CN104168113A - Certificate-based encryption method and system for n layers of CA structures - Google Patents

Certificate-based encryption method and system for n layers of CA structures Download PDF

Info

Publication number
CN104168113A
CN104168113A CN201410387721.2A CN201410387721A CN104168113A CN 104168113 A CN104168113 A CN 104168113A CN 201410387721 A CN201410387721 A CN 201410387721A CN 104168113 A CN104168113 A CN 104168113A
Authority
CN
China
Prior art keywords
certificate
layer
pki
user
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410387721.2A
Other languages
Chinese (zh)
Inventor
陆阳
张全领
李继国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hohai University HHU
Original Assignee
Hohai University HHU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hohai University HHU filed Critical Hohai University HHU
Priority to CN201410387721.2A priority Critical patent/CN104168113A/en
Publication of CN104168113A publication Critical patent/CN104168113A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a certificate-based encryption method and system for n layers of CA structures. A layered thought is introduced into a certificate-based cryptosystem. The method comprises the steps of generating system parameters, generating a public key and a main key of the low-layer CA, generating a public key and a private key of a user, generating a certificate of the low-layer CA and a certificate of the user, encrypting messages and recovering the messages. The invention further provides the certificate-based encryption system for the layered CA structures. The system comprises a system parameter generation module, a low-layer CA parameter generation module, a user key generation module, a certificate generation module, an encryption module and a decryption module. According to the technical scheme, the tasks of certification of the system user, certificate issuance, certificate evocation and the like are completed by means of a layered CA tree, so that the burden of calculation and communication of each CA is reduced, and the efficiency and the ability to resist and deny service attacks of the system are improved.

Description

A kind of method and system of encrypting based on certificate of n layer CA structure
Technical field
The present invention relates to the data encryption technology field in information security, particularly a kind of method and system of encrypting based on certificate of n layer CA structure.
Background technology
Adopting in the Modern Communication System of cryptographic technique protection, cryptographic algorithm is normally disclosed, and the protection to key is depended in its fail safe, and therefore key management seems and is even more important.In public-key cryptosystem, user's PKI can openly be propagated, and this has brought profound influence to the secure communication on open network, encryption key distribution, digital signature and certification.Therefore,, since being proposed by Diffie and Hellman from 1976, public-key cryptosystem is just widely used.PKIX PKI is the Main Means of current deployment common key cryptosystem, is also basis and the core of current computer Network Security Construction, and it provides reliable Security Assurance Mechanism for informatizations such as ecommerce, E-Government and Mobile businesses.But traditional PKI technology exists such as being difficult to solve the realistic problems such as third party's inquiry, certificate management complexity.
That Gentry can go up a kind of new model who supports public key cryptography application who proposes the European cryptography of 2003 based on cryptographic certificate system.This system between conventional public-key cryptographic system with based on identification cipher system between, some intrinsic shortcoming and defect in these two kinds of public-key cryptosystems are effectively overcome, what can greatly reduce public key certificate in conventional P KI system administers and maintains required calculating, communication and storage cost, for building safety, PKI system provides effective method efficiently.Similar with conventional public-key cryptographic system, also adopt digital certificate to come the identity of user bound and the corresponding relation of its PKI based on cryptographic certificate system.But provide a kind of efficient hidden certificate mechanism based on cryptographic certificate system, user certificate only sends to holder of certificate, and combine with its private key generation final decruption key or signature key.Compared with the prior art, the third party that advantage based on cryptographic certificate system has been not only to eliminate certificate status in conventional P KI system inquires about problem and has simplified complicated certificate management process, and has overcome key distribution and key escrow based on intrinsic in identification cipher system.
But, existing based on cryptographic certificate method in, only by single certificate authorization center CA complete certification to system user, certificate generation, distribute and the task such as cancel, therefore there are following some shortcomings:
(1) be difficult to meet the demand that large scale network is applied.Because existing method has adopted centralized working method, only have single CA complete certification to user, certificate generation, distribute and the task such as cancel, therefore the calculating of CA and communication cost are larger.Especially, in the time that the quantity of system user is very large, the operating efficiency of single CA is lower, easily becomes the bottleneck of whole system.
(2) ability of opposing Denial of Service attack is low.Under open network environment, CA inevitably can suffer the attack of malice, once therefore unique CA suffers Denial of Service attack and cannot normally work, whole system is by paralyzed state and cannot continuous firing.
Summary of the invention
Technical problem to be solved by this invention is for the existing deficiency based on existing in certificate encryption method, and the thought of layering is incorporated into based in cryptographic certificate system, and a kind of encryption method and system of the certificate based on n layer CA structure is provided.
The present invention is for solving the problems of the technologies described above by the following technical solutions:
A method of encrypting based on certificate for n layer CA structure, described n is more than or equal to 2 integer, comprises following steps:
Steps A), root CA generates its master key and the open parameter set of system according to security parameter;
Step B), for the every one deck CA beyond root CA, according to its identity information and the open parameter set of described system, generate its master key and PKI;
Step C), user according to the open parameter set of described system with and identity information, generate its private key and PKI;
Step D), root CA, according to identity information and the PKI of its master key, the open parameter set of system and the 1st layer of CA, generates the certificate of the 1st layer of CA;
From the 1st layer of CA to n-2 layer CA, every one deck CA, successively according to identity information and the PKI of its master key and certificate, the open parameter set of system and lower one deck CA, generates the certificate of lower one deck CA;
N-1 layer CA, according to its master key and certificate, the open parameter set of system and user's identity information and PKI, generates user's certificate;
Step e), sender is according to the open parameter set of described system, plaintext to be encrypted, recipient's the identity information of all upper strata CA and PKI and recipient's identity information and PKI, generating ciphertext;
Step F), recipient, according to the open parameter set of described system, ciphertext to be deciphered and recipient's private key and certificate, recovers expressly.
As a kind of n layer of the present invention CA structure based on certificate encrypt the further prioritization scheme of method, described steps A) detailed process as follows:
Steps A .1), root CA is according to the security parameter k ∈ Z setting +, select the large prime number q of a k bit, and generate a q rank addition cyclic group G 1, a q factorial method cyclic group G 2and be defined in crowd G 1with group G 2on bilinearity to e:G 1× G 1→ G 2;
Wherein, Z +be Positive Integer Set, bilinearity is to e:G 1× G 1→ G 2crowd G 1with the cartesian product G of self 1× G 1to group G 2mapping;
Steps A .2), from addition cyclic group G 1generator P of middle selection is also gathering in random select an integer s 0, calculate P pub=s 0p;
Wherein, set Z q * = { 1,2 , . . . , q - 1 } ;
Steps A .3), define four hash function H 1: { 0,1} *× G 1→ G 1, H 2: G 2→ { 0,1} l, h 4: { 0,1} l→ { 0,1} l;
Wherein, H 1cartesian product { 0,1} *× G 1to G 1cryptographic Hash function, H 2g 2to { 0,1} ncryptographic Hash function, H 3{ 0,1} *arrive cryptographic Hash function, H 4cartesian product { 0,1} lto { 0,1} lcryptographic Hash function, nonnegative integer l represents bit length expressly, { 0,1} *represent the set of the uncertain binary string of length, { 0,1} lrepresent that length is the set of the binary string of l bit, { 0,1} *× G 1represent { 0,1} *with group G 1cartesian product;
Steps A .4), the master key msk of generation root CA root=s 0with the open parameter set params={G of system 1, G 2, e, q, l, P, P pub, H 1, H 2, H 3, H 4.
As a kind of n layer of the present invention CA structure based on certificate encrypt the further prioritization scheme of method, described step B) detailed process as follows:
The identity of i layer is ID ilow layer CA, first set in random select an integer s ias the master key of oneself, then calculate and obtain the PKI of oneself wherein, i is the CA layer digging up the roots outside CA, 1≤i < n.
As a kind of n layer of the present invention CA structure based on certificate encrypt the further prioritization scheme of method, described step C) detailed process as follows:
The identity of n layer is ID nuser first set in the random private key of an integer x as oneself of selecting, sk ID n = x ; Then calculate and obtain the PKI of oneself pk ID n = xP .
As a kind of n layer of the present invention CA structure based on certificate encrypt the further prioritization scheme of method, described step D) detailed process as follows:
Root CA is according to its master key msk root, Parameter H in the open parameter set of system 1, and the identity information ID of the 1st layer of CA 1and PKI generate the certificate of the 1st layer of CA cert ID 1 = msk root H 1 ( ID 1 , pk ID 1 ) ;
In the time of 1≤a≤n-2, a layer CA is according to its master key and certificate parameter H in the open parameter set of system 1, and the identity information ID of lower one deck CA a+1and PKI generate the certificate of lower one deck CA cert ID a + 1 = msk ID a H 1 ( ID a + 1 , pk ID a + 1 ) + cert ID a ;
N-1 layer CA is according to its master key and certificate parameter H in the open parameter set of system 1, and user's identity information ID nand PKI generate user's certificate cert ID n = msk ID n - 1 H 1 ( ID n , pk ID n ) + cert ID n - 1 .
As a kind of n layer of the present invention CA structure based on certificate encrypt the further prioritization scheme of method, described step e) detailed process as follows:
Step e .1), sender determines to be ID to the identity of n layer n, PKI is user send plaintext M;
Step e .2), at set { 0,1} lin random select the Bit String δ that a length is l and calculate r=H 3(δ, M, ID n, pk n);
Step e .3), calculate respectively U=rP, V = &delta; &CirclePlus; H 2 ( ( e ( Q n , pk ID n ) &CenterDot; &Pi; i = 1 n - 1 e ( H 1 ( ID i , pk ID i ) , pk ID i - 1 ) ) r ) With W = M &CirclePlus; H 4 ( &delta; ) , Wherein, ID iwith represent respectively identity and the PKI of recipient's the upper strata CA that is positioned at i layer,
Step e .4), by C=< U, V, W > sends to recipient as the ciphertext of plaintext M.
As a kind of n layer of the present invention CA structure based on certificate encrypt the further prioritization scheme of method, described step F) detailed process as follows:
Step F .1), n layer identity is ID n, private key is and certificate is recipient receive ciphertext C=< U, V, W >;
Step F .2), calculate &delta; &prime; = V &CirclePlus; H 2 ( e ( sk ID n H 1 ( ID n , pk ID n ) + cert ID n , U ) ) , And then calculate and obtain expressly M &prime; = W &CirclePlus; H 4 ( &delta; &prime; ) ;
Step F .3) calculate and judge whether U=r ' P sets up: if set up, plaintext M ' effectively; Otherwise ciphertext is invalid, Decryption failures.
The system of encrypting based on certificate that the invention also discloses a kind of n layer CA structure, comprising:
System parameters generation module, for generating master key and the open parameter set of system of root CA according to the security parameter of input;
Low layer ca parameter generation module, for generating master key and the PKI of low layer CA;
User key generation module, for according to the open parameter set of the system of system parameters generation module generation and user's identity information, generates user's private key and PKI;
Certificates constructing module, for generating the low layer CA that digs up the roots beyond CA and user's certificate;
Encrypting module, be used for the PKI of the low layer CA generating according to the open parameter set of system parameters generation module generation, low layer ca parameter generation module, plaintext, recipient's identity information and the recipient's that user key generation module generates PKI to be encrypted, generate the original ciphertext of plaintext;
Deciphering module, reverts to the ciphertext receiving expressly for the open parameter set generating according to system parameters generation module, the ciphertext that encrypting module generates, recipient's private key and the recipient's that certificates constructing module generates the certificate that user key generation module generates.
The further prioritization scheme of system of encrypting based on certificate as n layer CA structure, described deciphering module specifically comprises decrypt ciphertext unit and ciphertext validation verification unit; Wherein:
Described decrypt ciphertext unit is decrypted ciphertext for deciphering person, recovers expressly;
Described ciphertext validation verification unit is verified the validity of ciphertext for deciphering person, and then is judged that whether the plaintext of decrypt ciphertext unit output is effective.
The present invention adopts above technical scheme compared with prior art, has following technique effect:
The inventive method with encryption combines based on certificate, has adopted the CA architecture of stratification by the thought of layering.In the CA tree of stratification, low layer CA from it layer CA place obtains own certificate, uses the master key of generation voluntarily to sign and issue the certificate of the CA of its lower floor simultaneously or complete it to administer that user in user domain authenticates, signing and issuing and cancelling of the task of certificate.The inventive method has not only been inherited the advantage based on identification cipher system based on cryptographic certificate system and stratification, and effectively overcome the existing problem based on existing in certificate encryption method, be a kind of novel encryption method that is very suitable for extensive use in open network environment.Main cause is as follows:
1. system user is divided into multiple user domain, in each user domain, signing and issuing and cancelling of the task of user's certification, certificate is completed by the terminal CA towards this user domain, therefore effectively alleviate calculating and the communications burden of terminal CA, and improved the operating efficiency of system;
2. each terminal CA is only responsible for the certification of the user in its place user domain, the tasks such as signing and issuing and cancel of certificate, and therefore certain terminal CA is because of fault or cannot normally work by Denial of Service attack can not to affect the operation of other terminal CA;
3. the CA architecture of stratification is convenient to CA and is added dynamically, is conducive to the system expansion in future.
Brief description of the drawings
Fig. 1 is the flow chart based on certificate encryption method of stratification CA structure of the present invention;
Fig. 2 is the operational flowchart of carrying out according to the cryptographic system of the inventive method;
Fig. 3 is the schematic diagram based on certificate encryption system of stratification CA structure of the present invention.
Embodiment
Below in conjunction with accompanying drawing, technical scheme of the present invention is described in further detail:
Stratification CA structure of the present invention can be based on bilinearity to realizing based on certificate encryption method, first briefly introduce basic definition that bilinearity is right and its satisfied character below.
If G 1the addition cyclic group that rank are q, G 2be a multiplication loop group that rank are q, and P is crowd G 1generator, wherein q is a large prime number.Suppose G 1and G 2discrete logarithm problem on these two groups is all difficult problem.If be defined in crowd G 1with group G 2a upper mapping e:G 1× G 1→ G 2meet three character below, claim this to be mapped as effective bilinearity pair.Bilinearity is to e:G 1× G 1→ G 2crowd G 1with the cartesian product G of self 1× G 1to group G 2mapping, bilinearity is to e:G 1× G 1→ G 2refer to function z=e (P 1, P 2), wherein P 1, P 2∈ G 1for independent variable, z ∈ G 2for dependent variable.
Corresponding three character that meet of bilinearity are:
(1) bilinearity: for P arbitrarily 1, P 2∈ G 1with there is e (aP 1, bP 2)=e (P 1, P 2) ab.
(2) non-degeneracy: wherein crowd G 2identical element.
(3) computability: for P arbitrarily 1, P 2∈ G 1, exist effective algorithm to calculate e (P 1, P 2).
Wherein, large prime number q is not less than 160 bits of binary representation for discrete logarithm problem, and for large Integer Decomposition problem, is not less than 1024 bits of binary representation.The concept of cyclic group is: establish G for group, if exist an element P ∈ G to make G={kP|k ∈ Z}, claim that G is addition cyclic group, claim that P is the generator of crowd G; If exist an element g ∈ G to make G={g k| k ∈ Z}, claim that G is multiplication loop group, claim that g is the generator of crowd G.If G is that the rank of addition (multiplication) cyclic group and generator P (g) are n, n makes the idempotent of generator P (g) in the minimum positive integer of the identical element of group G, claims that G is n rank additions (multiplication) cyclic groups.In simple terms, addition cyclic group refers to that the generator of this cyclic group can be with all elements in add operation generated group, and multiplication loop group refers to that the generator of this cyclic group can be with all elements in the method generated group of power.In addition, wherein Z qrefer to the residue class of integer mould prime number q, i.e. Z q=1,2 ..., q-1}.
The description right according to above bilinearity, below in conjunction with being further described based on certificate encryption method of accompanying drawing and the routine a kind of stratification CA structure that the present invention is proposed of realization, but not as a limitation of the invention.
The entity of the method for the invention design is as follows:
(1) root CA: be responsible for the master key of the open parameter set of generation system and root CA, the CA of its subordinate is verified to the also trusted third party of grant a certificate;
(2) low layer CA: non-CA, responsible master key and the PKI that generates low layer CA, verifies the also trusted third party of grant a certificate to the user in the CA of its lower floor or its compass of competency;
(3) sender: the original sending entity of message;
(4) recipient: the receiving entity of ciphertext.
Reference picture 1 and accompanying drawing 2, the step of the method for the invention specifically describes as follows:
Steps A), root CA generates its master key and the open parameter set of system according to security parameter;
Concrete steps are as follows:
Step 101), root CA is according to the security parameter k ∈ Z setting +, select the large prime number q of a k bit, and generate a q rank addition cyclic group G 1, a q factorial method cyclic group G 2and be defined in crowd G 1with group G 2on bilinearity to e:G 1× G 1→ G 2; Wherein, Z +be Positive Integer Set, bilinearity is to e:G 1× G 1→ G 2crowd G 1with the cartesian product G of self 1× G 1to group G 2mapping;
Step 102), from addition cyclic group G 1generator P of middle selection is also gathering in random select an integer s 0, calculate P pub=s 0p, wherein: set
Step 103), define four hash function H 1: { 0,1} *× G 1→ G 1, H 2: G 2→ { 0,1} l, h 4: { 0,1} l→ { 0,1} l; Wherein, H 1cartesian product { 0,1} *× G 1to G 1cryptographic Hash function, H 2g 2to { 0,1} ncryptographic Hash function, H 3{ 0,1} *arrive cryptographic Hash function, H 4cartesian product { 0,1} lto { 0,1} lcryptographic Hash function, nonnegative integer l represents bit length expressly, { 0,1} *represent the set of the uncertain binary string of length, { 0,1} lrepresent that length is the set of the binary string of l bit, { 0,1} *× G 1represent { 0,1} *with group G 1cartesian product;
Step 104), the master key msk of generation root CA root=s 0with the open parameter set params={G of system 1, G 2, e, q, l, P, P pub, H 1, H 2, H 3, H 4.
Step B), for the every one deck CA beyond root CA, according to its identity information and the open parameter set of described system, generate its master key and PKI;
Concrete steps are as follows:
Step 105), the identity of i layer is ID ilow layer CA, first set in random select an integer s ias the master key of oneself, msk ID i = s i ;
Step 106), calculate and obtain oneself PKI
Step C), user according to the open parameter set of described system with and identity information, generate its private key and PKI;
Concrete steps are as follows:
Step 107), the identity of n layer is ID nuser first set in the random private key of an integer x as oneself of selecting, sk ID n = x .
Step 108), calculate and obtain oneself PKI
Step D), root CA, according to identity information and the PKI of its master key, the open parameter set of system and the 1st layer of CA, generates the certificate of the 1st layer of CA;
From the 1st layer of CA to n-2 layer CA, every one deck CA, successively according to identity information and the PKI of its master key and certificate, the open parameter set of system and lower one deck CA, generates the certificate of lower one deck CA;
N-1 layer CA, according to its master key and certificate, the open parameter set of system and user's identity information and PKI, generates user's certificate;
Concrete steps are as follows:
Step 109), root CA is according to its master key msk root, Parameter H in the open parameter set of system 1, and the identity information ID of the 1st layer of CA 1and PKI generate the certificate of the 1st layer of CA cert ID 1 = msk root H 1 ( ID 1 , pk ID 1 ) ;
Step 110), a (1≤a≤n-2) layer CA is according to its master key and certificate parameter H in the open parameter set of system 1, and the identity information ID of lower one deck CA a+1and PKI generate the certificate of lower one deck CA cert ID a + 1 = msk ID a H 1 ( ID a + 1 , pk ID a + 1 ) + cert ID a ;
Step 111), n-1 layer CA is according to its master key and certificate parameter H in the open parameter set of system 1, and user's identity information ID nand PKI generate user's certificate cert ID n = msk ID n - 1 H 1 ( ID n , pk ID n ) + cert ID n - 1 .
Step e), sender is according to the open parameter set of described system, plaintext to be encrypted, recipient's the identity information of all upper strata CA and PKI and recipient's identity information and PKI, generating ciphertext;
Concrete steps are as follows:
Step 112), sender determines to be ID to the identity of n layer n, PKI is user send plaintext M;
Step 113), at set { 0,1} lin random select the Bit String δ that a length is l and calculate r=H 3(δ, M, ID n, pk n);
Step 114), calculate respectively U=rP, V = &delta; &CirclePlus; H 2 ( ( e ( Q n , pk ID n ) &CenterDot; &Pi; i = 1 n - 1 e ( H 1 ( ID i , pk ID i ) , pk ID i - 1 ) ) r ) With W = M &CirclePlus; H 4 ( &delta; ) , Wherein, ID iwith represent respectively identity and the PKI of recipient's the upper strata CA that is positioned at i layer,
Step 115), by C=< U, V, W > sends to recipient as the ciphertext of plaintext M.
Step F), recipient, according to the open parameter set of described system, ciphertext to be deciphered and recipient's private key and certificate, recovers expressly;
Concrete steps are as follows:
Step 116), n layer identity is ID n, private key is and certificate is recipient receive ciphertext C=< U, V, W >;
Step 117), calculate &delta; &prime; = V &CirclePlus; H 2 ( e ( sk ID n H 1 ( ID n , pk ID n ) + cert ID n , U ) ) , And then calculate and obtain expressly M &prime; = W &CirclePlus; H 4 ( &delta; &prime; ) ;
Step 118) calculate and judge whether U=r ' P sets up: if set up, plaintext M ' effectively; Otherwise ciphertext is invalid, Decryption failures.
Referring to accompanying drawing 3, the present invention also provide a kind of stratification CA structure based on certificate encryption system, described system comprises: system parameters generation module, low layer ca parameter generation module, user key generation module, certificates constructing module, encrypting module, deciphering module;
Described system parameters generation module is for generating master key and the open parameter set of system of root CA according to the security parameter of input.
Described low layer ca parameter generation module is for generating master key and the PKI of low layer CA.
Described user key generation module, for according to the open parameter set of the system of system parameters generation module generation and user's identity information, generates user's PKI and private key.
Described certificates constructing module is for generating the low layer CA that digs up the roots beyond CA and user's certificate.
Described encrypting module is used for the PKI of the low layer CA generating according to the open parameter set of system parameters generation module generation, low layer ca parameter generation module, plaintext, recipient's identity information and the recipient's that user key generation module generates PKI to be encrypted, generates the original ciphertext of plaintext.
Described deciphering module reverts to the ciphertext receiving expressly for the open parameter set generating according to system parameters generation module, the ciphertext that encrypting module generates, recipient's private key and the recipient's that certificates constructing module generates the certificate that user key generation module generates.
Described deciphering module specifically comprises decrypt ciphertext unit and ciphertext validation verification unit.
Described decrypt ciphertext unit is decrypted ciphertext for deciphering person, recovers expressly.
Described ciphertext validation verification unit is verified the validity of ciphertext for deciphering person, and then is judged that whether the plaintext of decrypt ciphertext unit output is effective.
More than just the preferred embodiment of the present invention is described.Concerning those skilled in the art, can associate easily other advantage and distortion according to above execution mode.Therefore, the present invention is not limited to above-mentioned execution mode, and it carries out detailed, exemplary explanation as just example to a kind of form of the present invention.Not deviating from the scope of aim of the present invention, common variation and replacement that those of ordinary skill in the art carry out within the scope of the scheme of the technology of the present invention, within all should being included in protection scope of the present invention.

Claims (9)

1. a method of encrypting based on certificate for n layer CA structure, described n is more than or equal to 2 integer, it is characterized in that, comprises following steps:
Steps A), root CA generates its master key and the open parameter set of system according to security parameter;
Step B), for the every one deck CA beyond root CA, according to its identity information and the open parameter set of described system, generate its master key and PKI;
Step C), user according to the open parameter set of described system with and identity information, generate its private key and PKI;
Step D), root CA, according to identity information and the PKI of its master key, the open parameter set of system and the 1st layer of CA, generates the certificate of the 1st layer of CA;
From the 1st layer of CA to n-2 layer CA, every one deck CA, successively according to identity information and the PKI of its master key and certificate, the open parameter set of system and lower one deck CA, generates the certificate of lower one deck CA;
N-1 layer CA, according to its master key and certificate, the open parameter set of system and user's identity information and PKI, generates user's certificate;
Step e), sender is according to the open parameter set of described system, plaintext to be encrypted, recipient's the identity information of all upper strata CA and PKI and recipient's identity information and PKI, generating ciphertext;
Step F), recipient, according to the open parameter set of described system, ciphertext to be deciphered and recipient's private key and certificate, recovers expressly.
N layer CA structure according to claim 1 based on certificate encrypt method, it is characterized in that described steps A) detailed process as follows:
Steps A .1), root CA is according to the security parameter k ∈ Z setting +, select the large prime number q of a k bit, and generate a q rank addition cyclic group G 1, a q factorial method cyclic group G 2and be defined in crowd G 1with group G 2on bilinearity to e:G 1× G 1→ G 2;
Wherein, Z +be Positive Integer Set, bilinearity is to e:G 1× G 1→ G 2crowd G 1with the cartesian product G of self 1× G 1to group G 2mapping;
Steps A .2), from addition cyclic group G 1generator P of middle selection is also gathering in random select an integer s 0, calculate P pub=s 0p;
Wherein, set Z q * = { 1,2 , . . . , q - 1 } ;
Steps A .3), define four hash function H 1: { 0,1} *× G 1→ G 1, H 2: G 2→ { 0,1} l, h 4: { 0,1} l→ { 0,1} l;
Wherein, H 1cartesian product { 0,1} *× G 1to G 1cryptographic Hash function, H 2g 2to { 0,1} ncryptographic Hash function, H 3{ 0,1} *arrive cryptographic Hash function, H 4cartesian product { 0,1} lto { 0,1} lcryptographic Hash function, nonnegative integer l represents bit length expressly, { 0,1} *represent the set of the uncertain binary string of length, { 0,1} lrepresent that length is the set of the binary string of l bit, { 0,1} *× G 1represent { 0,1} *with group G 1cartesian product;
Steps A .4), the master key msk of generation root CA root=s 0with the open parameter set params={G of system 1, G 2, e, q, l, P, P pub, H 1, H 2, H 3, H 4.
N layer CA structure according to claim 2 based on certificate encrypt method, it is characterized in that described step B) detailed process as follows:
The identity of i layer is ID ilow layer CA, first set in random select an integer s ias the master key of oneself, then calculate and obtain the PKI of oneself wherein, i is the CA layer digging up the roots outside CA, 1≤i < n.
N layer CA structure according to claim 3 based on certificate encrypt method, it is characterized in that described step C) detailed process as follows:
The identity of n layer is ID nuser first set in the random private key of an integer x as oneself of selecting, then calculate and obtain the PKI of oneself
N layer CA structure according to claim 4 based on certificate encrypt method, it is characterized in that described step D) detailed process as follows:
Root CA is according to its master key msk root, Parameter H in the open parameter set of system 1, and the identity information ID of the 1st layer of CA 1and PKI generate the certificate of the 1st layer of CA cert ID 1 = msk root H 1 ( ID 1 , pk ID 1 ) ;
In the time of 1≤a≤n-2, a layer CA is according to its master key and certificate parameter H in the open parameter set of system 1, and the identity information ID of lower one deck CA a+1and PKI generate the certificate of lower one deck CA cert ID a + 1 = msk ID a H 1 ( ID a + 1 , pk ID a + 1 ) + cert ID a ;
N-1 layer CA is according to its master key and certificate parameter H in the open parameter set of system 1, and user's identity information ID nand PKI generate user's certificate cert ID n = msk ID n - 1 H 1 ( ID n , pk ID n ) + cert ID n - 1 .
N layer CA structure according to claim 5 based on certificate encrypt method, it is characterized in that described step e) detailed process as follows:
Step e .1), sender determines to be ID to the identity of n layer n, PKI is user send plaintext M;
Step e .2), at set { 0,1} lin random select the Bit String δ that a length is l and calculate r=H 3(δ, M, ID n, pk n);
Step e .3), calculate respectively U=rP, V = &delta; &CirclePlus; H 2 ( ( e ( Q n , pk ID n ) &CenterDot; &Pi; i = 1 n - 1 e ( H 1 ( ID i , pk ID i ) , pk ID i - 1 ) ) r ) With W = M &CirclePlus; H 4 ( &delta; ) , Wherein, ID iwith represent respectively identity and the PKI of recipient's the upper strata CA that is positioned at i layer,
Step e .4), by C=< U, V, W > sends to recipient as the ciphertext of plaintext M.
N layer CA structure according to claim 6 based on certificate encrypt method, it is characterized in that described step F) detailed process as follows:
Step F .1), n layer identity is ID n, private key is and certificate is recipient receive ciphertext C=< U, V, W >;
Step F .2), calculate &delta; &prime; = V &CirclePlus; H 2 ( e ( sk ID n H 1 ( ID n , pk ID n ) + cert ID n , U ) ) , And then calculate and obtain expressly M &prime; = W &CirclePlus; H 4 ( &delta; &prime; ) ;
Step F .3) calculate and judge whether U=r ' P sets up: if set up, plaintext M ' effectively; Otherwise ciphertext is invalid, Decryption failures.
8. a system of encrypting based on certificate for n layer CA structure, is characterized in that, comprising:
System parameters generation module, for generating master key and the open parameter set of system of root CA according to the security parameter of input;
Low layer ca parameter generation module, for generating master key and the PKI of low layer CA;
User key generation module, for according to the open parameter set of the system of system parameters generation module generation and user's identity information, generates user's private key and PKI;
Certificates constructing module, for generating the low layer CA that digs up the roots beyond CA and user's certificate;
Encrypting module, be used for the PKI of the low layer CA generating according to the open parameter set of system parameters generation module generation, low layer ca parameter generation module, plaintext, recipient's identity information and the recipient's that user key generation module generates PKI to be encrypted, generate the original ciphertext of plaintext;
Deciphering module, reverts to the ciphertext receiving expressly for the open parameter set generating according to system parameters generation module, the ciphertext that encrypting module generates, recipient's private key and the recipient's that certificates constructing module generates the certificate that user key generation module generates.
9. the system that n layer CA structure according to claim 8 is encrypted based on certificate, is characterized in that, described deciphering module specifically comprises decrypt ciphertext unit and ciphertext validation verification unit; Wherein:
Described decrypt ciphertext unit is decrypted ciphertext for deciphering person, recovers expressly;
Described ciphertext validation verification unit is verified the validity of ciphertext for deciphering person, and then is judged that whether the plaintext of decrypt ciphertext unit output is effective.
CN201410387721.2A 2014-08-07 2014-08-07 Certificate-based encryption method and system for n layers of CA structures Pending CN104168113A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410387721.2A CN104168113A (en) 2014-08-07 2014-08-07 Certificate-based encryption method and system for n layers of CA structures

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410387721.2A CN104168113A (en) 2014-08-07 2014-08-07 Certificate-based encryption method and system for n layers of CA structures

Publications (1)

Publication Number Publication Date
CN104168113A true CN104168113A (en) 2014-11-26

Family

ID=51911765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410387721.2A Pending CN104168113A (en) 2014-08-07 2014-08-07 Certificate-based encryption method and system for n layers of CA structures

Country Status (1)

Country Link
CN (1) CN104168113A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493002A (en) * 2018-06-25 2019-11-22 北京白山耘科技有限公司 A kind of method, apparatus and system that certificate is renewed
CN110602064A (en) * 2019-08-29 2019-12-20 河海大学 Identity-based encryption method and system supporting multi-keyword search

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533403A (en) * 2013-10-31 2014-01-22 中国科学院信息工程研究所 Equipment certificate activating method for smart cloud TV terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533403A (en) * 2013-10-31 2014-01-22 中国科学院信息工程研究所 Equipment certificate activating method for smart cloud TV terminal

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
王新文: "多级网络证书认证系统技术研究", 《中国优秀硕士学位论文全文数据库-信息科技辑》 *
陆阳: "标准模型下高效安全的基于证书密钥封装机制", 《计算机研究与发展》 *
黄胜: "网格中基于分层的身份加密系统研究", 《中国优秀硕士学位论文全文数据库-信息科技辑》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493002A (en) * 2018-06-25 2019-11-22 北京白山耘科技有限公司 A kind of method, apparatus and system that certificate is renewed
WO2020001417A1 (en) * 2018-06-25 2020-01-02 北京白山耘科技有限公司 Certificate renewal method, apparatus, system, medium, and device
CN110493002B (en) * 2018-06-25 2020-05-08 北京白山耘科技有限公司 Method, device and system for renewing certificate
CN111800270A (en) * 2018-06-25 2020-10-20 北京白山耘科技有限公司 Certificate signing method and device, storage medium and computer equipment
US11483165B2 (en) 2018-06-25 2022-10-25 Beijing Baishancloud Technology Co., Ltd. Certificate renewal method, apparatus, system, medium, and device
CN111800270B (en) * 2018-06-25 2023-05-23 北京白山耘科技有限公司 Certificate signing method and device, storage medium and computer equipment
CN110602064A (en) * 2019-08-29 2019-12-20 河海大学 Identity-based encryption method and system supporting multi-keyword search

Similar Documents

Publication Publication Date Title
CN108173639B (en) Two-party cooperative signature method based on SM9 signature algorithm
CN104270249B (en) It is a kind of from the label decryption method without certificate environment to identity-based environment
CN104301108B (en) It is a kind of from identity-based environment to the label decryption method without certificate environment
CN1859090B (en) Encipher method and system based identity
CN102523093B (en) Encapsulation method and encapsulation system for certificate-based key with label
EP2120389A1 (en) A method, system and communication device for generating session cryptographic
CN103647642A (en) Certificate-based agent heavy encryption method and system
CN105024994A (en) Secure certificateless hybrid signcryption method without pairing
CN104168114A (en) Distributed type (k, n) threshold certificate-based encrypting method and system
CN103746811B (en) Anonymous signcryption method from identity public key system to certificate public key system
CN110830236A (en) Identity-based encryption method based on global hash
CN101471776A (en) Method for preventing PKG forgery signature based on user identification
CN104868993A (en) Two-side authentication key negotiation method and system based on certificate
CN104767612A (en) Signcryption method from certificateless environment to public key infrastructure environment
KR20030008183A (en) Method of id-based ring signature by using bilinear parings
Mejri et al. A new group Diffie-Hellman key generation proposal for secure VANET communications
CN110113150A (en) The encryption method and system of deniable authentication based on no certificate environment
CN107086912B (en) Ciphertext conversion method, decryption method and system in heterogeneous storage system
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
CN104767611A (en) Signcryption method from public key infrastructure environment to certificateless environment
CN110012443A (en) A kind of the data encryption polymerization and its system of full homomorphism
CN107682158B (en) Trusteeship authentication encryption method
CN103269272B (en) A kind of key encapsulation method based on short-lived certificates
CN117879833A (en) Digital signature generation method based on improved elliptic curve
CN106453253B (en) A kind of hideing for efficient identity-based signs decryption method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141126

WD01 Invention patent application deemed withdrawn after publication