, H...

Embodiment 3

[0153] A large prime number q selected by the key generation center, q is 2 256 -2 224 +2 192 +2 96 +1 as an example, the steps of the non-certificate threshold signcryption method under the secret sharing mechanism of this embodiment are as follows:

[0154] A. System initialization

[0155] (A1) The key generation center selects a large prime number q of k bits, and this embodiment adopts q as 2 256 -2 224 +2 192 +2 96 +1, k is a security parameter, a finite positive integer, set G 1 and G 2 are two q factorial cyclic groups, e is G 1 ×G 1→G 2 is a bilinear map.

[0156] (A2) The key generation center selects three cryptographically secure hash functions H 1 、H 2 、H 3 :H 1 :{0,1} * ×G 1 ×G 1 →G 1 , H 2 :G 1 ×G 1 →{0,1} λ , H 3 :{0,1} λ ×G 1 3 ×G 2 → Z q * , where λ represents the message length, Z q * means {1,2,...,2 256 -2 224 +2 192 +2 96}, {0,1} * Represents an identity of arbitrary length consisting of 0 and 1, {0,1} λ Represents a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A certificateless threshold signcryption method under a secret sharing mechanism, which consists of steps of system initialization, determining a user's public and private keys, extracting a part of the user's private key, threshold signcryption, and decrypting the signcryption. In the threshold signcryption step, the method of certificate-free threshold encryption and authentication is adopted, which solves the problem of certificate management and key escrow and the problem of single point of failure caused by the unique private key; with certificate-free public key cryptography and secret sharing mechanism And threshold signcryption is the theoretical basis, which improves security, avoids the dependence on secure channels, certificate management and key escrow issues, and the private key owner has absolute authority issues, which can defend against adaptively chosen ciphertext attacks and adaptively chosen Message attack, suitable for network information security application environment. The invention has the advantages of good security, low calculation complexity, etc., and has a good application prospect in the field of network information security.

Description

technical field [0001] The invention belongs to the technical field of network information security, and in particular relates to a certificateless public key cryptography and a threshold signcryption method. Background technique [0002] The certificate-free threshold signcryption method can ensure that multiple users share the signcryption operation authority, so that no less than the threshold value users cooperate to complete the signcryption operation, and less than the threshold value users cannot collude. The certificateless threshold signcryption method not only overcomes the key escrow and certificate management problems, but also avoids the single point of failure problem caused by the unique private key of traditional public key cryptography. These advantages make it especially suitable for e-government, e-commerce, Electronic military affairs and other network information security fields. The certificateless threshold signcryption method can achieve both confide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/06
CPCH04L9/0643H04L9/085H04L9/0869H04L9/0894H04L9/3255
Inventor 俞惠芳廖春生马祥
Owner 青海交通职业技术学院
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products