CN104301108B - It is a kind of from identity-based environment to the label decryption method without certificate environment - Google Patents
It is a kind of from identity-based environment to the label decryption method without certificate environment Download PDFInfo
- Publication number
- CN104301108B CN104301108B CN201410490400.5A CN201410490400A CN104301108B CN 104301108 B CN104301108 B CN 104301108B CN 201410490400 A CN201410490400 A CN 201410490400A CN 104301108 B CN104301108 B CN 104301108B
- Authority
- CN
- China
- Prior art keywords
- identity
- private key
- key
- receiving terminal
- environment
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 239000000203 mixture Substances 0.000 claims description 3
- 238000004891 communication Methods 0.000 abstract description 10
- 230000000875 corresponding Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000000034 method Methods 0.000 description 3
- 230000001131 transforming Effects 0.000 description 2
- 210000004369 Blood Anatomy 0.000 description 1
- 241000668709 Dipterocarpus costatus Species 0.000 description 1
- 206010068052 Mosaicism Diseases 0.000 description 1
- 210000003765 Sex Chromosomes Anatomy 0.000 description 1
- 101710023469 TPKC Proteins 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 239000008280 blood Substances 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006011 modification reaction Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Abstract
The invention discloses a kind of from identity-based environment to the label decryption method without certificate environment.Belong to secret communication field.In order that the transmitting terminal of identity-based environment can be using the receiving terminal that decryption method sends messages to no certificate environment be signed, method of the invention is included after initialization systematic parameter, and private key generation is centrally generated private key SAAnd it is sent to transmitting terminal;Key generation centre generating portion private key DBAnd it is sent to receiving terminal;Receiving terminal is based on systematic parameter one secret value of generation and part private key D at randomBComplete private key S is setBWith public key PKB;Transmitting terminal is according to systematic parameter, the identity of transmitting terminal and private key SA, receiving terminal identity and public key PKBAnd message m, generation label ciphertext, and the ciphertext and transmitting terminal identity are sent to the close processing of receiving terminal progress solution label.The present invention is used for the close communication of label of heterogeneous network, and the user for identity-based environment and the user without certificate environment provide confidentiality, integrality, certification and undeniable sex service end to end.
Description
Technical field
The invention belongs to private communication technology field, more particularly to a kind of transmitting terminal belongs to identity-based environment, reception
End belongs to the isomery label decryption method of no certificate environment.
Background technology
Cipher system is to realize the important tool of secret communication.The basic security service that cipher system is provided has confidentiality
(confidentiality), integrality (integrity), certification (authentication) and non-repudiation (non-
repudiation).Confidentiality refers to that information only uses for authorized user, it is impossible to be leaked to the user of unauthorized.Integrality refers to
Information is in transmission or storing process, it is impossible to by accidentally or in cold blood deletion, modification, forgery, playback, insertion etc. are destroyed and loss
Characteristic.Certification is to ensure that position that really it is claimed of communication party.Confirm that the identity of an entity is referred to as entity authentication, really
Recognize the source referred to as message authentication of an information.Non-repudiation is to prevent communication party to the no of former promise or behavior
Recognize.In cipher system, confidentiality can be referred to as encryption (encryption) to obtain by a kind of basic cryptographic primitives.Plus
Close to regard a kind of conversion as, this change readable cleartext information of changing commanders is transformed into unreadable cipher-text information.Digital signature
(digital signature) is also a kind of basic cryptographic primitives, and it can obtain integrality, certification and non-repudiation.
Digital signature can regard a kind of cryptographic transformation done to data as, and this cryptographic transformation can confirm the receiving terminal of data
The identity of signer and the integrality of data.If we need simultaneously obtain confidentiality, integrality, certification and undeniably
Property, a traditional method is that first message is signed, and is then encrypted again, is referred to as " first sign and encrypt afterwards " method.This
The amount of calculation and communications cost of the method for kind are encryption and cost sum of signing, less efficient.1997, Zheng proposed one kind
New cryptographic primitives to obtain these four security properties simultaneously, and his this cryptographic primitives are called Signcryption.Compared with traditional " elder generation
Encrypted after signature " method, sign close with advantages below:
(1) label are close will be less than traditional " first sign and encrypt afterwards " method in amount of calculation and communications cost.
(2) close some expensive Password Operations of permission parallel computation are signed.
(3) label rationally designed close can obtain higher level of security.
(4) design of the close cipher protocol that can simplify need for confidentiality simultaneously and certification is signed.
1976, Diffie and Hellman proposed the concept of public-key cryptosystem, solve in DSE arithmetic most
Scabrous two problems:Encryption key distribution and digital signature.In public-key cryptosystem, each user possesses two keys:It is private
Key and public key, wherein only private key is preserved by user's secret, public key can be by a CA (certificate
Authority, CA) it is stored in a public key catalogue.However, public-key cryptosystem is vulnerable to " public key replacement " attack, that is, attack
The person of hitting replaces real public key in a public key catalogue with the false public key oneself selected.When a user is with this false public key encryption
During one message, this attacker just can correctly decrypt.In order to resist public key substitution attack, it is necessary to allow user public key with
A kind of can verify that associates with believable mode with the identity information of user.At present, the public key of certification user has three kinds of methods:
Method, identity-based (identity- based on PKIX (public key infrastructure, PKI)
Based method) and without certificate (certificateless) method.It is in fact possible to according to the difference of authentication public key method,
Public-key cryptosystem is divided into the cipher system based on PKIX, Identity- based cryptography and without cryptographic certificate body
System.The characteristics of these three cipher systems of explained later.
(1) cipher system based on PKIX:The public key of each user is with a public key certificate, and this is public
Key certificate is signed and issued by CA.Public key certificate is the data record of a structuring, and it includes the identity information of user, public key parameter
With CA signature etc..Anyone can be by verifying the legitimacy (CA signature) of certificate come certification public key.This method has
Following two shortcomings:1. using the legitimacy for being required for first verifying public key certificate before any public key, the amount of calculation of user is added;
2. CA needs to manage substantial amounts of certificate, including certificate is issued, stored, cancelling.
(2) Identity- based cryptography:In order to simplify key management, Shamir was proposed based on body first in 1984
Concept [the Shamir A.Identity-based cryptosystems and signature of the cipher system of part
schemes.Advances in Cryptology-CRYPTO’84,LNCS 196,1985:47-53.].In the close of identity-based
In code system, the public key of user can be according to the identity information of user (such as name, ID card No., telephone number, E-mail
Location etc.) directly calculate, the private key of user be then be referred to as by one private key generation center (private key generator,
PKG trusted party generation).Identity- based cryptography eliminates public key certificate, reduces the storage of public key certificate and legal
Property checking.But, Identity- based cryptography have the shortcomings that one it is fatal:The private key of all users is all generated by PKG.PKG
Know that the private key of all users inevitably causes key escrow.
(3) certificateless cryptosystem:In order to overcome the key escrow in Identity- based cryptography, Al-
Riyami and Paterson propose certificateless cryptosystem (certificateless cryptography) concept [Al-
Riyami S S,Paterson K G.Certificateless public key cryptography.Advances in
Cryptology-ASIACRYPT 2003,LNCS2894,2003:452-473.].In this cipher system, the private key of user
Come from two parts, a part is the secret value of user oneself selection, and a part is by key generation centre (key
Generating centre, KGC) according to the part private key of the identity information of user calculating.Public key generally utilizes secret value next life
Into, but public key here is not necessarily with the public key certificate of independent certification.That is, the part that user needs joint KGC to generate is private
Key and the secret value of oneself generate complete private key.KGC is not aware that the complete private key of user, is asked so as to eliminate key escrow
Topic.
In past research process, people generally assume that participant belongs to identical authentication public key environment, i.e. two sides
Or either belong to PKIX environment in many ways, either belong in identity-based environment or belong to no certificate
Environment.However, the computer and communication system in the interconnection whole world that modern society is formed are very inhomogeneous.Internet of Things, cloud meter
The appearance for calculating these new technologies has aggravated the isomery degree of network.Different country, area and enterprises may use different nets
Network technology and different safe practices (difference for referring mainly to authentication public key technology here).
Currently, mainly there are following several schemes in the stopover sites for network isomery:
2010, the side that Sun and Li are proposed belonged to PKIX environment, the opposing party and belongs to identity-based environment
Isomery stopover sites [Sun Y, Li H.Efficient signcryption between TPKC and IDPKC and its
multi-receiver construction.SCIENCE CHINA Information Sciences,2010,53(3):
557-566.], but the program only meets External security (i.e. attacker can not be transmitting terminal or receiving terminal), such side
Case can not provide the property denied.Simultaneously also there is internal security sex chromosome mosaicism in the program, if the private key of i.e. transmitting terminal lost, attack
Person can not recover outbound message from ciphertext;If the private key of receiving terminal lost, attacker can not forge a ciphertext.
2011, Huang, Wong and Yang proposed two transmitting terminals and belong to PKIX environment, receiving terminal category
In isomery stopover sites [Huang Q, Wong D S, the Yang G.Heterogeneous of identity-based environment
signcryption with key privacy.The Computer Journal,2011,54(4):525-536.], the party
Case meets IGP.
2013, Li Fagen, Zhang Hui and Takagi proposed two isomery stopover sites [Li F, Zhang H, Takagi
T.Efficient signcryption for heterogeneous systems.IEEE Systems Journal,2013,
7(3):420-429.], the first string allows the transmitting terminal belonged in PKIX environment to send messages to belong to and be based on
Receiving terminal in identity environment, second scheme allows the transmitting terminal belonged in identity-based environment to send messages to and belongs to public key
Receiving terminal in infrastructure environment, the two schemes have all reached IGP.
2013, close signed with on-line/off-line of isomery label was combined by Li Fagen and Xiong Pan, devises a transmitting terminal category
Belong to on-line/off-line stopover sites [the Li F, Xiong of PKIX environment in identity-based environment, receiving terminal
P.Practical secure communication for integrating wireless sensor networks
into the Internet of things.IEEE Sensors Journal,2013,13(10):3677-3684.], the party
Case is applied to solve the safety problem in Internet of Things, and its transmitting terminal is a sensor node, and receiving terminal is one
Internet main frames.In order to reduce the calculating cost of sensor node, the program, which will be signed, close is divided into two stages:Off-line phase and
On-line stage.Off-line phase completes most of evaluation work in the case where not knowing message.When message can be used, online
Stage, which only need to be performed seldom calculating and just complete, entirely signs close process.
In addition, Chinese patent application CN103746811A, which discloses a kind of transmitting terminal, belongs to identity-based environment, receiving terminal
Belong to the anonymous label decryption method of PKIX environment, Chinese patent application 103746810A discloses a kind of transmitting terminal and belonged to
PKIX environment, receiving terminal belong to the anonymous label decryption method of identity-based environment.
But, above-mentioned label decryption method, which can not all be applicable transmitting terminal and belong to identity-based environment, receiving terminal, belongs to no certificate ring
The communication issue in border.
The content of the invention
It is an object of the invention to:Realize from identity-based environment to the close communication of the label without certificate environment, be identity-based
The user of environment and user's offer end-by-end security guarantee without certificate environment.
Disclosure of the invention is a kind of from identity-based environment to the label decryption method without certificate environment, including:
System initialization:Initialization system parameter, the private key S for generating transmitting terminalA, receiving terminal part private key DB, and
The label of transmitting terminal are close and receiving terminal solution label are close;
The transmitting terminal of identity-based environment submits identity information IDAPrivate key generation center is given, private key generates center according to being
Parameter of uniting and identity information IDAGenerate private key SAAnd it is sent to transmitting terminal;
Receiving terminal without certificate environment submits identity information IDBTo key generation centre, key generation centre is according to system
Parameter and identity information IDBGenerating portion private key DBAnd it is sent to receiving terminal;Receiving terminal is based on systematic parameter, and generation one is secret at random
Close value xB, according to secret value xBWith part private key DBComplete private key S is setBWith public key PKB, wherein complete private key SBIt may be configured as SB
=xB||DB, wherein symbol " | | " represents bit cascade;
Transmitting terminal is according to systematic parameter, the identity ID of transmitting terminalAWith private key SA, receiving terminal identity IDBWith public key PKBWith
Message m, generation label ciphertext σ, and ciphertext σ and identity ID will be signedAIt is sent to receiving terminal;
Receiving terminal is according to systematic parameter, the identity ID of transmitting terminalA, receiving terminal identity IDBWith public key PKB, receiving terminal it is complete
Full private key SBThe close processing of solution label is carried out to ciphertext σ.
By adopting the above-described technical solution, the beneficial effects of the invention are as follows:User for identity-based environment and without card
The user of book environment provides confidentiality, integrality, certification and undeniable sex service end to end.
Brief description of the drawings
Examples of the present invention will be described by way of reference to the accompanying drawings, wherein:
Fig. 1 is the close operational flowchart of label of the specific embodiment of the invention;
Fig. 2 is the close operational flowchart of solution label of the specific embodiment of the invention;
Fig. 3 is the system architecture signal of embodiments of the invention 1;
Fig. 4 is the system architecture signal of embodiments of the invention 2.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, with reference to embodiment and accompanying drawing, to this hair
It is bright to be described in further detail.
Embodiment 1
Referring to Fig. 3, the specific step that performs includes initialization system parameter, the key for generating identity-based environment, generated without card
The close label of conciliating of key, label of book environment are close, are described in detail below:
(1) initialization system parameter
(1.1) G is set1For the circled addition group generated by P, rank is p, G2For the circulation multiplicative group with phase same order p,For a bilinear map.Define four safe Hash functions H1,H2,H3And H4。H1、H3All it is from { 0,1 }*
It is mapped toH2From { 0,1 }*It is mapped to { 0,1 }t, H4It is from { 0,1 }*It is mapped toWherein { 0,1 }*Represent any bit long
The set of binary sequence composition,Represent G1Remove the module obtained by identical element, { 0,1 }tExpression bit length is t (t
For parameter preset, value is set as the bit length l of message m in the present embodimentm) binary sequence composition set,Table
It is shown with confinement ZpRemove the finite field obtained by element zero in={ 0,1 ..., p-1 }.
Based on above-mentioned setting, obtained systematic parameter is:
(1.2) private key generation center randomly chooses a private keyCalculate corresponding public key Ppub1=s1P。
(1.3) key generation centre randomly chooses a private keyCalculate corresponding public key Ppub2=s2P。
(2) key of identity-based environment is generated
Transmitting terminal submits identity information IDACenter, private key generation center calculation private key S are generated to private keyA=s1QA, its
Middle QA=H1(IDA), private key generates center by SASafe is sent to transmitting terminal.
(3) key without certificate environment is generated
(3.1) receiving terminal submits identity information IDBTo key generation centre, key generation centre calculating section private key DB=
s2QB, wherein QB=H1(IDB), key generation centre is by part private key DBIt is sent to receiving terminal.
(3.2) receiving terminal is randomly choosedIt is used as secret value.
(3.3) receiving terminal sets complete private key SB=(DB,xB), i.e. SB=xB||DB。
(3.4) receiving terminal calculates public key PKB=xBP。
(4) sign close
Transmitting terminal is getting the identity ID of receiving terminalBWith public key PKBAfterwards, it is possible to use identity IDAWith private key SATo message
It is close that m carries out label.Referring to Fig. 1, comprise the following steps that:
(4.1) randomly selectCalculate and promise to undertake V, T, U:V=rP,And U=rPKB。
(4.2) according to hash function H2, calculate cryptographic Hash h=H2(V,T,U,IDB,PKB)。
(4.3) calculateSymbolRepresent XOR.
(4.4) signature W=rH is calculated3(V,c,IDA)+H4(V,c,IDA)SA。
(4.5) label ciphertext σ=(V, c, the W) of message m and the identity ID of transmitting terminal are sentATo receiving terminal.
(5) solution label are close
Receiving terminal is receiving ciphertext σ=(V, c, W) and transmitting terminal identity IDAWhen, referring to Fig. 2, specifically perform following steps:
(5.1) checking signature W legitimacy
Check equationWhether set up, if above formula not into
It is vertical, then it is assumed that current ciphertext is invalid, refuses the ciphertext;Otherwise following step 5.2 is continued executing with.
(5.2) it is based on complete private key SBRecover to promise to undertake T, U, that is, calculateAnd U=xBV。
(5.3) obtained T, U value is calculated based on step (5.2), according to hash function H2Calculate cryptographic Hash h=H2(V,T,
U,IDB,PKB), wherein V=rP.
(5.4) the h values calculated further according to step (5.3), recover and output message
Embodiment 2
Referring to Fig. 4, the specific step that performs includes initialization system parameter, the key for generating identity-based environment, generated without card
Close conciliate of key, the label of book environment signs close.The main distinction of embodiment 2 and embodiment 1 is identity-based environment and without certificate
The generation member of environmental selection is different.
(1) initialization system parameter
(1.1) it is identical with the setting means of embodiment 1, initialization system parameter
(1.2) private key generation center selection group G1A generation member P1With a main private keyCalculate corresponding public
Key Ppub1=s1P1。
(1.3) key generation centre selection group G1A generation member P2With a main private keyCalculate corresponding public
Key Ppub2=s2P2。
(2) key of identity-based environment is generated
Transmitting terminal submits identity information IDACenter, private key generation center calculation private key S are generated to private keyA=s1QA, its
Middle QA=H1(IDA), private key generates center by SASafe is sent to transmitting terminal.
(3) key without certificate environment is generated
(3.1) receiving terminal submits identity information IDBTo key generation centre, key generation centre calculating section private key DB=
s2QB, wherein QB=H1(IDB), key generation centre is by part private key DBIt is sent to receiving terminal.
(3.2) receiving terminal is randomly choosedIt is used as secret value.
(3.3) receiving terminal sets complete private key SB=(DB,xB)。
(3.4) receiving terminal calculates public key PKB=xBP2。
(4) sign close
Referring to Fig. 1, transmitting terminal is getting the identity ID of receiving terminalBWith public key PKBAfterwards, it is possible to use identity IDAAnd private key
SALabel are carried out to message m close.Step is as follows:
(4.1) randomly selectCalculate V1=rP1、V2=rP2、And U=rPKB。
(4.2) h=H is calculated2(V1,V2,T,U,IDB,PKB)。
(4.3) calculate
(4.4) W=rH is calculated3(V1,V2,c,IDA)+H4(V1,V2,c,IDA)SA。
(4.5) label ciphertext σ=(V of message m is sent1,V2, c, W) and transmitting terminal identity IDATo receiving terminal.
(5) solution label are close
Referring to Fig. 2, receiving terminal is receiving ciphertext σ=(V1,V2, c, W) and transmitting terminal identity IDAWhen, perform following steps:
(5.1) equation is checked
Whether set up.If above formula is invalid, refuse the ciphertext;Otherwise following step 5.2 is continued executing with.
(5.2) calculateAnd U=xBV2。
(5.3) obtained T, U value is calculated based on step (5.2), cryptographic Hash h=H is calculated2(V1,V2,T,U,IDB,PKB),
Wherein V1=rP1、V2=rP2。
(5.4) message is recovered
Applicant is in Intel's Duo (Intel Core) i7 4770S processors (3.10GHz), the interior calculating for saving as 4G
On machine, run time checking has been carried out to above two embodiment using PBC storehouses (Selective type A pairings):For embodiment 1,
The time that the time that initialization system parameter needs, which is 26.756 milliseconds, generate the key of identity-based environment needs is 12.457 millis
Second, time for needing of key of the generation without certificate environment be 19.379 milliseconds, the time of the close needs of label be 45.744 milliseconds, solution label
The time of close needs is 62.004 milliseconds.To embodiment 2, the time that initialization system parameter needs is 25.375 milliseconds, generates base
The time that the time needed in the key of identity environment is 12.756 milliseconds, key of the generation without certificate environment needs is 18.643
Millisecond, the time of the close needs of label are 50.237 milliseconds, the time of the close needs of solution label is 62.083 milliseconds.It can be seen that the present invention has place
The characteristics of managing high efficiency and be practical.
The foregoing is only a specific embodiment of the invention, any feature disclosed in this specification, except non-specifically
Narration, can alternative features equivalent by other or with similar purpose replaced;Disclosed all features or all sides
Method or during the step of, in addition to mutually exclusive feature and/or step, can be combined in any way.
Claims (4)
1. it is a kind of from identity-based environment to the label decryption method without certificate environment, it is characterised in that to comprise the following steps:
Initialization system parameter, the systematic parameter includesWherein G1Represent that rank adds for p circulation
Method group, G2The circulation multiplicative group that rank is p is represented,Represent G1×G1→G2Two-wire mapping, H1~H4Hash function is represented, wherein
H1And H3For from { 0,1 }*It is mapped toH2From { 0,1 }*It is mapped to { 0,1 }t, H4It is from { 0,1 }*It is mapped toWherein { 0,1 }*
The set of the binary sequence composition of any bit long is represented,Represent circled addition group G1Remove the addition obtained by identical element
Group, { 0,1 }tThe set that bit length constitutes for t binary sequence is represented, wherein t is parameter preset,Represent finite field Zp
Remove the finite field obtained by element zero in={ 0,1 ..., p-1 };
The transmitting terminal of identity-based environment submits identity information IDACenter is generated to private key, private key generates center according to systematic parameter
With identity information IDAGenerate the private key S of transmitting terminalAAnd it is sent to transmitting terminal, wherein SA=s1QA,QA=H1(IDA);
Receiving terminal without certificate environment submits identity information IDBTo key generation centre, key generation centre according to systematic parameter and
Identity information IDBGenerating portion private key DBAnd it is sent to receiving terminal, wherein DB=s2QB,QB=H1(IDB);
Receiving terminal is based on systematic parameter one secret value x of generation at randomB, according to secret value xBWith part private key DBSet completely private
Key SBWith public key PKB, wherein secret valuePublic key PKB=xBP, P represent circled addition group G1Generation member;
Transmitting terminal is according to systematic parameter, the identity ID of transmitting terminalAWith private key SA, receiving terminal identity IDBWith public key PKBAnd message m,
Generation label ciphertext σ, and ciphertext σ and identity ID will be signedAIt is sent to receiving terminal;
Ciphertext σ is signed in generation:Randomly choose finite fieldIn either element r, calculate promise to undertake V=rP,And U=rPKB, wherein public key Ppub2=s2P;Based on hash function H2Calculate cryptographic Hash h=H2(V,T,U,IDB,
PKB), so that label ciphertext σ=(V, c, the W) on message m is generated, whereinSign W=rH3(V,c,IDA)+H4
(V,c,IDA)SA;
Receiving terminal is according to systematic parameter, the identity ID of transmitting terminalA, receiving terminal identity IDBWith public key PKB, receiving terminal complete private
Key SBThe close processing of solution label is carried out to ciphertext σ:JudgeWhether set up,
If not, then it is assumed that current ciphertext σ is invalid, wherein public key Ppub1=s1P;Otherwise it is based on complete private key SBRecover to promise to undertakeU=xBAfter V, by hash function H2Calculate cryptographic Hash h=H2(V,T,U,IDB,PKB), it is based onOutput disappears
Cease m.
2. the method as described in claim 1, it is characterised in that the complete private key SB=xB||DB, wherein symbol " | | " represents
Bit is cascaded.
3. the method as described in claim 1, it is characterised in that the public key Ppub1=s1P1, Ppub2=s2P2, wherein P1And P2
Represent circled addition group G1Different generation members,
In generation label ciphertext σ=(V1,V2, c, W) when, cryptographic Hash h=H2(V1,V2,T,U,IDB,PKB), wherein V1=rP1、V2
=rP2, sign W=rH3(V1,V2,c,IDA)+H4(V1,V2,c,IDA)SA;
When solution signs close processing, judgeWhether set up, if so,
Then basisU=xBV2Recover to promise to undertake after T and U, calculate h=H2(V1,V2,T,U,IDB,PKB)。
4. method as claimed in claim 2 or claim 3, it is characterised in that parameter preset t is the bit length of message m.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410490400.5A CN104301108B (en) | 2014-09-23 | 2014-09-23 | It is a kind of from identity-based environment to the label decryption method without certificate environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410490400.5A CN104301108B (en) | 2014-09-23 | 2014-09-23 | It is a kind of from identity-based environment to the label decryption method without certificate environment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104301108A CN104301108A (en) | 2015-01-21 |
CN104301108B true CN104301108B (en) | 2017-10-17 |
Family
ID=52320688
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410490400.5A Expired - Fee Related CN104301108B (en) | 2014-09-23 | 2014-09-23 | It is a kind of from identity-based environment to the label decryption method without certificate environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104301108B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104767611B (en) * | 2015-05-05 | 2017-10-24 | 九江学院 | It is a kind of from PKIX environment to the label decryption method without certificate environment |
CN104767612B (en) * | 2015-05-05 | 2017-10-24 | 九江学院 | It is a kind of from the label decryption method without certificate environment to PKIX environment |
CN104811302B (en) * | 2015-05-15 | 2016-08-17 | 陕西师范大学 | Mix based on the elliptic curve without certificate and sign decryption method |
CN108449326B (en) * | 2018-02-27 | 2021-03-16 | 淮阴工学院 | Authentication method and system for heterogeneous repudiation |
CN109660332A (en) * | 2019-01-21 | 2019-04-19 | 电子科技大学 | A kind of parallel Key-insulated label decryption method based on no certificate |
CN110120939B (en) * | 2019-04-08 | 2021-06-08 | 淮阴工学院 | Encryption method and system capable of repudiation authentication based on heterogeneous system |
CN112398637A (en) * | 2020-07-08 | 2021-02-23 | 电子科技大学 | Equality test method based on certificate-free bookmark password |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102983971A (en) * | 2012-10-10 | 2013-03-20 | 中国科学技术大学苏州研究院 | Certificateless signature algorithm for user identity authentication in network environment |
CN103746811A (en) * | 2013-12-27 | 2014-04-23 | 西安邮电大学 | Anonymous signcryption method from identity public key system to certificate public key system |
CN103746810A (en) * | 2013-12-27 | 2014-04-23 | 西安邮电大学 | Anonymous sign-cryption method from certificate public key system to identity public key system |
-
2014
- 2014-09-23 CN CN201410490400.5A patent/CN104301108B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102983971A (en) * | 2012-10-10 | 2013-03-20 | 中国科学技术大学苏州研究院 | Certificateless signature algorithm for user identity authentication in network environment |
CN103746811A (en) * | 2013-12-27 | 2014-04-23 | 西安邮电大学 | Anonymous signcryption method from identity public key system to certificate public key system |
CN103746810A (en) * | 2013-12-27 | 2014-04-23 | 西安邮电大学 | Anonymous sign-cryption method from certificate public key system to identity public key system |
Non-Patent Citations (1)
Title |
---|
一个高效的基于身份的鉴密方案;李发根等;《计算机学报》;20060930;第29卷(第9期);1641-1647 * |
Also Published As
Publication number | Publication date |
---|---|
CN104301108A (en) | 2015-01-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104270249B (en) | It is a kind of from the label decryption method without certificate environment to identity-based environment | |
CN104301108B (en) | It is a kind of from identity-based environment to the label decryption method without certificate environment | |
JP4527358B2 (en) | An authenticated individual cryptographic system that does not use key escrow | |
JP5349619B2 (en) | Identity-based authentication key agreement protocol | |
US7590236B1 (en) | Identity-based-encryption system | |
US8589679B2 (en) | Identifier-based signcryption with two trusted authorities | |
US20060083370A1 (en) | RSA with personalized secret | |
JPH08507619A (en) | Two-way public key verification and key matching for low cost terminals | |
CN103354498A (en) | Identity-based file encryption transmission method | |
KR20140079544A (en) | Apparatus and method for anonymity-based authentication and key agreement with message binding properties | |
US20050135610A1 (en) | Identifier-based signcryption | |
CN106713349B (en) | Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text | |
CN109831305B (en) | Anti-quantum computation signcryption method and system based on asymmetric key pool | |
Hahn et al. | Trustworthy delegation toward securing mobile healthcare cyber-physical systems | |
CN106453253A (en) | Efficient identity-based concealed signcryption method | |
CN110120939B (en) | Encryption method and system capable of repudiation authentication based on heterogeneous system | |
CN111953479B (en) | Data processing method and device | |
Ullah et al. | A novel trusted third party based signcryption scheme | |
CN109412815B (en) | Method and system for realizing cross-domain secure communication | |
CN110519226B (en) | Quantum communication server secret communication method and system based on asymmetric key pool and implicit certificate | |
CN109787772B (en) | Anti-quantum computation signcryption method and system based on symmetric key pool | |
Wang et al. | Public-Key applications in E-commerce | |
CN104168113A (en) | Certificate-based encryption method and system for n layers of CA structures | |
Dugardin et al. | A New Fair Identity Based Encryption Scheme | |
Anusree et al. | A security framework for brokerless publish subscribe system using identity based signcryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20171017 Termination date: 20200923 |
|
CF01 | Termination of patent right due to non-payment of annual fee |