CN109921896A - A kind of label decryption method, system, equipment and computer readable storage medium - Google Patents

A kind of label decryption method, system, equipment and computer readable storage medium Download PDF

Info

Publication number
CN109921896A
CN109921896A CN201910180575.9A CN201910180575A CN109921896A CN 109921896 A CN109921896 A CN 109921896A CN 201910180575 A CN201910180575 A CN 201910180575A CN 109921896 A CN109921896 A CN 109921896A
Authority
CN
China
Prior art keywords
sender
random number
information
obtains
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910180575.9A
Other languages
Chinese (zh)
Inventor
崔文军
胡明生
贾志娟
王利朋
张晓菲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Normal University
Original Assignee
Zhengzhou Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Normal University filed Critical Zhengzhou Normal University
Priority to CN201910180575.9A priority Critical patent/CN109921896A/en
Publication of CN109921896A publication Critical patent/CN109921896A/en
Pending legal-status Critical Current

Links

Abstract

This application discloses a kind of label decryption method, system, equipment and computer readable storage mediums, it include: to choose the first random number when applied to information sender, the point G on elliptic curve chosen to the first random number and in advance carries out operation and obtains R, and the rank of point G is the prime number n for meeting safety requirements;Information to be transmitted is obtained, information to be transmitted is encrypted using encryption method, obtains encrypted result c;Calculate the cryptographic Hash e of encrypted result c;Calculate the Hamming weight d of cryptographic Hash e;Operation is carried out to the first random number, Hamming weight d, sender's private key of information sender and n, obtains s;(c, R, s) is sent to receiving party as close result is signed.A kind of label decryption method provided by the present application can meet forward security and sharable content object simultaneously, highly-safe, and arithmetic speed is fast.A kind of label decryption system, equipment and computer readable storage medium provided by the present application also solve the problems, such as relevant art.

Description

A kind of label decryption method, system, equipment and computer readable storage medium
Technical field
This application involves field of information security technology, more specifically to a kind of label decryption method, system, equipment and Computer readable storage medium.
Background technique
With the fast development of the technologies such as internet, mobile communication and computer, information security becomes today's society most For important one of research topic.Ensure data it is safe and reliable be world today's peaceful development one of principal element, application Safe enciphering and deciphering algorithm in data transmission, storage and safety identification authentication field plays the steady and safety of maintenance society Vital effect is arrived, especially in the specific field of reality such as Internet of Things, network social intercourse, big data and cloud computing. The encrypted transmission of user information may be implemented by safe encryption technology, generation digital signature is used for the authentication of user, protects Hinder the safety of user data and transaction.The basic process of data encryption is that the clear-text message to be transmitted is encrypted, and is made Become one section of unrecognizable code, i.e. ciphertext.Original clear-text message can just be shown by only inputting correct key, It may insure that message does not steal utilization by illegal attacker in this way.
However, computationally intensive, computational efficiency is lower, and safety is not high in existing encipher-decipher method.
In conclusion the safety for ensureing information encryption and decryption scheme while how improving computational efficiency is current this field Technical staff's urgent problem to be solved.
Summary of the invention
The purpose of the application is to provide a kind of label decryption method, can solve how to improve information to a certain extent and adds solution The technical issues of close computational efficiency.Present invention also provides a kind of label decryption system, equipment and computer readable storage mediums.
To achieve the goals above, the application provides the following technical solutions:
A kind of label decryption method is applied to information sender, comprising:
The first random number is chosen, the point G on elliptic curve chosen to first random number and in advance carries out operation and obtains To R, the rank of the point G is the prime number n for meeting safety requirements;
Information to be transmitted is obtained, the information to be transmitted is encrypted using encryption method, obtains encrypted result c;
Calculate the cryptographic Hash e of the encrypted result c;
Calculate the Hamming weight d of the cryptographic Hash e;
Operation is carried out to first random number, the Hamming weight d, sender's private key of the information sender and n, Obtain s;
(c, R, s) is sent to receiving party as close result is signed.
Preferably, the first random number of the selection, comprising:
Appoint and takesAs the first random number r;
Point G on the elliptic curve chosen to first random number and in advance carries out operation and obtains R, comprising:
First random number is multiplied with the point G, obtains R.
It is preferably, described that the information to be transmitted is encrypted using encryption method, comprising:
Recipient's public key that the receiving party generates is obtained, recipient's public key includes being based on formula yB=xBG is raw At public key, wherein yBIndicate recipient's public key;xBIndicate recipient's private key, and
Coordinate points (k, l) is obtained based on first random number and recipient's public key;
The information to be transmitted is encrypted using encryption method corresponding with k.
It is preferably, described that coordinate points (k, l) is obtained based on first random number and recipient's public key, comprising:
First random number is multiplied with recipient's public key, obtains the coordinate points (k, l).
Preferably, it is described to first random number, the Hamming weight d, the information sender sender's private key, And n carries out operation, obtains s, comprising:
Transmission using the first operational formula, to first random number, the Hamming weight d, the information sender Square private key and n carry out operation, obtain s;
First operational formula includes: s=(r+d+xA)modn;
Wherein, xAIndicate described sender private key, and
A kind of decryption method is applied to receiving party as described above, comprising:
Receive the close result of the label (c, R, s) that the information sender is sent;
The encrypted result c is decrypted using corresponding decryption method, obtains decrypted result m;
Hash operation is carried out to the encrypted result c, obtains the cryptographic Hash e;
Calculate the Hamming weight d of the cryptographic Hash e;
Based on the Hamming weight d, in advance t is calculated in the n and received s obtained;
Obtain sender's public key of the information sender, described sender public key includes based on sender's private key and described The public key that point G is generated;
Whether verifying t, the point G, described sender public key and received R, s meet verification condition, if so, determining The decrypted result m is the information to be transmitted.
Preferably, t is calculated in the n and received s obtained based on the Hamming weight d, in advance, comprising:
Using the second operational formula, t is calculated in the n and received s obtained based on the Hamming weight d, in advance;
Second operational formula includes: t=(s-d) modn;
Whether the verifying t, the point G, described sender public key and received R, s meet default verification condition, packet It includes:
Verify equation tG-yAWhether=R is true, if so, determining t, the point G, described sender public key and received R, s meets the verification condition.
A kind of close system of label, is applied to information sender, comprising:
First chooses module, for choosing the first random number, the elliptic curve chosen to first random number and in advance On point G carry out operation obtain R, the rank of the point G is the prime number n for meeting safety requirements;
First encrypting module encrypts the information to be transmitted using encryption method for obtaining information to be transmitted, Obtain encrypted result c;
First computing module, for calculating the cryptographic Hash e of the encrypted result c;
Second computing module, for calculating the Hamming weight d of the cryptographic Hash e;
First computing module, for the transmission to first random number, the Hamming weight d, the information sender Square private key and n carry out operation, obtain s;
First sending module, for (c, R, s) to be sent to receiving party as close result is signed.
A kind of close equipment of label, is applied to information sender, comprising:
Memory, for storing computer program;
Processor, when for executing the computer program realize as above any label decryption method the step of.
A kind of computer readable storage medium is stored with computer program in the computer readable storage medium, described The step of as above any label decryption method is realized when computer program is executed by processor.
A kind of label decryption method provided by the present application is applied to information sender, the first random number is chosen, to the first random number Point G on the elliptic curve chosen in advance carries out operation and obtains R, and the rank of point G is the prime number n for meeting safety requirements;Obtain to Information is transmitted, information to be transmitted is encrypted using encryption method, obtains encrypted result c;Calculate the cryptographic Hash of encrypted result c e;Calculate the Hamming weight d of cryptographic Hash e;First random number, Hamming weight d, sender's private key of information sender and n are carried out Operation obtains s;(c, R, s) is sent to receiving party as close result is signed.A kind of label decryption method provided by the present application will be signed Close process is combined with the difficulty and the one-way of hash function for solving Elliptic Curve Discrete Logarithm, before capable of meeting simultaneously to Safety and sharable content object, it is highly-safe, and sign it is close during only used modular multiplication, signing close length is only 3n, fortune It is fast to calculate speed.A kind of label decryption system, equipment and computer readable storage medium provided by the present application also solve relevant art Problem.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of first pass figure for signing decryption method provided by the embodiments of the present application;
Fig. 2 is a kind of structural schematic diagram for signing close system provided by the embodiments of the present application;
Fig. 3 is a kind of structural schematic diagram for signing close equipment provided by the embodiments of the present application;
Fig. 4 is a kind of another structural schematic diagram for signing close equipment provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
Referring to Fig. 1, Fig. 1 is a kind of first pass figure for signing decryption method provided by the embodiments of the present application.
A kind of label decryption method provided by the embodiments of the present application is applied to information sender, may comprise steps of:
Step S101: choosing the first random number, and the point G on elliptic curve chosen to the first random number and in advance is transported Calculation obtains R, and the rank of point G is the prime number n for meeting safety requirements.
In practical application, information sender can first choose the first random number, then to the first random number of selection and in advance Point G on the elliptic curve first chosen carries out operation and obtains R, and the rank of point G is the prime number n namely nG=for meeting safety requirements O, wherein O is infinite point.The elliptic curve chosen in advance can be the elliptic curve on finite field gf (p).Concrete application field Jing Zhong, the process for choosing the first random number can be with specifically: appoints and takesAs the first random number r;To the first random number and in advance Point G on the elliptic curve first chosen carry out operation obtain the process of R can be with specifically: the first random number is multiplied with point G, is obtained To R.
Step S102: obtaining information to be transmitted, is encrypted using encryption method to information to be transmitted, obtains encrypted result c。
In practical application, information sender can obtain information to be transmitted after obtaining R, and use encryption method pair Information to be transmitted is encrypted, and encrypted result c is obtained.
In concrete application scene, the process that uses encryption method to encrypt information to be transmitted can be with specifically: obtains Recipient's public key that receiving party generates, recipient's public key include being based on formula yB=xBThe public key that G is generated, wherein yBIt indicates Recipient's public key;xBIndicate recipient's private key, andBased on the first random number and recipient's public key obtain coordinate points (k, l);Information to be transmitted is encrypted using encryption method corresponding with k.Specifically, public based on the first random number and recipient The process that key obtains coordinate points (k, l) can be with specifically: the first random number is multiplied with recipient's public key, obtain coordinate points (k, l)。
Step S103: the cryptographic Hash e of encrypted result c is calculated.
In practical application, information sender can carry out Hash fortune to encrypted result c after obtaining encrypted result c It calculates, obtains cryptographic Hash e, operational formula can be with are as follows: e=h (c), wherein h indicates the Hash operation function chosen.
Step S104: the Hamming weight d of cryptographic Hash e is calculated.
In practical application, information sender can calculate the Hamming weight d of cryptographic Hash e after obtaining cryptographic Hash e.The Chinese Bright weight is the number of non-zero symbol in a string symbol, therefore it is equal to the Hamming distance of the full nil symbol string of same length, In most commonly seen data bit symbol string, it is 1 number.
Step S105: operation is carried out to the first random number, Hamming weight d, sender's private key of information sender and n, is obtained To s.
In practical application, information sender after obtaining Hamming weight d, can to the first random number, Hamming weight d, The sender's private key and n of information sender carry out operation, obtain s.In concrete application scene, to the first random number, Hamming weight D, the sender's private key and n of information sender carry out operation, and the process for obtaining s can be with specifically: the first operational formula is used, Operation is carried out to the first random number, Hamming weight d, sender's private key of information sender and n, obtains s;Specifically, the first fortune Calculating formula may include: s=(r+d+xA)modn;Wherein, xAIndicate sender's private key, and
Step S106: (c, R, s) is sent to receiving party as close result is signed.
In practical application, (c, R, s) can be sent to receiving party as close result is signed by information sender.Forward direction peace Full property refers to that anyone cannot be decrypted using the private key of sender through the encrypted cipher-text information of the private key for user, i.e. private key Encrypted ciphertext cannot again by the private key be decrypted into plain text, by forward security and label decryption method provided by the present application it is found that The application meets forward security, and meets sharable content object, and reason is as follows: if sender's private key x of information senderAQuilt Attacker obtains, and the application ensure that outside the available message plaintext m of receiving party that remaining attacker can not restore m, this It is mainly reflected in and obtains on decruption key k, and obtain there are two types of the approach of k: the first, by (k, l)=ryBIt is found that needing to know Road r, and R=rG, it is desirable to solve r and be equal to solution elliptic curves discrete logarithm problem;Second, by (k, l)=xBR it is found that Need to know recipient's private key xB;To sum up, r or x is either obtainedB, it is impossible for attacker, so before having To safety.And when information sender is denied signing close, receiving party can will sign close (c, R, s) be supplied to third party it is credible in The heart carries out solution and signs close confirmation, and third party confirmatory message sender on the basis of secure and trusted is transmitted across the information really, in this way Just undeniable purpose has been reached, only ciphertext c is verified in verification process, protects cleartext information m, thus had Public verifiability.
A kind of label decryption method provided by the present application is applied to information sender, the first random number is chosen, to the first random number Point G on the elliptic curve chosen in advance carries out operation and obtains R, and the rank of point G is the prime number n for meeting safety requirements;Obtain to Information is transmitted, information to be transmitted is encrypted using encryption method, obtains encrypted result c;Calculate the cryptographic Hash of encrypted result c e;Calculate the Hamming weight d of cryptographic Hash e;First random number, Hamming weight d, sender's private key of information sender and n are carried out Operation obtains s;(c, R, s) is sent to receiving party as close result is signed.A kind of label decryption method provided by the present application will be signed Close process is combined with the difficulty and the one-way of hash function for solving Elliptic Curve Discrete Logarithm, before capable of meeting simultaneously to Safety and sharable content object, it is highly-safe, and sign it is close during only used modular multiplication, signing close length is only 3n, fortune It is fast to calculate speed.
Present invention also provides a kind of decryption methods matched with label decryption method, applied in any embodiment as above Receiving party, this method may comprise steps of:
Receive the close result of label (c, R, s) that information sender is sent;
Encrypted result c is decrypted using corresponding decryption method, obtains decrypted result m;
Hash operation is carried out to encrypted result c, obtains cryptographic Hash e;
Calculate the Hamming weight d of cryptographic Hash e;
Based on Hamming weight d, in advance t is calculated in the n and received s obtained;
Sender's public key of information sender is obtained, sender's public key includes the public affairs generated based on sender's private key and point G Key;
Whether verifying t, point G, sender's public key and received R, s meet default verification condition, if so, determining decryption As a result m is information to be transmitted, if it is not, then determining decrypted result m not is information to be transmitted.
The description for closing relevant parameter in this present embodiment please refers to above-described embodiment.In concrete application scene, as use and k When corresponding encryption method encrypts information to be transmitted, encrypted result c is decrypted using corresponding decryption method Process can be with specifically: is multiplied recipient's private key with R to obtain coordinate points (k, l), using decryption method corresponding with k to encryption As a result c is decrypted.
A kind of decryption method provided by the present application, the n and received s that receiving party is obtained based on Hamming weight d, in advance The process that t is calculated can be with specifically: uses the second operational formula, the n and received s obtained based on Hamming weight d, in advance T is calculated;Second operational formula includes: t=(s-d) modn;
Correspondingly, the process whether verifying t, point G, sender's public key and received R, s meet default verification condition can be with Specifically: verifying equation tG-yAWhether=R is true, if so, determining that t, point G, sender's public key and received R, s meet in advance If verification condition, if it is not, then determining that t, point G, sender's public key and received R, s are unsatisfactory for default verification condition.
Present invention also provides a kind of close system of label, have with a kind of label decryption method provided by the embodiments of the present application Corresponding effect.Referring to Fig. 2, Fig. 2 is a kind of structural schematic diagram for signing close system provided by the embodiments of the present application.
A kind of close system of label provided by the embodiments of the present application, is applied to information sender, may include:
First chooses module 101, for choosing the first random number, on the elliptic curve chosen to the first random number and in advance Point G carry out operation obtain R, the rank of point G is the prime number n for meeting safety requirements;
First encrypting module 102 encrypts information to be transmitted using encryption method for obtaining information to be transmitted, Obtain encrypted result c;
First computing module 103, for calculating the cryptographic Hash e of encrypted result c;
Second computing module 104, for calculating the Hamming weight d of cryptographic Hash e;
First computing module 105, for the first random number, Hamming weight d, information sender sender's private key and n Operation is carried out, s is obtained;
First sending module 106, for (c, R, s) to be sent to receiving party as close result is signed.
A kind of close system of label provided by the embodiments of the present application, is applied to information sender, and the first selection module may include:
First selection unit takes for appointingAs the first random number r;
First computing unit obtains R for the first random number to be multiplied with point G.
A kind of close system of label provided by the embodiments of the present application, is applied to information sender, the first encrypting module may include:
First acquisition unit, for obtaining recipient's public key of receiving party's generation, recipient's public key includes based on public affairs Formula yB=xBThe public key that G is generated, wherein yBIndicate recipient's public key;xBIndicate recipient's private key, and
Second computing unit, for obtaining coordinate points (k, l) based on the first random number and recipient's public key;
First encryption unit, for being encrypted using encryption method corresponding with k to information to be transmitted.
A kind of close system of label provided by the embodiments of the present application, is applied to information sender, the second computing unit may include:
First computation subunit obtains coordinate points (k, l) for the first random number to be multiplied with recipient's public key.
A kind of close system of label provided by the embodiments of the present application, is applied to information sender, the first computing module may include:
First arithmetic element, for using the first operational formula, to the first random number, Hamming weight d, information sender Sender's private key and n carry out operation, obtain s;
First operational formula includes: s=(r+d+xA)modn;
Wherein, xAIndicate sender's private key, and
Present invention also provides a kind of decryption system, have with a kind of decryption method provided by the embodiments of the present application Corresponding effect.A kind of decryption method provided by the embodiments of the present application is applied to above- mentioned information recipient, may include:
First receiving module, for receiving the close result of label (c, R, s) of information sender transmission;
First deciphering module obtains decrypted result m for encrypted result c to be decrypted using corresponding decryption method;
Second computing module obtains cryptographic Hash e for carrying out Hash operation to encrypted result c;
Third computing module, for calculating the Hamming weight d of cryptographic Hash e;
T is calculated in 4th computing module, n and received s for obtaining based on Hamming weight d, in advance;
First obtains module, and for obtaining sender's public key of information sender, sender's public key includes being based on sender The public key that private key and point G are generated;
First authentication module, for verifying whether t, point G, sender's public key and received R, s meet default verifying item Part, if so, determining that decrypted result m is information to be transmitted.
A kind of decryption method provided by the embodiments of the present application, is applied to above- mentioned information recipient, and the 4th computing module can be with Include:
Third computing unit, for using the second operational formula, the n and received s obtained based on Hamming weight d, in advance T is calculated;
Second operational formula includes: t=(s-d) modn;
Correspondingly, the first authentication module may include:
First authentication unit, for verifying equation tG-yAWhether=R is true, if so, determining that t, point G, sender are public Key and received R, s meet default verification condition.
Present invention also provides a kind of close equipment of label and computer readable storage mediums, all have the embodiment of the present application and mention A kind of correspondence effect that label decryption method has supplied.Referring to Fig. 3, Fig. 3 is a kind of close equipment of label provided by the embodiments of the present application Structural schematic diagram.
A kind of close equipment of label provided by the embodiments of the present application, is applied to information sender, may include:
Memory 201, for storing computer program;
Processor 202 realizes the step that decryption method is signed described in any embodiment as above when for executing computer program Suddenly.
Referring to Fig. 4, another sign provided by the embodiments of the present application can also include: to connect in close equipment with processor 202 The input port 203 connect is used for transmission the extraneous order inputted to processor 202;The display unit being connect with processor 202 204, the processing result for video-stream processor 202 is to the external world;The communication module 205 being connect with processor 202, for realizing label Close equipment and extraneous communication.Display unit 204 can make display etc. for display panel, laser scanning;205 institute of communication module The communication mode of use includes but is not limited to mobile high definition chained technology (HML), universal serial bus (USB), the more matchmakers of high definition Body interface (HDMI) is wirelessly connected: adopting wireless fidelity technology (WiFi), the low-power consumption bluetooth communication technology, is based on Bluetooth Communication Technology The communication technology of IEEE802.11s.
A kind of computer readable storage medium provided by the embodiments of the present application, which is characterized in that computer-readable storage medium It is stored with computer program in matter, any embodiment as above described label close side is realized when computer program is executed by processor The step of method.
Computer readable storage medium involved in the application includes random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field Any other form of storage medium well known to interior.
Relevant portion in a kind of label decryption system provided by the embodiments of the present application, equipment and computer readable storage medium Illustrate the detailed description for referring to corresponding part in a kind of label decryption method provided by the embodiments of the present application, details are not described herein. In addition, in above-mentioned technical proposal provided by the embodiments of the present application with correspond to the consistent portion of technical solution realization principle in the prior art Divide and unspecified, in order to avoid excessively repeat.
It should also be noted that, herein, relational terms such as first and second and the like are used merely to one Entity or operation are distinguished with another entity or operation, without necessarily requiring or implying between these entities or operation There are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant are intended to contain Lid non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The foregoing description of the disclosed embodiments makes those skilled in the art can be realized or use the application.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the application, to realize in other embodiments.Therefore, the application will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest Range.

Claims (10)

1. a kind of label decryption method, which is characterized in that be applied to information sender, comprising:
The first random number is chosen, the point G on elliptic curve chosen to first random number and in advance carries out operation and obtains R, The rank of the point G is the prime number n for meeting safety requirements;
Information to be transmitted is obtained, the information to be transmitted is encrypted using encryption method, obtains encrypted result c;
Calculate the cryptographic Hash e of the encrypted result c;
Calculate the Hamming weight d of the cryptographic Hash e;
Operation is carried out to first random number, the Hamming weight d, sender's private key of the information sender and n, is obtained s;
(c, R, s) is sent to receiving party as close result is signed.
2. the method according to claim 1, wherein the first random number of the selection, comprising:
Appoint and takesAs the first random number r;
Point G on the elliptic curve chosen to first random number and in advance carries out operation and obtains R, comprising:
First random number is multiplied with the point G, obtains R.
3. according to the method described in claim 2, it is characterized in that, described carry out the information to be transmitted using encryption method Encryption, comprising:
Recipient's public key that the receiving party generates is obtained, recipient's public key includes being based on formula yB=xBWhat G was generated Public key, wherein yBIndicate recipient's public key;xBIndicate recipient's private key, and
Coordinate points (k, l) is obtained based on first random number and recipient's public key;
The information to be transmitted is encrypted using encryption method corresponding with k.
4. according to the method described in claim 3, it is characterized in that, described public based on first random number and the recipient Key obtains coordinate points (k, l), comprising:
First random number is multiplied with recipient's public key, obtains the coordinate points (k, l).
5. according to the method described in claim 4, it is characterized in that, it is described to first random number, the Hamming weight d, The sender's private key and n of the information sender carry out operation, obtain s, comprising:
It is private to the sender of first random number, the Hamming weight d, the information sender using the first operational formula Key and n carry out operation, obtain s;
First operational formula includes: s=(r+d+xA)modn;
Wherein, xAIndicate described sender private key, and
6. a kind of decryption method, which is characterized in that applied to the receiving party in any one of claim 1 to 5, packet It includes:
Receive the close result of the label (c, R, s) that the information sender is sent;
The encrypted result c is decrypted using corresponding decryption method, obtains decrypted result m;
Hash operation is carried out to the encrypted result c, obtains the cryptographic Hash e;
Calculate the Hamming weight d of the cryptographic Hash e;
Based on the Hamming weight d, in advance t is calculated in the n and received s obtained;
Sender's public key of the information sender is obtained, described sender public key includes being based on sender's private key and the point G The public key of generation;
Whether verifying t, the point G, described sender public key and received R, s meet default verification condition, if so, determining The decrypted result m is the information to be transmitted.
7. according to the method described in claim 6, it is characterized in that, the n obtained based on the Hamming weight d, in advance and T is calculated in received s, comprising:
Using the second operational formula, t is calculated in the n and received s obtained based on the Hamming weight d, in advance;
Second operational formula includes: t=(s-d) mod n;
Whether the verifying t, the point G, described sender public key and received R, s meet default verification condition, comprising:
Verify equation tG-yAWhether=R is true, if so, determining that t, the point G, described sender public key and received R, s are full The foot default verification condition.
8. a kind of close system of label, which is characterized in that be applied to information sender, comprising:
First chooses module, for choosing the first random number, on the elliptic curve chosen to first random number and in advance Point G carries out operation and obtains R, and the rank of the point G is the prime number n for meeting safety requirements;
First encrypting module encrypts the information to be transmitted using encryption method, obtains for obtaining information to be transmitted Encrypted result c;
First computing module, for calculating the cryptographic Hash e of the encrypted result c;
Second computing module, for calculating the Hamming weight d of the cryptographic Hash e;
First computing module, it is private for the sender to first random number, the Hamming weight d, the information sender Key and n carry out operation, obtain s;
First sending module, for (c, R, s) to be sent to receiving party as close result is signed.
9. a kind of close equipment of label, which is characterized in that be applied to information sender, comprising:
Memory, for storing computer program;
Processor realizes the step that decryption method is signed as described in any one of claim 1 to 5 when for executing the computer program Suddenly.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium Program realizes the step of decryption method is signed as described in any one of claim 1 to 5 when the computer program is executed by processor.
CN201910180575.9A 2019-03-11 2019-03-11 A kind of label decryption method, system, equipment and computer readable storage medium Pending CN109921896A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910180575.9A CN109921896A (en) 2019-03-11 2019-03-11 A kind of label decryption method, system, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910180575.9A CN109921896A (en) 2019-03-11 2019-03-11 A kind of label decryption method, system, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109921896A true CN109921896A (en) 2019-06-21

Family

ID=66964246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910180575.9A Pending CN109921896A (en) 2019-03-11 2019-03-11 A kind of label decryption method, system, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109921896A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569259A (en) * 2021-07-29 2021-10-29 深圳证券信息有限公司 Data sharing method, system, equipment and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104052606A (en) * 2014-06-20 2014-09-17 北京邮电大学 Digital signature, signature authentication device and digital signature method
CN104836808A (en) * 2015-05-12 2015-08-12 中国科学院软件研究所 Method for verifying safety of SM2 signature algorithm based on improved difference error attack
CN108809650A (en) * 2018-05-04 2018-11-13 西安电子科技大学 Without safe lane without certificate anonymity multi-receiver label decryption method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104052606A (en) * 2014-06-20 2014-09-17 北京邮电大学 Digital signature, signature authentication device and digital signature method
CN104836808A (en) * 2015-05-12 2015-08-12 中国科学院软件研究所 Method for verifying safety of SM2 signature algorithm based on improved difference error attack
CN108809650A (en) * 2018-05-04 2018-11-13 西安电子科技大学 Without safe lane without certificate anonymity multi-receiver label decryption method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
周克元: "公开验证和前向安全数字签密方案的分析与改进", 《西北师范大学学报(自然科学版)》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569259A (en) * 2021-07-29 2021-10-29 深圳证券信息有限公司 Data sharing method, system, equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US10944575B2 (en) Implicitly certified digital signatures
CN104270249B (en) It is a kind of from the label decryption method without certificate environment to identity-based environment
US9698993B2 (en) Hashing prefix-free values in a signature scheme
Kaur et al. Digital signature
US10148422B2 (en) Implicitly certified public keys
US8995656B2 (en) Multiple hashing in a cryptographic scheme
CN109274503A (en) Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system
CN104301108B (en) It is a kind of from identity-based environment to the label decryption method without certificate environment
EP2798773B1 (en) Generating digital signatures
US9049022B2 (en) Hashing prefix-free values in a certificate scheme
CN107425971B (en) Certificateless data encryption/decryption method and device and terminal
CN101296072B (en) Sharing cryptographic key generation method of elliptic curve
CN113141247B (en) Homomorphic encryption method, homomorphic encryption device, homomorphic encryption system and readable storage medium
CN101931536A (en) Method for encrypting and authenticating efficient data without authentication center
CN114448641A (en) Privacy encryption method, electronic equipment, storage medium and chip
CN106453253A (en) Efficient identity-based concealed signcryption method
CN105530089A (en) Attribute base encryption method and device
CN110519040B (en) Anti-quantum computation digital signature method and system based on identity
CN109921896A (en) A kind of label decryption method, system, equipment and computer readable storage medium
CN101957962A (en) Application and verification method of electronic stamp software system
Shah et al. Efficient Cryptography for data security
CN109905232A (en) A kind of label decryption method, system, equipment and computer readable storage medium
KR20170087120A (en) Certificateless public key encryption system and receiving terminal
JP2007208410A (en) Id base encryption communication system
KR101740958B1 (en) Encryption system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190621

RJ01 Rejection of invention patent application after publication