WO2013091348A1 - 基于代理的加密、解密方法,网络设备、网络装置及系统 - Google Patents

基于代理的加密、解密方法,网络设备、网络装置及系统 Download PDF

Info

Publication number
WO2013091348A1
WO2013091348A1 PCT/CN2012/075849 CN2012075849W WO2013091348A1 WO 2013091348 A1 WO2013091348 A1 WO 2013091348A1 CN 2012075849 W CN2012075849 W CN 2012075849W WO 2013091348 A1 WO2013091348 A1 WO 2013091348A1
Authority
WO
WIPO (PCT)
Prior art keywords
proxy
encrypted
proxy servers
ciphertext
servers
Prior art date
Application number
PCT/CN2012/075849
Other languages
English (en)
French (fr)
Inventor
徐磊
吴晓昕
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP12766371.4A priority Critical patent/EP2629448B1/en
Priority to US13/687,968 priority patent/US8873754B2/en
Publication of WO2013091348A1 publication Critical patent/WO2013091348A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations

Definitions

  • the present invention relates to the field of communication technology, and in particular to a proxy-based encryption and decryption method, network equipment, network device, and system.
  • the shared encrypted file system is a method to achieve network storage security at the file system layer. It provides end-to-end security, that is, file data is encrypted and stored on a proxy server. All operations involving file encryption and decryption in the system are performed The client is done. The ciphertext data stored on the proxy server can prevent information leakage caused by system intrusion or unauthorized administrators.
  • the main problem faced by the shared encrypted file system is key management, including the creation, access, distribution, and revocation of keys.
  • the key management methods in the existing shared encrypted file system can be divided into two categories: The first category is to access files in groups, that is, files with the same access rights are grouped into a group, and the files in the group share a key.
  • the owner or a trusted third party distributes to authorized users; the second method is to encrypt the file key with the public key of each authorized user. After a series of calculations and processing by the proxy server, each file can have a different encryption Key.
  • the typical representative of the second type of method is proxy re-encryption.
  • the feature of this method is that it can realize file sharing at the granular level.
  • the key in the shared encrypted file system of proxy re-encryption can be passed through incompletely trusted To distribute to authorized users.
  • the existing proxy re-encryption requires each user to have its own public key and private key.
  • the public key is the key that a user discloses to other authorized users, and the private key is A key saved by a user and only known to him, and data or files encrypted with a certain public key can only be decrypted by the corresponding private key. Similarly, files encrypted with a certain private key can only be decrypted.
  • the public key can be decrypted.
  • the embodiment of the present invention provides a proxy-based encryption and decryption method, network equipment, network device, and system, which can improve the reliability and security of encrypted file transmission based on the proxy.
  • a proxy-based encryption method including:
  • An agent-based decryption method includes:
  • a network device including:
  • the proxy key generation module is configured to generate proxy keys corresponding to at least two proxy servers respectively according to the private key of the network device and the public key of the receiving end, and the number of the proxy keys is equal to the number of the at least two proxies The number of servers;
  • the sending module is configured to send the encrypted ciphertext and the proxy keys respectively corresponding to the at least two proxy servers to the at least two proxy servers, so that the at least two proxy servers are respectively based on the corresponding The proxy key re-encrypts the encrypted ciphertext.
  • a network device including:
  • the obtaining module is used to obtain the re-encrypted encrypted cipher text from at least two proxy servers;
  • a decryption preprocessing module configured to perform decryption preprocessing on the re-encrypted encrypted ciphertexts from at least two proxy servers to generate preprocessed ciphertexts;
  • the decryption module is used to decrypt the preprocessed ciphertext.
  • An agent-based network system includes: at least one of the aforementioned network devices, at least one of the aforementioned network devices, and at least two proxy servers.
  • the sending end generates multiple proxy keys corresponding to multiple proxy servers according to the private key of the sending end and the public key of the receiving end, and the receiving end obtains the re-encrypted encrypted cipher text from the multiple proxy servers.
  • Decryption makes the actual number of proxy servers participating in the transmission far more than one, avoiding the situation that the transmission process may be forced to terminate due to proxy server failure when only one proxy server participates in the transmission, and the proxy-based re-encryption is improved. Reliability and security of transmission.
  • Fig. 1 is a flowchart of a proxy-based encryption method in an embodiment of the present invention
  • Fig. 2 is a flowchart of a proxy-based decryption method in an embodiment of the present invention
  • Fig. 3 is a transmission method based on proxy re-encryption in an embodiment of the present invention Flow chart
  • Figure 4 is a flow chart of a method for generating a proxy key in an embodiment of the present invention
  • Figure 5 is a flow chart of a decryption preprocessing method in an embodiment of the present invention
  • FIG. 6 is a schematic diagram of the structure of a network device in an embodiment of the present invention.
  • FIG. 7 is a schematic diagram of the structure of a network device in an embodiment of the present invention.
  • FIG. 8 is a schematic diagram of the structure of an agent-based network system in an embodiment of the present invention. Ways to implement the invention
  • the embodiment of the present invention provides a proxy-based encryption method. As shown in FIG. 1, the method includes:
  • Step 101 According to the private key of the sending end and the public key of the receiving end, generate corresponding to Proxy keys of at least two proxy servers, where the number of the proxy keys is equal to the number of the at least two proxy servers;
  • At least two proxy servers are used to perform proxy re-encryption, and the sender at least generates proxy keys corresponding to the number of proxy servers used to ensure that each proxy server has a corresponding proxy key. Re-encrypt the encrypted ciphertext sent by the sender and encrypted by the sender.
  • the generated proxy keys corresponding to the number of proxy servers are different.
  • the proxy server can be all proxy servers visible in the current system, or the sender can select enough proxy servers from all proxy servers according to its own needs to participate in the transmission. For example, the sender can select all proxy servers from all proxy servers. Choose a proxy server with stronger computing power or with larger transmission capacity.
  • Step 102 Send the encrypted ciphertext and the proxy keys respectively corresponding to the at least two proxy servers to the at least two proxy servers respectively, so that the at least two proxy servers respectively according to the corresponding The proxy key re-encrypts the encrypted ciphertext.
  • the embodiment of the present invention also provides an agent-based decryption method, as shown in Figure 2, including:
  • Step 201 Obtain re-encrypted encrypted cipher texts from at least two proxy servers;
  • Step 202 Perform decryption preprocessing on the re-encrypted encrypted ciphertexts from at least two proxy servers to generate preprocessed ciphertexts.
  • each proxy server uses its corresponding proxy key to perform proxy re-encryption of the encrypted ciphertext. Since the proxy key corresponding to each proxy server is different from each other, the encrypted ciphertext re-encrypted by each proxy server is different from each other. It is also different. For security reasons, the receiving end receives at least two re-encrypted encrypted ciphertexts at the same time. At this time, the received multiple re-encrypted encrypted ciphertexts can be decrypted and preprocessed to generate preprocessed ciphertexts.
  • Step 203 Decrypt the preprocessed ciphertext.
  • the following is a specific embodiment of a transmission method based on proxy re-encryption using the foregoing proxy-based encryption method and proxy-based decryption method.
  • Step 301 Generate proxy keys respectively corresponding to at least two proxy servers according to the private key of the sending end and the public key of the receiving end, where the number of the proxy keys is equal to the number of the proxy servers;
  • step 301 specifically includes:
  • Step 301b Generate the proxy keys corresponding to the at least two proxy servers respectively according to the random polynomial and the public key of the receiving end.
  • step 301b is specifically:
  • the gap between f Wb also increases, which improves the security of the sent ciphertext.
  • i is a continuous positive integer from 1 to n
  • n is the number of proxy servers selected by the sender to participate in the re-encryption of the encrypted ciphertext.
  • Step 302 The sending end generates an encrypted ciphertext
  • Sender uses its public key to encrypt Z a to enciphered transmitted to the receiving end of the ciphertext, in the embodiment of the present invention, a part of the ciphertext is the cyclic group of order m H element of the prime number p.
  • the system is given two cyclic groups G and H with the same prime number p.
  • the meaning of the cyclic group can be expressed as:
  • the generator of G is g, and each element in G is the power of g ;
  • the generator of H is h, and each element in H is the power of h.
  • the result of the bilinear mapping of G is H.
  • the bilinear mapping is a kind of function mapping. The function mapping can be completed by using the Miller algorithm, and will not be expanded here.
  • the encrypted ciphertext is (g ⁇ mZ"), where Z is the value of the generator g of G through the bilinear mapping e(g, g).
  • Step 303 Send the encrypted ciphertext and the proxy keys respectively corresponding to the at least two proxy servers to the at least two proxy servers, so that the at least two proxy servers are respectively based on the corresponding proxy secrets.
  • the key re-encrypts the encrypted ciphertext.
  • the sending end selects proxy servers for multiple transmissions according to actual needs. Assuming that when a certain ciphertext is transmitted, the sending end selects three proxy servers to participate in the transmission and re-encryption, and the three proxy servers send First agent service , The second proxy server and the third proxy server, the proxy key corresponding to the first proxy server generated by the sender is g "" b , and the proxy key corresponding to the second proxy server is g f CTb , corresponding to The proxy key on the third proxy server is g f CTb . From the previous analysis, we can see that the values of f(l), f (2), and f (3) are different, so they correspond to the three proxies of the three proxy servers The keys are also different.
  • the sending end sorts and numbers the proxy servers according to a certain characteristic of each selected proxy server.
  • the speed of the transmission speed is sorted and numbered and so on.
  • Step 304 Each proxy server receives the proxy key and the encrypted ciphertext; further, after each proxy server receives the corresponding proxy key, it stores the proxy key, so that the same sender can perform another operation on the same receiving end again. When an encrypted ciphertext is sent, the sender does not need to generate the proxy key again to send it to the corresponding proxy server.
  • Step 305 Each proxy server re-encrypts the encrypted ciphertext according to the proxy key corresponding to each proxy server;
  • step 302 the form of the encrypted ciphertext generated by the sender is (g ⁇ mZ ).
  • the proxy server will send g 1 and the corresponding proxy key g f CTb Perform bilinear mapping to obtain z lf(5)b , and finally generate a re-encrypted encrypted ciphertext (Z lbf(5 ), mZ al ).
  • Step 306 The receiving end obtains the re-encrypted ciphertext from at least two proxy servers.
  • the re-encryption of the encrypted ciphertext performed by each proxy server is also different.
  • Step 307 The receiving end performs decryption preprocessing on the re-encrypted encrypted ciphertexts from the at least two proxy servers to generate preprocessed ciphertexts;
  • step 307 specifically includes:
  • a finite field is defined as a field containing only multiple elements, where the simplest finite field is the co-ring Y/ (p) obtained by the integer ring Y modulo a prime number p, which is composed of p elements 0,1, ⁇ —1 composition, press and multiply by modulo ⁇ .
  • Step 307b calculate k+1 lb V f (i)L(O) by using and the re-encrypted encrypted ciphertext
  • the generator of the ring group; Z- is the specific form of the preprocessed ciphertext.
  • the sending end and the receiving end of the embodiment of the present invention may be a computer, a mobile phone, etc., and, in the embodiment of the present invention, for the convenience of description, the functions of the sending end and the receiving end are strictly distinguished.
  • the sender can also be the receiver at the same time, that is, the same device can send encrypted ciphertexts, receive and decrypt encrypted ciphertexts.
  • the sending end generates multiple proxy keys corresponding to multiple proxy servers according to the private key of the sending end and the public key of the receiving end, and the receiving end obtains the re-encrypted encrypted cipher text from the multiple proxy servers.
  • Decryption makes the number of proxy servers actually participating in the transmission far more than one, avoiding the situation that the transmission process may be forced to terminate due to proxy server failure when only one proxy server participates in the transmission, and it improves the proxy-based re-encryption. Reliability and security of transmission.
  • the embodiment of the present invention provides a network device.
  • the network device includes:
  • the proxy key generation module 11 is configured to generate proxy keys corresponding to at least two proxy servers respectively according to the private key of the network device and the public key of the receiving end, and the number of the proxy keys is equal to the number of the at least two proxy servers.
  • At least two proxy servers are used to perform proxy re-encryption, and the proxy key generation module 11 generates at least proxy keys corresponding to the number of proxy servers used to ensure that each proxy server has The corresponding proxy key is used to re-encrypt the ciphertext sent by the network device and encrypted by the network device.
  • the proxy key corresponding to the number of proxy servers generated by the generation module 11 are different from each other.
  • the proxy server can be all proxy servers visible in the current system, or it can select enough proxy servers from all proxy servers for the network device according to its own needs to participate in the transmission, for example, the network device from all proxy servers choose a proxy server with stronger computing power or with larger transmission capacity.
  • the proxy key generation module 11 is specifically used for
  • the proxy key generation module 11 is also used for the proxy key generation module 11 .
  • the generation of the proxy keys corresponding to the at least two proxy servers according to the random polynomial and the public key of the receiving end is specifically:
  • i is a continuous positive integer from 1 to n
  • n is the number of proxy servers selected by the network device to participate in the re-encryption of the encrypted ciphertext.
  • the sending module 12 is configured to send the encrypted ciphertext and the proxy keys respectively corresponding to the at least two proxy servers to the at least two proxy servers, so that the at least two proxy servers are respectively based on the corresponding proxy
  • the key re-encrypts the encrypted ciphertext.
  • the network device selects proxy servers for multiple transmissions according to actual needs. It is assumed that when a ciphertext is transmitted, the network device selects three proxy servers to participate in the transmission and re-encryption, and the three proxy servers perform the network
  • the device is a first proxy server, a second proxy server, and a third proxy server.
  • the proxy key generated by the network device corresponding to the first proxy server is g "" b , which corresponds to the proxy of the second proxy server.
  • the key is g " b
  • the proxy key corresponding to the third proxy server is g f (3)b . From the previous analysis, we can see that the values of f (l), f (2) and f (3) are different, Therefore, the three proxy keys corresponding to the three proxy servers are also different.
  • the network device sorts and numbers the proxy servers according to a certain characteristic of each selected proxy server. For example, the network device sorts and numbers the proxy server according to the transmission capacity of the proxy server, or the network device sorts and numbers the proxy server according to the proxy server's The transmission speed is sorted and numbered.
  • the network equipment further includes:
  • Encryption module 13 used to generate encrypted ciphertext.
  • the encryption module 13 uses the public key z a of the network device to encrypt the ciphertext to be encrypted and transmitted to the receiving end.
  • the ciphertext is an element belonging to a cyclic group H with a prime number p m.
  • the system gives two cyclic groups G of the same prime number p And H, the meaning of the cyclic group can be expressed as:
  • the generator of G is g, and each element in G is a power of g; in the same way, the generator of H is h, and each element in H is a power of h Second-rate.
  • the result of G passing through the bilinear mapping is H.
  • the bilinear mapping is a function mapping, and the function mapping can be completed by using Miller's algorithm, which will not be expanded here.
  • the encrypted ciphertext is (g ⁇ mZ"), where Z is the value of the generator g of G through the bilinear mapping e(g, g).
  • the embodiment of the present invention also provides a network device.
  • the network device includes:
  • the obtaining module 21 is used to obtain the re-encrypted ciphertext from at least two proxy servers;
  • the acquisition module 21 of the network device receives at least k+1 re-encryption.
  • the encrypted encrypted ciphertext can finally be decrypted to obtain the correct ciphertext, and the k is the highest number of random polynomials generated by the sender.
  • the decryption preprocessing module 22 is configured to decrypt the re-encrypted encrypted ciphertext and preprocess to generate a preprocessed ciphertext;
  • the decryption preprocessing module 22 is specifically used for
  • a finite field is defined as a field containing only multiple elements, where the simplest finite field is the co-ring Y/ (p) obtained by the integer ring Y modulo a prime number p, which is composed of p elements 0,1, ⁇ —1 composition, press and multiply by modulo ⁇ .
  • the decryption preprocessing module 22 is also used for the decryption preprocessing module 22 .
  • the generator of the ring group; Z- is the specific form of the preprocessed ciphertext.
  • the encrypted ciphertext sent by the sender to the proxy server is ( ⁇ , ⁇ )
  • the generated proxy keys are in the form of g fWb
  • the encrypted ciphertexts are re-encrypted by the proxy servers
  • the form of is (Z lbf(1 ), mZ al ), which is re-encrypted by different proxy servers, and the Z lbf(i) item in the re-encrypted encrypted ciphertext is different.
  • the decryption module 23 is used to decrypt the preprocessed ciphertext.
  • the decryption module 23 uses the private key b of the network device and another part of the re-encrypted encrypted ciphertext mZ ak for decryption, which is specifically calculated as mZ al. Therefore, the network device successfully receives the data sent by the network device.
  • the embodiment of the present invention also provides a proxy-based encryption and decryption system, as shown in Figure 8. As shown, the system includes:
  • network equipment and network device in the embodiments of the present invention may be computers, mobile phones, etc., respectively.
  • the network device generates multiple proxy keys corresponding to multiple proxy servers according to the private key of the network device and the public key of the network device, and the network device obtains the re-encrypted encryption key from the multiple proxy servers.
  • the text is decrypted, so that the number of proxy servers actually participating in the transmission is far more than one, which avoids the situation that the transmission process is forced to terminate due to proxy server failure when only one proxy server participates in the transmission. The reliability and security of encrypted transmission.
  • the method of the embodiment of the present invention can be implemented by a general integrated circuit (such as a central processing unit)
  • a general integrated circuit such as a central processing unit
  • the devices, modules, and units in the embodiments of the present invention may specifically be general integrated circuits (such as a central processing unit (CPU)), special integrated circuits (ASIC), or other devices.
  • CPU central processing unit
  • ASIC application specific integrated circuit
  • the present invention can be implemented by means of software plus necessary general-purpose hardware. Of course, it can also be implemented by hardware, but in many cases the former is a better embodiment. .
  • the technical solution of the present invention essentially or the part that contributes to the prior art can be embodied in the form of a software product, and the computer software product is stored in a readable storage medium, such as a computer floppy disk.
  • a hard disk or an optical disk, etc. include a number of instructions to enable a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method described in each embodiment of the present invention.

Abstract

本发明实施例公开了一种基于代理的加密、解密方法,网络设备、网络装置及系统,能够提高基于代理进行加密文件传输的可靠性和安全性。该加密方法包括:根据发送端的私钥和接收端的公钥生成分别对应于至少两个代理服务器的代理密钥,所述代理密钥的个数等于所述代理服务器的个数;将加密密文和所述分别对应于至少两个代理服务器的代理密钥分别发送给所述至少两个代理服务器,以使所述至少两个代理服务器分别根据对应的代理密钥重加密所述加密密文。该解密方法包括:获取来自至少两个代理服务器的重加密的加密密文;对所述来自至少两个代理服务器的重加密的加密密文进行解密预处理,生成预处理密文;解密所述预处理密文。

Description

基于代理的加密、 解密方法, 网络设备、 网络装置及系统 技术领域
本发明涉及通信技术领域, 尤其涉及一种基于代理加密、解密 方法, 网络设备、 网络装置及系统。
发明背景 共享加密文件系统是在文件系统层实现网络存储安全的方法, 它提供了端到端的安全,即文件数据经过加密后存储在代理服务器 上, 系统中所有涉及文件加密、解密的操作均在客户端完成。 代理 服务器上存储的是密文数据,可以防止因系统入侵或管理员越权造 成的信息泄露。
共享加密文件系统面对的主要问题是密钥管理,包括密钥的创 建、存取、 分发和撤销。 现有的共享加密文件系统中的密钥管理方 法可分为两类: 第一类是将文件分组访问, 即将具有相同访问权限 的文件归为一组,组内文件共享一个密钥, 由文件拥有者或可信任 的第三方分发给授权用户;第二类方法是将文件密钥用每个授权用 户的公钥加密,经过代理服务器的一系列计算处理后,每个文件可 以有不同的加密密钥。
采用第二类方式的典型代表为代理重加密,这种方式的特点是 可以实现文件粒度级的共享,在具体实现时,代理重加密的共享加 密文件系统中的密钥可通过不完全可信的代理来分发给授权用户。
现有的代理重加密要求每个用户都拥有自己的公钥和私钥,其 中,公钥为某一用户向其他得到其授权的用户公开的密钥,私钥为 由某一用户自己保存并且只有自己知道的密钥,并且,用某一公钥 进行加密的数据或文件只有对应的私钥可以进行解密, 同样的,用 某一私钥进行加密的文件只有对应的公钥可以进行解密。
在现有技术中, 参与现有的代理重加密方法的代理服务器只有一 个,所以若该代理服务器出现故障,会导致代理重加密过程无法顺 利完成, 共享文件过程被迫终止。 因此, 现有的代理重加密方法的 可靠性、 安全性较低。
发明内容
本发明实施例提供一种基于代理的加密、解密方法,网络设备、 网络装置及系统,能够提高基于代理进行加密文件传输的可靠性和 安全性。
本发明实施例采用如下技术方案:
一种基于代理的加密方法, 包括:
根据发送端的私钥和接收端的公钥生成分别对应于至少两个 代理服务器的代理密钥,所述代理密钥的个数等于所述至少两个代 理服务器的个数;
将加密密文和所述分别对应于至少两个代理服务器的代理密 钥分别发送给所述至少两个代理服务器,以使所述至少两个代理服 务器分别根据对应的代理密钥重加密所述加密密文。
一种基于代理的解密方法, 包括:
获取来自至少两个代理服务器的重加密的加密密文; 对所述来自至少两个代理服务器的重加密的加密密文进行解 密预处理, 生成预处理密文; 解密所述预处理密文。
一种网络设备, 包括:
代理密钥生成模块,用于根据所述网络设备的私钥和接收端的 公钥生成分别对应于至少两个代理服务器的代理密钥,所述代理密 钥的个数等于所述至少两个代理服务器的个数;
发送模块,用于将加密密文和所述分别对应于至少两个代理服 务器的代理密钥分别发送给所述至少两个代理服务器,以使所述至 少两个代理良务器分别根据对应的代理密钥重加密所述加密密文。
一种网络装置, 包括:
获取模块,用于获取来自至少两个代理服务器的重加密的加密 密文;
解密预处理模块,用于对所述来自至少两个代理服务器的重加 密的加密密文进行解密预处理, 生成预处理密文;
解密模块, 用于解密所述预处理密文。
一种基于代理的网络系统, 包括: 至少一个上述网络设备, 至 少一个上述网络装置, 以及至少两个代理服务器。
在本发明的实施例中,发送端根据发送端的私钥和接收端的公钥生 成分别多个分别对应于多个代理服务器的代理密钥,接收端从多个 代理服务器获取重加密的加密密文进行解密,使得实际参与传输的 代理服务器的个数远多于一个,避免了当只有一个代理服务器参与 传输时可能出现的由于代理服务器故障, 传输过程被迫终止的状 况, 提高了基于代理重加密传输的可靠性、 安全性。 附图简要说明
为了更清楚地说明本发明实施例的技术方案,下面将对实施例 描述中所需要使用的附图作筒单地介绍,显而易见地,下面描述中 的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在 不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附 图。
图 1为本发明实施例中的基于代理的加密方法流程图; 图 2为本发明实施例中的基于代理的解密方法流程图; 图 3为本发明实施例中的基于代理重加密的传输方法流程图; 图 4为本发明实施例中的生成代理密钥方法流程图; 图 5为本发明实施例中的解密预处理方法流程图;
图 6为本发明实施例中的网络设备结构示意图;
图 7为本发明实施例中的网络装置结构示意图;
图 8为本发明实施例中的基于代理的网络系统结构示意图。 实施本发明的方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术 方案进行清楚、 完整地描述, 显然, 所描述的实施例是本发明一部 分实施例, 而不是全部的实施例。基于本发明中的实施例, 本领域 普通技术人员在没有作出创造性劳动前提下所获得的所有其他实 施例, 都属于本发明保护的范围。
实施例一
本发明实施例提供一种基于代理的加密方法,如图 1所示,该 方法包括:
步骤 101、根据发送端的私钥和接收端的公钥生成分别对应于 至少两个代理服务器的代理密钥,所述代理密钥的个数等于所述至 少两个代理服务器的个数;
在本发明实施例中, 使用至少两个代理服务器进行代理重加 密,发送端至少生成分别对应于所使用的代理服务器的个数的代理 密钥,以保证各个代理服务器有对应的代理密钥来对发送端发出的 经过发送端加密的加密密文进行重加密。
并且,为了加强代理重加密的安全性和可靠性,所生成的对应 于所述代理服务器的个数的各个代理密钥各不相同。
需要说明的是,所述代理服务器可为当前系统可见的所有代理 服务器,也可为发送端从所有代理服务器中根据自身的需要选出足 够的代理服务器来参与传输,例如发送端从所有代理服务器中选择 运算能力较强的或是传输容量较大的代理服务器。
步骤 102、将加密密文和所述分别对应于至少两个代理良务器 的代理密钥分别发送给所述至少两个代理服务器,以使所述至少两 个代理良务器分别根据对应的代理密钥重加密所述加密密文。
本发明实施例还提供了一种基于代理的解密方法, 如图 2所 示, 包括:
步骤 201、 获取来自至少两个代理服务器的重加密的加密密 文;
步骤 202、对所述来自至少两个代理良务器的重加密的加密密 文进行解密预处理, 生成预处理密文;
在本发明实施例中,各个代理服务器利用各自对应的代理密钥 对加密密文进行代理重加密,由于每个代理服务器对应的代理密钥 彼此不同, 于是每个代理服务器重加密的加密密文也是不同的, 出 于安全性的考虑,接收端同时接收至少两个重加密的加密密文并同 时对所接收的多个重加密的加密密文进行解密预处理,才能生成预 处理密文。
步骤 203、 解密所述预处理密文。
根据现有技术的方法对所述预处理密文进行解密,即可得到密 文的具体内容。
以下,为利用上述基于代理的加密方法和基于代理的解密方法 进行基于代理重加密的传输方法的具体实施例。
步骤 301、根据发送端的私钥和接收端的公钥生成分别对应于 至少两个代理服务器的代理密钥,所述代理密钥的个数等于所述代 理服务器的个数;
如图 4所示, 其中, 步骤 301具体包括:
步骤 301a、 生成随机多项式 f(x) = Ckxk+CklX k- . + c^ + a , 其 中 k 'ck'ck-i'"'ci为常数, a为所述发送端的私铜 , 1 < χ< η , η为所述 至少两个代理服务器的个数, 所述随机多项式的次数 k小于所述代 理服务器的个数;
发送端根据所发送的密文的安全需求选择多项式的次数 k , k 越大, 随机多项式 f(x) = ckxk+cklX k- 1 +〜 + c1x + a的项数越多, 形式 越复杂。
步骤 301b、 根据所述随机多项式和所述接收端的公钥生成分 别所述对应于所述至少两个代理良务器的代理密钥。
其中, 步骤 301b具体为:
根据 x = i的取值计算得到的所述随机多项式的对应的值 f(i), 计算得到所述代理密钥为 gfWb , 其中, gb为所述接收端的公钥, l≤i≤n, n为所述至少两个代理服务器的个数。 由 步 骤 301a 可 知 , k 越 大 , 随 机 多 项 式 f (x) = ckxk + cklX k- 1 + · · · + Clx + a的项数越多,形式越复杂,将各个 X = i 的值代入随机多项式 f(x) = ckxk +cklX k- . + x + a后, 对应的值 f (i)之间的差距就越大, 各个代理密钥 g f Wb之间的差距也随之增 大, 提高了发送的密文的安全性。
i的取值为从 1至 n的连续正整数, n为发送端选定的参与重加 密加密密文的代理服务器的个数。
步骤 302、 发送端生成加密密文;
发送端使用自己的公钥 Za对要经过加密传送给接收端的密文 进行加密, 在本发明实施例中, 所述密文为属于一个阶为素数 p 的循环群 H的元素 m。
在本发明实施例中,系统给定两个阶为同一素数 p的循环群 G 和 H, 循环群的意义可表达为: G的生成元为 g, G中的各个元素 均为 g的幂次; 同理, H的生成元为 h, H中的各个元素均为 h的 幂次。 并且, G经过双线性映射的结果为 H, 所述双线性映射为一 种函数映射, 该函数映射可使用米勒算法完成, 在此不再拓展。
经过发送端的加密后, 加密密文为 ( g^mZ" ), 其中, Z为 G 的生成元 g经过双线性映射 e(g, g)的值。
步骤 303、将加密密文和所述分别对应于至少两个代理服务器 的代理密钥分别发送给所述至少两个代理服务器,以使所述至少两 个代理良务器分别根据对应的代理密钥重加密所述加密密文。
发送端根据实际需要选定用于多个传输的代理服务器, 假设, 在某次传输密文时,所述发送端选定三个代理服务器参与传输以及 重加密, 所述三个代理服务器对发送端而言分别为第一代理服务 器,第二代理服务器以及第三代理服务器,所述发送端生成的对应 于第一代理服务器的代理密钥为 g ""b , 对应于第二代理服务器的 代理密钥为 g f CTb , 对应于第三代理服务器的代理密钥为 g f CTb , 由 之前分析可知, f(l)、 f (2)以及 f (3)的值各不相同, 故而对应于三 个代理服务器的三个代理密钥也各不相同。
在本发明实施例中,发送端根据各选定的代理服务器的某个特 征对代理服务器进行排序编号,如发送端根据代理服务器的传输能 力的高低进行排序编号,或是发送端根据代理服务器的传输速度的 快慢进行排序编号等。
步骤 304、 各代理服务器接收所述代理密钥和加密密文; 进一步地,各代理服务器接收对应的代理密钥后,存储所述代 理密钥,以便于同一发送端再次对同一接收端进行另一加密密文的 发送时, 发送端无需再次生成代理密钥向对应代理服务器发送。
步骤 305、各代理服务器根据所述分别对应于各代理服务器的 代理密钥重加密所述加密密文;
由步骤 302可知,发送端生成的加密密文的形式为( g^mZ ), 假设此时进行重加密的为第五代理服务器,则该代理服务器将 g1以 及对应的代理密钥 g f CTb进行双线性映射获得 zlf(5)b , 最终生成重加 密的加密密文( Zlbf(5),mZal )。
由此可知, 由于各个代理服务器的代理密钥彼此不同,所以每 个代理密钥对应的重加密的加密密文也彼此不同。
步骤 306、接收端获取来自至少两个代理服务器的重加密的加 密密文;
由于每个代理服务器对应的代理密钥彼此不同,故而由每个代 理服务器对加密密文进行的重加密也不同, 出于安全性的考虑,接 收端至少接收 k+1 个重加密的加密密文最终才可解密得到正确的 密文, 所述 k为发送端生成的随机多项式的最高次数。
步骤 307、接收端对所述来自至少两个代理服务器的重加密的 加密密文进行解密预处理, 生成预处理密文;
如图 5所示, 其中, 步骤 307具体包括:
步骤 307a、计算 ι^(0)= Π ^-,l<i<k + l, 其中 k为用于生成
≤k 对应于所述至少两个代理 良务器的代理密钥的随机多项式 f(x) = ckxk+ck_1xk-1 + --- + c1x + a的次数, ck,ck— ^…^为常数, a为所述 发送端的私钥, l≤x≤n, n为所述至少两个代理服务器的个数; 需要说明的是, 该运算是基于有限域 Fp的运算, 运算结果为 有限域 Fp内的元素, 筒单地说, 即运算结果! ^(0)为整数, 其中, l≤i≤k+l。
进一步地, 有限域的定义为仅含有多个元素的域, 其中, 最筒 单的有限域是整数环 Y模一个素数 p得到的余环 Y/ ( p ), 由 p个 元素 0,1,···ρ— 1组成, 按模 ρ相力口和相乘。
步骤 307b、 利用 和所述重加密的加密密文计算 k+1 lb V f (i)L(O)
n(zlbf(1)) =z - , 其中 Z为双线性映射 e(g,g)的值, g为循 i=l
lb V f )1^(0)
环群的生成元; Z - 为所述预处理密文的具体形式。
由于 f(x) = CkX k+Ck ixk- 1 +— + cix + a , 故而 f(0) = a , 而才艮据拉格 k+1 lb (1)1^(0)
朗日插值多项式, 有 f(0) = ^f(i)I,(0) , 所以 Ζ - =Zlba。 步骤 308、 接收端解密所述预处理密文。 与现有技术类似的,接收端利用自己的私钥 b以及重加密的加 密密文的另一部分 mZak来进行解密, 具体计算为^ = m。 由此, 接收端成功接收到由发送端向其发送的密文 m。
需要说明的是,本发明实施例的发送端和接收端分别可以是计 算机、 手机等, 并且, 在本发明实施例中, 为了方便描述, 将发送 端和接收端的功能进行了严格区分, 实际上,发送端同时也可为接 收端, 即同一设备既可发送加密密文也可接收并解密加密密文。
在本实施例的技术方案中,发送端根据发送端的私钥和接收端 的公钥生成多个分别对应于多个代理服务器的代理密钥,接收端从 多个代理服务器获取重加密的加密密文进行解密,使得实际参与传 输的代理服务器的个数远多于一个,避免了当只有一个代理服务器 参与传输时可能出现的由于代理服务器故障,传输过程被迫终止的 状况, 提高了基于代理重加密传输的可靠性、 安全性。
实施例二
本发明实施例提供一种网络设备,如图 6所示,该网络设备包 括:
代理密钥生成模块 11 , 用于根据所述网络设备的私钥和接收 端的公钥生成分别对应于至少两个代理服务器的代理密钥,所述代 理密钥的个数等于所述至少两个代理服务器的个数;
在本发明实施例中, 使用至少两个代理服务器进行代理重加 密, 所述代理密钥生成模块 11至少生成分别对应于所使用的代理 服务器的个数的代理密钥,以保证各个代理服务器有对应的代理密 钥来对网络设备发出的经过网络设备加密的密文进行重加密。
并且,为了加强代理重加密的安全性和可靠性,所述代理密钥 生成模块 11所生成的对应于所述代理服务器的个数的各个代理密 钥各不相同。
需要说明的是,所述代理服务器可为当前系统可见的所有代理 服务器,也可为网络设备从所有代理服务器中根据自身的需要选出 足够的代理服务器来参与传输,例如网络设备从所有代理服务器中 选择运算能力较强的或是传输容量较大的代理服务器。
所述代理密钥生成模块 11具体用于
生成随机多 项 式 f(x) = ckxk+cklX k- . + x + a , 其 中 k,Ck,ck— ^…^为常数, a为所述网络设备的私钥, l≤x≤n, n为所述 至少两个代理服务器的个数, 所述随机多项式的次数 k小于所述代 理服务器的个数;
网络设备根据所发送的密文的安全需求选择多项式的次数 k , k越大, 随机多项式 f(x) = ckxk+cklX k- . + x + a 的项数越多, 形 式越复杂。
所述代理密钥生成模块 11还用于
根据所述随机多项式和所述接收端的公钥生成所述对应于所 述至少两个代理服务器的代理密钥, 具体为:
根据 x = i的取值计算得到的所述随机多项式的对应的值 f(i), 计算得到所述代理密钥为 gfWb , 其中, gb为所述接收端的公钥, l≤i≤n, n为所述代理服务器的个数。
由于 k越大, 随机多项式 f(x) = ckxk+cklX k- 1+〜 + c1x + a 的项数 越多 , 形式越复杂, 将各个 x = i 的值代入随机多项式 f (X) = ckxk+ cklX k- 1 +••• + c1x + a后,对应的值 f (i)之间的差 巨就越大, 各个代理密钥 g f «b之间的差距也随之增大, 提高了发送的密文的 安全性。
i的取值为从 1至 n的连续正整数, n为网络设备选定的参与重 加密加密密文的代理服务器的个数。
发送模块 12, 用于将加密密文和所述分别对应于至少两个代 理服务器的代理密钥分别发送给所述至少两个代理服务器,以使所 述至少两个代理服务器分别根据对应的代理密钥重加密所述加密 密文。
网络设备根据实际需要选定用于多个传输的代理服务器, 假 设,在某次传输密文时,所述网络设备选定三个代理服务器参与传 输以及重加密,所述三个代理服务器对网络设备而言分别为第一代 理服务器,第二代理服务器以及第三代理服务器,所述网络设备生 成的对应于第一代理服务器的代理密钥为 g ""b , 对应于第二代理 服务器的代理密钥为 g " b , 对应于第三代理服务器的代理密钥为 g f (3)b , 由之前分析可知, f (l)、 f (2)以及 f (3)的值各不相同, 故而 对应于三个代理服务器的三个代理密钥也各不相同。
在本发明实施例中,网络设备根据各选定的代理服务器的某个 特征对代理服务器进行排序编号,如网络设备根据代理服务器的传 输能力的大小进行排序编号,或是网络设备根据代理服务器的传输 速度的高低进行排序编号等。
进一步的, 所述网络设备还包括:
加密模块 13, 用于生成加密密文。
加密模块 13使用所述网络设备的公钥 za对要经过加密传送给 接收端的密文进行加密,在本发明实施例中,所述密文为属于一个 阶为素数 p的循环群 H的元素 m。
在本发明实施例中,系统给定两个阶为同一素数 p的循环群 G 和 H, 循环群的意义可表达为: G的生成元为 g, G中的各个元素 均为 g的幂次; 同理, H的生成元为 h, H中的各个元素均为 h的 幂次。 并且, G经过双线性映射的结果为 H, 所述双线性映射为一 种函数映射, 该函数映射可使用米勒算法完成, 在此不再拓展。
经过加密模块 13的加密后, 加密密文为 ( g^mZ" ), 其中, Z 为 G的生成元 g经过双线性映射 e(g, g)的值。
本发明实施例还提供一种网络装置,如图 7所示,该网络装置 包括:
获取模块 21 , 用于获取来自至少两个代理服务器的重加密的 力口密密文;
由于每个代理服务器对应的代理密钥彼此不同,故而由每个代 理服务器对加密密文进行的重加密也不同, 出于安全性的考虑, 网 络装置的获取模块 21至少接收 k+1个重加密的加密密文最终才可 解密得到正确的密文,所述 k为发送端生成的随机多项式的最高次 数。
解密预处理模块 22, 用于对所述重加密的加密密文进行解密 预处理生成预处理密文;
所述解密预处理模块 22具体用于
计算! ^ (0) = II ^-,l < i < k + l , 其中 k为用于生成对应于至少 — m 两 个 代 理 服 务 器 的 代 理 密 钥 的 随 机 多 项 式 f(x) = ckxk +cklX k- 1 +〜 + c1x + a的次数, ck,ck— ^-^为常数, a为所述 发送端的私钥, l≤x≤n , n为所述至少两个代理服务器的个数; 需要说明的是, 该运算是基于有限域 Fp的运算, 运算结果为 有限域 Fp内的元素, 筒单地说, 即运算结果! ^(0)为整数, 其中, l≤i≤k+l。
进一步地, 有限域的定义为仅含有多个元素的域, 其中, 最筒 单的有限域是整数环 Y模一个素数 p得到的余环 Y/ ( p ), 由 p个 元素 0,1,···ρ— 1组成, 按模 ρ相力口和相乘。
所述解密预处理模块 22还用于
利 用 和 所 述 重 加 密 的 加 密 密 文 计 算
k+l
k+1 W0) lb V f (i)L(O)
l(Zlbf(1)) =Z - , 其中 Z为双线性映射 e(g,g)的值, g为循 k+l
lb V f )1^(0)
环群的生成元; Z - 为所述预处理密文的具体形式。
其中, 由前面的叙述可知, 由发送端发送给代理服务器的加密 密文为 ( ^,ητΖ ), 所生成的各代理密钥的形式为 gfWb, 则经过各 代理服务器重加密的加密密文的形式为 ( Zlbf(1),mZal ), 由不同的代 理月良务器进行重加密, 重加密的加密密文中的 Zlbf(i)这一项不同。
由于 f(x) = CkX k+Ck ixk- 1 +— + cix + a , 故而 f(0) = a, 而才艮据拉格 朗日插值多项式, 有 f (0) =
Figure imgf000015_0001
= Zlba
i=l
解密模块 23, 用于解密所述预处理密文。
与现有技术类似的, 解密模块 23利用所述网络装置的私钥 b 以及重加密的加密密文的另一部分 mZak来进行解密, 具体计算为 mZal 由此, 网络装置成功接收到由发送端向其发送的密文 m。 本发明实施例还提供一种基于代理的加密、 解密系统, 如图 8 所示, 该系统包括:
至少一个上述网络设备,至少一个上述网络装置, 以及至少两 个代理服务器,所述至少两个代理服务器用于分别根据对应的代理 密钥重加密所述加密密文。
需要说明的是,本发明实施例的网络设备和网络装置分别可以 是计算机、 手机等。
在本实施例的技术方案中,网络设备根据网络设备的私钥和网 络装置的公钥生成多个对应于多个代理服务器的代理密钥,网络装 置从多个代理服务器获取重加密的加密密文进行解密,使得实际参 与传输的代理服务器的个数远多于一个,避免了当只有一个代理服 务器参与传输时可能出现的由于代理服务器故障,传输过程被迫终 止的状况, 提高了基于代理重加密传输的可靠性、 安全性。
本发明实施例的方法可以由通用集成电路(如中央处理器
CPU )或专用集成电路(ASIC )执行。 本发明实施例的装置、 模 块、 单元具体可以是通用集成电路(如中央处理器 CPU )、 专用集 成电路(ASIC )或其他设备。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地 了解到本发明可借助软件加必需的通用硬件的方式来实现,当然也 可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的 理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分 可以以软件产品的形式体现出来,该计算机软件产品存储在可读取 的存储介质中, 如计算机的软盘, 硬盘或光盘等, 包括若干指令用 以使得一台计算机设备(可以是个人计算机,服务器, 或者网络设 备等)执行本发明各个实施例所述的方法。

Claims

本领域普通技术人员可以意识到,结合本文中所公开的实施例 描述的各示例的单元及算法步骤, 能够以电子硬件、或者计算机软 件和电子硬件的结合来实现。这些功能究竟以硬件还是软件方式来 执行,取决于技术方案的特定应用和设计约束条件。专业技术人员 可以对每个特定的应用来使用不同方法来实现所描述的功能,但是 这种实现不应认为超出本发明的范围。 所属领域的技术人员可以清楚地了解到, 为描述的方便和筒 洁, 上述描述的系统、 装置和单元的具体工作过程, 可以参考前述 方法实施例中的对应过程, 在此不再赘述。 在本申请所提供的几个实施例中,应该理解到,所揭露的系统、 装置和方法, 可以通过其它的方式实现。 例如, 以上所描述的装置 实施例仅仅是示意性的, 例如, 所述单元的划分, 仅仅为一种逻辑 功能划分, 实际实现时可以有另外的划分方式,例如多个单元或组 件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或 不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通 信连接可以是通过一些接口, 装置或单元的间接耦合或通信连接, 可以是电性, 机械或其它的形式。 所述作为分离部件说明的单元可以是或者也可以不是物理上 分开的,作为单元显示的部件可以是或者也可以不是物理单元, 即 可以位于一个地方,或者也可以分布到多个网络单元上。可以根据 实际的需要选择其中的部分或者全部单元来实现本实施例方案的 目的。 另外,在本发明各个实施例中的各功能单元可以集成在一个处 理单元中,也可以是各个单元单独物理存在,也可以两个或两个以 上单元集成在一个单元中。 以上所述,仅为本发明的具体实施方式,但本发明的保护范围 并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技 术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围 之内。因此,本发明的保护范围应所述以权利要求的保护范围为准。 权利要求书
1、 一种基于代理的加密方法, 其特征在于, 包括:
根据发送端的私钥和接收端的公钥生成分别对应于至少两个 代理服务器的代理密钥,所述代理密钥的个数等于所述代理服务器 的个数;
将加密密文和所述分别对应于至少两个代理服务器的代理密 钥分别发送给所述至少两个代理服务器,以使所述至少两个代理服 务器分别根据对应的代理密钥重加密所述加密密文。
2、 根据权利要求 1所述的方法, 所述根据发送端的私钥和接 收端的公钥生成分别对应于至少两个代理服务器的代理密钥包括: 生成随机多 项 式 f (x) = ckxk + cklX k- . + x + a , 其 中 k, Ck, ck— ^…^为常数, a为所述发送端的私钥, l≤x≤n , n为所述至 少两个代理服务器的个数, 所述随机多项式的次数 k小于所述至少 两个代理服务器的个数;
根据所述随机多项式和所述接收端的公钥生成所述分别对应 于至少两个代理服务器的代理密钥。
3、 根据权利要求 2所述的方法, 其特征在于, 所述根据所述 理服务器的代理密钥包括:
根据 x = i的取值计算得到的所述随机多项式的对应的值 f (i) , 计算得到所述代理密钥为 g f Wb , 其中, gb为所述接收端的公钥, l≤i≤n , n为所述至少两个代理服务器的个数。
4、 一种基于代理的解密方法, 其特征在于, 包括:
获取来自至少两个代理服务器的重加密的加密密文; 对所述来自至少两个代理服务器的重加密的加密密文进行解 密预处理, 生成预处理密文;
解密所述预处理密文。
5、 根据权利要求 4所述的方法, 其特征在于, 对所述重加密 的加密密文进行解密预处理生成预处理密文包括:
计算 Li(0)= Π T^-,l<i<k + l, 其中 k为用于生成对应于至少
1— 两 个 代 理 服 务 器 的 代 理 密 钥 的 随 机 多 项 式 f(x) = ckxk+ck_1xk-1 + --- + c1x + a的次数, ck,ck— ^…^为常数, a为所述 发送端的私钥, l≤x≤n, n为所述至少两个代理服务器的个数; 利 用 和 所 述 重 加 密 的 加 密 密 文 计 算
V
l(zlbf(1)) =z - , 其中 Z为双线性映射 e(g,g)的值, g为循 lb Y
环群的生成元; z - 为所述预处理密文的具体形式。
6、 一种网络设备, 其特征在于, 包括:
代理密钥生成模块,用于根据所述网络设备的私钥和接收端的 公钥生成分别对应于至少两个代理服务器的代理密钥,所述代理密 钥的个数等于所述代理服务器的个数;
发送模块,用于将加密密文和所述分别对应于至少两个代理服 务器的代理密钥分别发送给所述至少两个代理服务器,以使所述至 少两个代理良务器分别根据对应的代理密钥重加密所述加密密文。
7、 根据权利要求 6所述的网络设备, 其特征在于, 所述代理 密钥生成模块具体用于:
生 成随机多 项 式 f(x) = ckxk+cklX k- — c^x + a , 其 中 k,Ck,ck— ^…^为常数, a为发送端的私钥, 1 < χ< η , n为所述至少两 个代理服务器的个数, 所述随机多项式的次数 k小于所述至少两个 代理服务器的个数;
根据所述随机多项式和所述接收端的公钥生成分别所述对应 于至少两个代理服务器的代理密钥。
8、 根据权利要求 6所述的网络设备, 其特征在于, 所述代理 密钥生成模块具体用于:
根据 X = i的取值计算得到的所述随机多项式的对应的值 f (i) , 计算得到所述代理密钥为 gfWb , 其中, gb为所述接收端的公钥, l≤i≤n, n为所述至少两个代理服务器的个数。
9、 一种网络装置, 其特征在于, 包括:
获取模块,用于获取来自至少两个代理服务器的重加密的加密 密文;
解密预处理模块,用于对所述来自至少两个代理服务器的重加 密的加密密文进行解密预处理, 生成预处理密文;
解密模块, 用于解密所述预处理密文。
10、根据权利要求 9所述的网络装置, 其特征在于, 所述解密 预处理模块具体用于
计算! ^(0)= Π ^-,l<i<k + l, 其中 k为用于生成对应于至少
l≤m≤k+l 1— m
i≠m
两 个 代 理 服 务 器 的 代 理 密 钥 的 随 机 多 项 式 f(x) = ckxk+cklX k- 1 +〜 + c1x + a的次数, ck,ck— ^-^为常数, a为所述 发送端的私钥, l≤x≤n, n为所述至少两个代理服务器的个数; 利 用 和 所 述 重 加 密 的 加 密 密 文 计 算 f k+l Wu) 〖b > f (i)L;(0)
[(Zlb f(I)) =Z - , 其中 Z为双线性映射 e(g,g)的值, g为循 i=l
lb Y f (i)L(O) ,
环群的生成元; z - 为所述预处理密文的具体形式。
11、 一种基于代理的网络系统, 其特征在于, 包括: 至少一个 如权利要求 6-8任一项所述的网络设备,至少一个如权利要求 9-10 任一项所述的网络装置, 以及至少两个代理服务器,所述至少两个 代理服务器用于分别根据对应的代理密钥重加密所述加密密文。
PCT/CN2012/075849 2011-12-20 2012-05-22 基于代理的加密、解密方法,网络设备、网络装置及系统 WO2013091348A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP12766371.4A EP2629448B1 (en) 2011-12-20 2012-05-22 Encryption and decryption method based on proxy, network apparatus, network device, and system
US13/687,968 US8873754B2 (en) 2011-12-20 2012-11-28 Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201110430299.0 2011-12-20
CN201110430299.0A CN102546600B (zh) 2011-12-20 2011-12-20 基于代理的加密、解密方法,网络设备、网络装置及系统

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/687,968 Continuation US8873754B2 (en) 2011-12-20 2012-11-28 Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system

Publications (1)

Publication Number Publication Date
WO2013091348A1 true WO2013091348A1 (zh) 2013-06-27

Family

ID=46352562

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/075849 WO2013091348A1 (zh) 2011-12-20 2012-05-22 基于代理的加密、解密方法,网络设备、网络装置及系统

Country Status (3)

Country Link
EP (1) EP2629448B1 (zh)
CN (1) CN102546600B (zh)
WO (1) WO2013091348A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614670A (zh) * 2020-05-20 2020-09-01 浙江大华技术股份有限公司 加密文件的发送方法及装置、存储介质
CN113872969A (zh) * 2021-09-28 2021-12-31 安徽大学 基于代理重加密机制的自动驾驶车车内消息重加密方法

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104871477B (zh) * 2013-01-16 2018-07-10 三菱电机株式会社 加密系统、重加密密钥生成装置、重加密装置、加密方法
CN103442059B (zh) 2013-08-27 2017-02-01 华为终端有限公司 一种文件共享方法及装置
JP6053966B2 (ja) * 2014-01-14 2016-12-27 三菱電機株式会社 暗号システム及び再暗号化装置
CN105187303B (zh) * 2015-10-27 2018-06-29 湖北工业大学 一种抗逆向工程的电子邮件安全转发系统及方法
US10581812B2 (en) * 2015-12-01 2020-03-03 Duality Technologies, Inc. Device, system and method for fast and secure proxy re-encryption
CN106059768B (zh) * 2016-05-30 2019-06-21 西安电子科技大学 抵抗重加密密钥泄露的属性可撤销加密系统及方法
CN106302422B (zh) * 2016-08-08 2019-08-16 腾讯科技(深圳)有限公司 业务加密、解密方法和装置
CN106055993A (zh) * 2016-08-13 2016-10-26 深圳市樊溪电子有限公司 一种用于区块链的加密存储系统及其使用方法
CN106612175A (zh) * 2016-08-25 2017-05-03 四川用联信息技术有限公司 移动云中多要素访问控制的代理重加密算法
CN106790259A (zh) * 2017-01-25 2017-05-31 国家电网公司 一种非对称跨密码系统重加密、解密方法及系统
CN109802947A (zh) * 2018-12-27 2019-05-24 石更箭数据科技(上海)有限公司 数据处理方法、设备及交易系统
CN109802948A (zh) * 2018-12-27 2019-05-24 石更箭数据科技(上海)有限公司 数据处理设备及交易系统
CN109889494B (zh) * 2019-01-07 2020-07-07 南京航空航天大学 一种可撤销的云数据安全共享方法
CN111586000B (zh) * 2020-04-28 2020-12-18 北京物资学院 一种全代理同态重加密传输系统及其运行机制

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020083551A (ko) * 2001-04-27 2002-11-04 김성열 멀티에이전트 기반 다단계 사용자 인증 시스템 개발과운용 방법
CN101141244A (zh) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 网络加密数据病毒检测和消除系统和代理服务器及方法
CN101883100A (zh) * 2010-06-11 2010-11-10 北京大学 一种数字内容分布式授权方法
WO2011012642A2 (en) * 2009-07-31 2011-02-03 International Business Machines Corporation Collaborative agent encryption and decryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20020083551A (ko) * 2001-04-27 2002-11-04 김성열 멀티에이전트 기반 다단계 사용자 인증 시스템 개발과운용 방법
CN101141244A (zh) * 2006-09-08 2008-03-12 飞塔信息科技(北京)有限公司 网络加密数据病毒检测和消除系统和代理服务器及方法
WO2011012642A2 (en) * 2009-07-31 2011-02-03 International Business Machines Corporation Collaborative agent encryption and decryption
CN101883100A (zh) * 2010-06-11 2010-11-10 北京大学 一种数字内容分布式授权方法

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
LOU SHENGMING ET AL.: "Identity-based proxy re-encryption with threshold multi-proxy", JOURNAL OF NATURAL SCIENCE OF HEILONGJIANG UNIVERSITY, vol. 27, April 2010 (2010-04-01), pages 151 - 155 *
See also references of EP2629448A4 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614670A (zh) * 2020-05-20 2020-09-01 浙江大华技术股份有限公司 加密文件的发送方法及装置、存储介质
CN113872969A (zh) * 2021-09-28 2021-12-31 安徽大学 基于代理重加密机制的自动驾驶车车内消息重加密方法
CN113872969B (zh) * 2021-09-28 2024-01-19 安徽大学 基于代理重加密机制的自动驾驶车车内消息重加密方法

Also Published As

Publication number Publication date
EP2629448A1 (en) 2013-08-21
EP2629448B1 (en) 2017-03-01
CN102546600B (zh) 2014-12-03
CN102546600A (zh) 2012-07-04
EP2629448A4 (en) 2013-12-04

Similar Documents

Publication Publication Date Title
WO2013091348A1 (zh) 基于代理的加密、解密方法,网络设备、网络装置及系统
US10785019B2 (en) Data transmission method and apparatus
US8873754B2 (en) Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system
US11233659B2 (en) Method of RSA signature or decryption protected using a homomorphic encryption
JP5349619B2 (ja) アイデンティティベースの認証鍵共有プロトコル
CN104270249B (zh) 一种从无证书环境到基于身份环境的签密方法
US7634085B1 (en) Identity-based-encryption system with partial attribute matching
CN104301108B (zh) 一种从基于身份环境到无证书环境的签密方法
US20110194698A1 (en) Key Sharing System
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
US20130179679A1 (en) Methods And Apparatuses For Secure Information Sharing In Social Networks Using Randomly-Generated Keys
CN107086911B (zh) 一种cca安全的可委托验证的代理重加密方法
CN110138739B (zh) 数据信息加密方法、装置、计算机设备及存储介质
CN111953479B (zh) 数据处理的方法及装置
CN109951274B (zh) 基于私钥池的抗量子计算点对点消息传输方法和系统
CN112865955B (zh) 多接收者代理重加密方法、系统、电子装置及存储介质
CN112383397A (zh) 一种基于生物特征的异构签密通信方法
CN114443718A (zh) 一种数据查询方法及系统
CN110557367B (zh) 基于证书密码学的抗量子计算保密通信的密钥更新方法和系统
CN105530089B (zh) 属性基加密方法和装置
CN111953487B (zh) 一种密钥管理系统
CN113468582A (zh) 一种抗量子计算加密通信方法
US9473471B2 (en) Method, apparatus and system for performing proxy transformation
CN113365264A (zh) 一种区块链无线网络数据传输方法、装置及系统
KR101793528B1 (ko) 무인증서 공개키 암호 시스템

Legal Events

Date Code Title Description
REEP Request for entry into the european phase

Ref document number: 2012766371

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2012766371

Country of ref document: EP

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12766371

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE