A kind of safe label decryption method based on heterogeneous system
Technical field
The present invention relates to a kind of Signcryption method, for intelligent grid, the confidentiality belonged in intelligent grid and certification
Property technical field.
Background technology
Compared with traditional power network, intelligent grid has merged advanced information and communication technology (ICT), realizes and is cut with traditional power network
So different power network theory and system.Intelligent grid allows the transmission of two-way electric current and information flow, and allows user autonomous
The electricity consumption period is selected, participates in the operational management of system.
Intelligent electric meter includes process chip and memory cell, and it is the key component in intelligent grid.Intelligent electric meter energy
The enough and household electrical appliance in user family and the management equipment in electric administrative department are communicated.Due to having used intelligent electricity
Table, intelligent grid can monitor transmission and the consumption information of electric power in real time, subscribe to the use of electric power and more entering for relevant electric power
The demand of one step, and the output and use of management electric power.Therefore, the generation to user and electric power and use are brought greatly
Benefit.According to the real-time electricity usage situation of user, electric administrative department can monitor and analyze the state of whole intelligent grid.
Then electric power according to demand, electric administrative department can dynamically adjust the generation, transmission and distribution of electric power, and it is high to reduce electricity consumption
The demand at peak, avoid potentially powering off.These management informations of electric administrative department will be transmitted in real time by intelligent electric meter
Into user family.Then user readjusts the use of electric power according to current electricity consumption situation, and the electricity consumption time from peak when
Phase goes to peak absences.
Intelligent grid brings great benefit to user and electric administrative department.Its success depends on communication
System.But the safety of communication system can significantly influence the normal operation of intelligent grid.In the worst case, its energy
It is enough that serious destruction is brought to whole infrastructure, and immeasurable influence is caused on economic, society and the people life.
Therefore, safety also just turns into the subject matter in intelligent grid.First, in intelligent grid, except intelligent electric meter and power pipe
Reason department, any third party not can know that the electricity consumption data of user.Otherwise, attacker is possible to according to these sensitivity letters
Cease and the personal property of user is threatened.Secondly, electricity consumption data should be certified.Otherwise these data do not have
Convincingness.Again, electricity consumption data can not be tampered during transmission.If these data are tampered, attacker's
Tampering should be able to be detected.Then, if the electricity consumption data of user have been sent to electricity by intelligent electric meter
Power management department, intelligent electric meter can not deny the behavior of its own.Finally, can not be extracted in these electricity consumption data extra
Information help third party's identification intelligent ammeter and electric administrative department.
Design one meets that the scheme of above-mentioned requirements is extremely difficult simultaneously.In addition, we are also contemplated that intelligence
Limited calculating and the communication resource in ammeter, and electric administrative department has enough calculating and the communication resource.Based on this, isomery
Stopover sites are well suited for designing the safe hetero-com-munication in intelligent grid.
Huang et al. proposes the stopover sites of an isomery.In this scenario, sender belongs to ID-ased cryptography
System (IBC), and recipient belongs to the cryptographic system (PKI) based on PKIX.But their scheme only allows base
The recipient based on PKI is sent messages in IBC sender.Li and Xiong proposes the label of the on-line/off-line of an isomery
Close scheme.The program, which will be signed, close is divided into off-line phase and on-line stage.In off-line phase, the larger computing of amount of calculation is all at this
Stage completes, and this stage is not related to the computing of message m.In on-line stage, the computing of only some lightweights exists
This stage completes, and this stage is related to the computing of message m.2013, Li et al. proposed two based on isomery
Stopover sites.Sender belongs to the cryptographic system based on PKI in first stopover sites, and recipient belongs to based on IBC's
Cryptographic system.Sender belongs to the cryptographic system based on IBC in second stopover sites, and recipient belongs to based on PKI's
Cryptographic system.Recently, Li et al. proposes the ring stopover sites based on isomery.The program can protect sensor node
Privacy, and in this scenario, sensor node belongs to IBC cryptographic systems, and server belongs to PKI cryptographic systems.2016,
Li et al. proposes one from wireless sensor network (WSNs) to the stopover sites of the isomery of the webserver (server).
In the program, WSNs belongs to the cryptographic system (CLC) of no certificate, and server belongs to PKI cryptographic system.
The content of the invention
Goal of the invention:For problems of the prior art, the present invention provides one kind and is used for smart grid security isomery
The method of communication.
Technical scheme:A kind of safe label decryption method based on heterogeneous system, comprises the following steps:
1) system initialization step:
Security parameter k 1-1) is given, private key generation center (PKG) selects bilinear map group (G of the rank for q first1,G2),
Group G1Generation member P and bilinear map e:G1×G1→G2。
1-2) select main private keyCalculate Your Majesty's key Ppub=sP.
1-3) select three Hash numbers:H1:{0,1}*→G1,N is represented
Sign close message-length.
1-4) system public parameter is { G1,G2,e,q,P,Ppub,n,H1,H2,H3}。
2) key generation (IBC-KE) step based on IBC:
2-1) based on the sender in IBC its identity information IDsIt is sent to PKG.
2-2) PKG calculates its public keyAnd private keyIssue sender.
3) key generation (PKI-KE) step based on PKI:
A random number 3-1) is selected based on the recipient in PKIAs its private key.
3-2) recipient calculates yr=xrP is as corresponding public key.
4) close (SC) step is signed:Given message m, the private key of senderWith the public key of recipientSender performs
Following steps:
4-1) select random numberAnd calculate U=rP.
4-2) calculate h2=H2(m,U,IDs,yr)。
4-3) calculate
4-4) calculate
4-5) send ciphertext σ=(U, V, W).
5) solution signs close (USC) step:Given ciphertext σ, the public key of senderWith the private key x of recipientr, recipient holds
Row following steps:
5-1) calculate T=xrU。
5-2) calculate
5-3) calculate h2=H2(m,U,IDs,yr)。
5-4) verify equation e (P, V)=e (Ppub,QIDs)e(U,h2) whether equal.If condition is set up, ciphertext is received simultaneously
Output message m;Otherwise, ciphertext and output error symbol ⊥ are refused.
The present invention is based on that Diffie-Hellman difficult problems can be calculated.It can be realized simultaneously in same logic step
Confidentiality and authentication property.Simultaneously, it is contemplated that limited computing resource and communication overhead in intelligent electric meter, and in electric administrative department
There are powerful computing resource and communication overhead.Therefore, heterogeneous system is well suited for such characteristic.It is close in the label of the heterogeneous system
In scheme, intelligent electric meter is based on IBC cryptographic systems, therefore certificate management problem is not present, and electric administrative department is close based on PKI
Code system, certificate management problem can be afforded.
The invention has the advantages that protecting the secure communication of intelligent electric meter and electric administrative department, and realize
Confidentiality and authentication property between them, certain safety and privacy requirement are reached.
Embodiment
With reference to specific embodiment, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate the present invention
Rather than limitation the scope of the present invention, after the present invention has been read, various equivalences of the those skilled in the art to the present invention
The modification of form falls within the application appended claims limited range.
The symbol description used in implementation see the table below:
A kind of safe label decryption method based on heterogeneous system, comprises the following steps:
(1) system initialization (Setup):PKG generates main private key and system public parameter
1) security parameter k, PKG are given and selects bilinear map group (G of the rank for q1,G2), group G1Generation member P and two-wire
Property mapping G1×G1→G2。
2) PKG selects main private keyYour Majesty's key Ppub=sP and three hash function H1:{0,1}*→G1,Wherein n represents to be signed the length of close message m.
3) system public parameter is { G1,G2,e,q,P,Ppub,n,H1,H2,H3}。
(2) cipher key-extraction (IBC-KE) of ID-based cryptosystem system:PKG is generated according to the identity information of sender and sent out
The public key for the person of sending and the private key for calculating sender, and the private key of generation is sent to sender.
1) identity information ID of the sender in IBC cryptographic systems itsIt is sent to PKG.
2) PKG is calculatedAnd private keyThe sender being sent in IBC cryptographic systems.
(3) cipher key-extraction (PKI-KE) based on PKIX cryptographic system:Recipient selects a random number life
Into oneself private key and calculate the public key of oneself.
Recipient in PKI cryptographic systems selects a random numberAs oneself private key and calculate corresponding
Public key yr=xrP。
3-2) recipient calculates yr=xrP is as corresponding public key.
(4) close (SC) is signed:Sender utilizes the private key of oneself, identity information, the public key of recipient and given message
M, by dot product, hash function and XOR, obtain the ciphertext to be exported.
1) sender selects random numberAnd calculate U=rP.
2) sender calculates hash function value h2=H2(m,U,IDs,yr)。
3) sender's computer is signed
4) sender's computer is encrypted
5) sender exports ciphertext σ=(U, V, W).
(5) solution signs close (USC):Recipient utilizes private key, public key and the given ciphertext of oneself, by point multiplication operation,
XOR and Bilinear map computing calculate checking equation.If being verified, this ciphertext and output message m are received.It is no
Recognize, refusal ciphertext and output error symbol ⊥.
1) recipient calculates T=xrU。
2) recipient calculates XOR value
3) recipient calculates hash function value h2=H2(m,U,IDs,yr)。
4) recipient verifies equationIt is whether equal.If condition is set up, ciphertext is received
And output message m;Otherwise, ciphertext and output error symbol ⊥ are refused.
The simplification flow graph such as following table of above-mentioned embodiment:
The present invention protects the electricity usage data of user and the managing control information of electric administrative department, and ensure that
The data that transmitted before intelligent electric meter can not be denied, certain safety and privacy requirement are reached, it is described as follows:
1) data security:In the communication of intelligent electric meter and electric administrative department, message m is transmitted in the form of ciphertext
's.The random number of sender's selectionAnd the private key of oneself only has and oneself known, disabled user can not possibly be from ciphertext σ
Message m is recovered, the ciphertext can be decrypted by only really possessing the intelligent electric meter of private key.So this agreement can realize confidentiality.
2) authentication property:If it is not known that the private key of intelligent electric meterOpponent can not then produce legal signature information V, its
Inh2=H2(m,U,IDs,yr).Electric administrative department is by verifying that V correctness can be with authentication intelligent ammeter.
So this agreement can provide authentication property.
3) integrality:The electricity usage data m of user is included in hash function h2In W, wherein h2=H2(m,U,IDs,
yr),Opponent can not be from cryptographic Hash h2In obtain m because hash function is one-way function.
M can not be obtained from W because only that intelligent electric meter oneself knows random number r.So this agreement can provide integrality.
Non-repudiation:In stopover sites, the private key of intelligent electric meter has been usedAnd only intelligent electric meter is knownValue.Therefore, in the communication of whole smart grid security, intelligent electric meter, which can not be denied oneself take part in, this time to communicate, and
The data being transmitted across before can not be denied.So this agreement can realize non-repudiation.