CN107483209A - A kind of safe label decryption method based on heterogeneous system - Google Patents

A kind of safe label decryption method based on heterogeneous system Download PDF

Info

Publication number
CN107483209A
CN107483209A CN201710654898.8A CN201710654898A CN107483209A CN 107483209 A CN107483209 A CN 107483209A CN 201710654898 A CN201710654898 A CN 201710654898A CN 107483209 A CN107483209 A CN 107483209A
Authority
CN
China
Prior art keywords
ciphertext
recipient
key
calculate
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710654898.8A
Other languages
Chinese (zh)
Other versions
CN107483209B (en
Inventor
金春花
赵建洋
陈冠华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huaian Fun Sofware Co ltd
Original Assignee
Huaiyin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huaiyin Institute of Technology filed Critical Huaiyin Institute of Technology
Priority to CN201710654898.8A priority Critical patent/CN107483209B/en
Publication of CN107483209A publication Critical patent/CN107483209A/en
Application granted granted Critical
Publication of CN107483209B publication Critical patent/CN107483209B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/006Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving public key infrastructure [PKI] trust models
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a kind of safe label decryption method based on heterogeneous system, comprise the following steps:System initialization step;Key generation step based on IBC;Key generation step based on PKI;Sender utilizes the private key of oneself, identity information, the public key of recipient and given message m, by dot product, hash function and XOR, obtains the ciphertext to be exported;Given ciphertext σ, the public key of senderWith the private key x of recipientr, recipient, checking equation is calculated by point multiplication operation, XOR and Bilinear map computing.If being verified, this ciphertext and output message m are received.Deny, refusal ciphertext and output error symbol ⊥.The present invention protects the secure communication of intelligent electric meter and electric administrative department, and realizes confidentiality and authentication property between them, has reached certain safety and privacy requirement.

Description

A kind of safe label decryption method based on heterogeneous system
Technical field
The present invention relates to a kind of Signcryption method, for intelligent grid, the confidentiality belonged in intelligent grid and certification Property technical field.
Background technology
Compared with traditional power network, intelligent grid has merged advanced information and communication technology (ICT), realizes and is cut with traditional power network So different power network theory and system.Intelligent grid allows the transmission of two-way electric current and information flow, and allows user autonomous The electricity consumption period is selected, participates in the operational management of system.
Intelligent electric meter includes process chip and memory cell, and it is the key component in intelligent grid.Intelligent electric meter energy The enough and household electrical appliance in user family and the management equipment in electric administrative department are communicated.Due to having used intelligent electricity Table, intelligent grid can monitor transmission and the consumption information of electric power in real time, subscribe to the use of electric power and more entering for relevant electric power The demand of one step, and the output and use of management electric power.Therefore, the generation to user and electric power and use are brought greatly Benefit.According to the real-time electricity usage situation of user, electric administrative department can monitor and analyze the state of whole intelligent grid. Then electric power according to demand, electric administrative department can dynamically adjust the generation, transmission and distribution of electric power, and it is high to reduce electricity consumption The demand at peak, avoid potentially powering off.These management informations of electric administrative department will be transmitted in real time by intelligent electric meter Into user family.Then user readjusts the use of electric power according to current electricity consumption situation, and the electricity consumption time from peak when Phase goes to peak absences.
Intelligent grid brings great benefit to user and electric administrative department.Its success depends on communication System.But the safety of communication system can significantly influence the normal operation of intelligent grid.In the worst case, its energy It is enough that serious destruction is brought to whole infrastructure, and immeasurable influence is caused on economic, society and the people life. Therefore, safety also just turns into the subject matter in intelligent grid.First, in intelligent grid, except intelligent electric meter and power pipe Reason department, any third party not can know that the electricity consumption data of user.Otherwise, attacker is possible to according to these sensitivity letters Cease and the personal property of user is threatened.Secondly, electricity consumption data should be certified.Otherwise these data do not have Convincingness.Again, electricity consumption data can not be tampered during transmission.If these data are tampered, attacker's Tampering should be able to be detected.Then, if the electricity consumption data of user have been sent to electricity by intelligent electric meter Power management department, intelligent electric meter can not deny the behavior of its own.Finally, can not be extracted in these electricity consumption data extra Information help third party's identification intelligent ammeter and electric administrative department.
Design one meets that the scheme of above-mentioned requirements is extremely difficult simultaneously.In addition, we are also contemplated that intelligence Limited calculating and the communication resource in ammeter, and electric administrative department has enough calculating and the communication resource.Based on this, isomery Stopover sites are well suited for designing the safe hetero-com-munication in intelligent grid.
Huang et al. proposes the stopover sites of an isomery.In this scenario, sender belongs to ID-ased cryptography System (IBC), and recipient belongs to the cryptographic system (PKI) based on PKIX.But their scheme only allows base The recipient based on PKI is sent messages in IBC sender.Li and Xiong proposes the label of the on-line/off-line of an isomery Close scheme.The program, which will be signed, close is divided into off-line phase and on-line stage.In off-line phase, the larger computing of amount of calculation is all at this Stage completes, and this stage is not related to the computing of message m.In on-line stage, the computing of only some lightweights exists This stage completes, and this stage is related to the computing of message m.2013, Li et al. proposed two based on isomery Stopover sites.Sender belongs to the cryptographic system based on PKI in first stopover sites, and recipient belongs to based on IBC's Cryptographic system.Sender belongs to the cryptographic system based on IBC in second stopover sites, and recipient belongs to based on PKI's Cryptographic system.Recently, Li et al. proposes the ring stopover sites based on isomery.The program can protect sensor node Privacy, and in this scenario, sensor node belongs to IBC cryptographic systems, and server belongs to PKI cryptographic systems.2016, Li et al. proposes one from wireless sensor network (WSNs) to the stopover sites of the isomery of the webserver (server). In the program, WSNs belongs to the cryptographic system (CLC) of no certificate, and server belongs to PKI cryptographic system.
The content of the invention
Goal of the invention:For problems of the prior art, the present invention provides one kind and is used for smart grid security isomery The method of communication.
Technical scheme:A kind of safe label decryption method based on heterogeneous system, comprises the following steps:
1) system initialization step:
Security parameter k 1-1) is given, private key generation center (PKG) selects bilinear map group (G of the rank for q first1,G2), Group G1Generation member P and bilinear map e:G1×G1→G2
1-2) select main private keyCalculate Your Majesty's key Ppub=sP.
1-3) select three Hash numbers:H1:{0,1}*→G1,N is represented Sign close message-length.
1-4) system public parameter is { G1,G2,e,q,P,Ppub,n,H1,H2,H3}。
2) key generation (IBC-KE) step based on IBC:
2-1) based on the sender in IBC its identity information IDsIt is sent to PKG.
2-2) PKG calculates its public keyAnd private keyIssue sender.
3) key generation (PKI-KE) step based on PKI:
A random number 3-1) is selected based on the recipient in PKIAs its private key.
3-2) recipient calculates yr=xrP is as corresponding public key.
4) close (SC) step is signed:Given message m, the private key of senderWith the public key of recipientSender performs Following steps:
4-1) select random numberAnd calculate U=rP.
4-2) calculate h2=H2(m,U,IDs,yr)。
4-3) calculate
4-4) calculate
4-5) send ciphertext σ=(U, V, W).
5) solution signs close (USC) step:Given ciphertext σ, the public key of senderWith the private key x of recipientr, recipient holds Row following steps:
5-1) calculate T=xrU。
5-2) calculate
5-3) calculate h2=H2(m,U,IDs,yr)。
5-4) verify equation e (P, V)=e (Ppub,QIDs)e(U,h2) whether equal.If condition is set up, ciphertext is received simultaneously Output message m;Otherwise, ciphertext and output error symbol ⊥ are refused.
The present invention is based on that Diffie-Hellman difficult problems can be calculated.It can be realized simultaneously in same logic step Confidentiality and authentication property.Simultaneously, it is contemplated that limited computing resource and communication overhead in intelligent electric meter, and in electric administrative department There are powerful computing resource and communication overhead.Therefore, heterogeneous system is well suited for such characteristic.It is close in the label of the heterogeneous system In scheme, intelligent electric meter is based on IBC cryptographic systems, therefore certificate management problem is not present, and electric administrative department is close based on PKI Code system, certificate management problem can be afforded.
The invention has the advantages that protecting the secure communication of intelligent electric meter and electric administrative department, and realize Confidentiality and authentication property between them, certain safety and privacy requirement are reached.
Embodiment
With reference to specific embodiment, the present invention is furture elucidated, it should be understood that these embodiments are merely to illustrate the present invention Rather than limitation the scope of the present invention, after the present invention has been read, various equivalences of the those skilled in the art to the present invention The modification of form falls within the application appended claims limited range.
The symbol description used in implementation see the table below:
A kind of safe label decryption method based on heterogeneous system, comprises the following steps:
(1) system initialization (Setup):PKG generates main private key and system public parameter
1) security parameter k, PKG are given and selects bilinear map group (G of the rank for q1,G2), group G1Generation member P and two-wire Property mapping G1×G1→G2
2) PKG selects main private keyYour Majesty's key Ppub=sP and three hash function H1:{0,1}*→G1,Wherein n represents to be signed the length of close message m.
3) system public parameter is { G1,G2,e,q,P,Ppub,n,H1,H2,H3}。
(2) cipher key-extraction (IBC-KE) of ID-based cryptosystem system:PKG is generated according to the identity information of sender and sent out The public key for the person of sending and the private key for calculating sender, and the private key of generation is sent to sender.
1) identity information ID of the sender in IBC cryptographic systems itsIt is sent to PKG.
2) PKG is calculatedAnd private keyThe sender being sent in IBC cryptographic systems.
(3) cipher key-extraction (PKI-KE) based on PKIX cryptographic system:Recipient selects a random number life Into oneself private key and calculate the public key of oneself.
Recipient in PKI cryptographic systems selects a random numberAs oneself private key and calculate corresponding Public key yr=xrP。
3-2) recipient calculates yr=xrP is as corresponding public key.
(4) close (SC) is signed:Sender utilizes the private key of oneself, identity information, the public key of recipient and given message M, by dot product, hash function and XOR, obtain the ciphertext to be exported.
1) sender selects random numberAnd calculate U=rP.
2) sender calculates hash function value h2=H2(m,U,IDs,yr)。
3) sender's computer is signed
4) sender's computer is encrypted
5) sender exports ciphertext σ=(U, V, W).
(5) solution signs close (USC):Recipient utilizes private key, public key and the given ciphertext of oneself, by point multiplication operation, XOR and Bilinear map computing calculate checking equation.If being verified, this ciphertext and output message m are received.It is no Recognize, refusal ciphertext and output error symbol ⊥.
1) recipient calculates T=xrU。
2) recipient calculates XOR value
3) recipient calculates hash function value h2=H2(m,U,IDs,yr)。
4) recipient verifies equationIt is whether equal.If condition is set up, ciphertext is received And output message m;Otherwise, ciphertext and output error symbol ⊥ are refused.
The simplification flow graph such as following table of above-mentioned embodiment:
The present invention protects the electricity usage data of user and the managing control information of electric administrative department, and ensure that The data that transmitted before intelligent electric meter can not be denied, certain safety and privacy requirement are reached, it is described as follows:
1) data security:In the communication of intelligent electric meter and electric administrative department, message m is transmitted in the form of ciphertext 's.The random number of sender's selectionAnd the private key of oneself only has and oneself known, disabled user can not possibly be from ciphertext σ Message m is recovered, the ciphertext can be decrypted by only really possessing the intelligent electric meter of private key.So this agreement can realize confidentiality.
2) authentication property:If it is not known that the private key of intelligent electric meterOpponent can not then produce legal signature information V, its Inh2=H2(m,U,IDs,yr).Electric administrative department is by verifying that V correctness can be with authentication intelligent ammeter. So this agreement can provide authentication property.
3) integrality:The electricity usage data m of user is included in hash function h2In W, wherein h2=H2(m,U,IDs, yr),Opponent can not be from cryptographic Hash h2In obtain m because hash function is one-way function. M can not be obtained from W because only that intelligent electric meter oneself knows random number r.So this agreement can provide integrality.
Non-repudiation:In stopover sites, the private key of intelligent electric meter has been usedAnd only intelligent electric meter is knownValue.Therefore, in the communication of whole smart grid security, intelligent electric meter, which can not be denied oneself take part in, this time to communicate, and The data being transmitted across before can not be denied.So this agreement can realize non-repudiation.

Claims (6)

1. a kind of safe label decryption method based on heterogeneous system, it is characterised in that comprise the following steps:
1) system initialization step;
2) key generation (IBC-KE) step based on IBC;
3) key generation (PKI-KE) step based on PKI;
4) close (SC) step is signed:Sender utilizes the private key of oneself, identity information, the public key of recipient and given message m, By dot product, hash function and XOR, the ciphertext to be exported is obtained;
5) solution signs close (USC) step:Given ciphertext σ, the public key of senderWith the private key x of recipientr, recipient, pass through a little Multiplication, XOR and Bilinear map computing calculate checking equation.If being verified, receive this ciphertext and output disappears Cease m.Deny, refusal ciphertext and output error symbol ⊥.
2. the label decryption method based on heterogeneous system of safety as claimed in claim 1, it is characterised in that system initialization step Including:
Security parameter k 1-1) is given, private key generation center (PKG) selects bilinear map group (G of the rank for q first1,G2), group G1 Generation member P and bilinear map e:G1×G1→G2
1-2) select main private keyCalculate Your Majesty's key Ppub=sP;
1-3) select three Hash numbers:H1:{0,1}*→G1,N represents to sign Close message-length;
1-4) system public parameter is { G1,G2,e,q,P,Ppub,n,H1,H2,H3}。
3. the label decryption method based on heterogeneous system of safety as claimed in claim 1, it is characterised in that the key based on IBC Generation (IBC-KE) step includes:
2-1) based on the sender in IBC its identity information IDsIt is sent to PKG;
2-2) PKG calculates its public keyAnd private keyIssue sender.
4. the label decryption method based on heterogeneous system of safety as claimed in claim 1, it is characterised in that the key based on PKI Generation (PKI-KE) step includes:
A random number 3-1) is selected based on the recipient in PKIAs its private key;
3-2) recipient calculates yr=xrP is as corresponding public key.
5. the label decryption method based on heterogeneous system of safety as claimed in claim 1, it is characterised in that close (SC) the step bag of label Include:
4-1) select random numberAnd calculate U=rP;
4-2) calculate h2=H2(m,U,IDs,yr);
4-3) calculate
4-4) calculate
4-5) send ciphertext σ=(U, V, W).
6. the label decryption method based on heterogeneous system of safety as claimed in claim 1, it is characterised in that given ciphertext σ, send The public key of personWith the private key x of recipientr, recipient's execution following steps:
5-1) calculate T=xrU。
5-2) calculate
5-3) calculate h2=H2(m,U,IDs,yr)。
5-4) verify equationIt is whether equal;If condition is set up, receive ciphertext and output disappears Cease m;Otherwise, ciphertext and output error symbol ⊥ are refused.
CN201710654898.8A 2017-08-03 2017-08-03 Secure signcryption method based on heterogeneous system Active CN107483209B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710654898.8A CN107483209B (en) 2017-08-03 2017-08-03 Secure signcryption method based on heterogeneous system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710654898.8A CN107483209B (en) 2017-08-03 2017-08-03 Secure signcryption method based on heterogeneous system

Publications (2)

Publication Number Publication Date
CN107483209A true CN107483209A (en) 2017-12-15
CN107483209B CN107483209B (en) 2020-06-16

Family

ID=60598172

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710654898.8A Active CN107483209B (en) 2017-08-03 2017-08-03 Secure signcryption method based on heterogeneous system

Country Status (1)

Country Link
CN (1) CN107483209B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566274A (en) * 2018-03-15 2018-09-21 中国地质大学(武汉) Method, equipment and the storage device of slitless connection between a kind of block chain Verification System
CN109088893A (en) * 2018-10-23 2018-12-25 桂林电子科技大学 Close Multiuser is signed based on polymerization under a kind of cloud environment and authenticates communication means
CN110113150A (en) * 2019-04-08 2019-08-09 淮阴工学院 The encryption method and system of deniable authentication based on no certificate environment
CN110120939A (en) * 2019-04-08 2019-08-13 淮阴工学院 A kind of encryption method and system of the deniable authentication based on heterogeneous system
CN112383397A (en) * 2020-09-15 2021-02-19 淮阴工学院 Heterogeneous signcryption communication method based on biological characteristics
CN114024683A (en) * 2021-09-28 2022-02-08 淮阴工学院 Online and offline signcryption method from CLC environment to PKI environment
CN114039724A (en) * 2021-11-05 2022-02-11 淮阴工学院 Online and offline signcryption method from CLC environment to IBC environment
CN114285580A (en) * 2021-11-12 2022-04-05 淮阴工学院 Online and offline signcryption method from certificateless to public key infrastructure
CN115499834A (en) * 2022-04-19 2022-12-20 电子科技大学 Intelligent Internet-of-vehicles lightweight heterogeneous signcryption method based on fog calculation block chain fusion

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060095771A1 (en) * 2004-11-02 2006-05-04 Guido Appenzeller Security device for cryptographic communications
CN101162999A (en) * 2006-10-15 2008-04-16 柏建敏 Method of authenticating identification based common key cryptosystem and encryption address in network
CN101465728A (en) * 2008-12-17 2009-06-24 成都市华为赛门铁克科技有限公司 Method, system and device for distributing cipher key
CN102523093A (en) * 2011-12-16 2012-06-27 河海大学 Encapsulation method and encapsulation system for certificate-based key with label
CN103873248A (en) * 2012-12-16 2014-06-18 航天信息股份有限公司 Encryption method and device with certificate based on identity
CN104270249A (en) * 2014-09-23 2015-01-07 电子科技大学 Signcryption method from certificateless environment to identity environment
CN105376213A (en) * 2015-08-04 2016-03-02 电子科技大学 Identity-based broadcast encryption scheme
CN105429941A (en) * 2015-10-27 2016-03-23 西安电子科技大学 Multi-receiver identity anonymity signcryption method

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060095771A1 (en) * 2004-11-02 2006-05-04 Guido Appenzeller Security device for cryptographic communications
CN101162999A (en) * 2006-10-15 2008-04-16 柏建敏 Method of authenticating identification based common key cryptosystem and encryption address in network
CN101465728A (en) * 2008-12-17 2009-06-24 成都市华为赛门铁克科技有限公司 Method, system and device for distributing cipher key
CN102523093A (en) * 2011-12-16 2012-06-27 河海大学 Encapsulation method and encapsulation system for certificate-based key with label
CN103873248A (en) * 2012-12-16 2014-06-18 航天信息股份有限公司 Encryption method and device with certificate based on identity
CN104270249A (en) * 2014-09-23 2015-01-07 电子科技大学 Signcryption method from certificateless environment to identity environment
CN105376213A (en) * 2015-08-04 2016-03-02 电子科技大学 Identity-based broadcast encryption scheme
CN105429941A (en) * 2015-10-27 2016-03-23 西安电子科技大学 Multi-receiver identity anonymity signcryption method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HUANG QIONG: "Heterogeneous signcryption with key privacy", 《COMPUTER JOURNAL》 *
王彩芬: "标准模型下高效的异构签密方案", 《电子与信息学报》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566274A (en) * 2018-03-15 2018-09-21 中国地质大学(武汉) Method, equipment and the storage device of slitless connection between a kind of block chain Verification System
CN109088893B (en) * 2018-10-23 2020-11-06 桂林电子科技大学 Multi-user group authentication communication method based on aggregation signcryption in cloud environment
CN109088893A (en) * 2018-10-23 2018-12-25 桂林电子科技大学 Close Multiuser is signed based on polymerization under a kind of cloud environment and authenticates communication means
CN110120939B (en) * 2019-04-08 2021-06-08 淮阴工学院 Encryption method and system capable of repudiation authentication based on heterogeneous system
CN110120939A (en) * 2019-04-08 2019-08-13 淮阴工学院 A kind of encryption method and system of the deniable authentication based on heterogeneous system
CN110113150A (en) * 2019-04-08 2019-08-09 淮阴工学院 The encryption method and system of deniable authentication based on no certificate environment
CN110113150B (en) * 2019-04-08 2021-09-17 淮阴工学院 Encryption method and system based on non-certificate environment and capable of repudiation authentication
CN112383397A (en) * 2020-09-15 2021-02-19 淮阴工学院 Heterogeneous signcryption communication method based on biological characteristics
CN114024683A (en) * 2021-09-28 2022-02-08 淮阴工学院 Online and offline signcryption method from CLC environment to PKI environment
CN114024683B (en) * 2021-09-28 2024-03-26 淮阴工学院 Online offline signcryption method from CLC environment to PKI environment
CN114039724A (en) * 2021-11-05 2022-02-11 淮阴工学院 Online and offline signcryption method from CLC environment to IBC environment
CN114285580A (en) * 2021-11-12 2022-04-05 淮阴工学院 Online and offline signcryption method from certificateless to public key infrastructure
CN114285580B (en) * 2021-11-12 2024-03-26 淮阴工学院 Online and offline signcryption method from certificate-free to public key infrastructure
CN115499834A (en) * 2022-04-19 2022-12-20 电子科技大学 Intelligent Internet-of-vehicles lightweight heterogeneous signcryption method based on fog calculation block chain fusion

Also Published As

Publication number Publication date
CN107483209B (en) 2020-06-16

Similar Documents

Publication Publication Date Title
CN107483209A (en) A kind of safe label decryption method based on heterogeneous system
Wang et al. Fault-tolerant multisubset aggregation scheme for smart grid
Saxena et al. Authentication and authorization scheme for various user roles and devices in smart grid
CN101789865B (en) Dedicated server used for encryption and encryption method
CN104270249B (en) It is a kind of from the label decryption method without certificate environment to identity-based environment
CN109274503A (en) Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system
CN110120939B (en) Encryption method and system capable of repudiation authentication based on heterogeneous system
CN105162772A (en) IoT equipment authentication and key agreement method and device
CN105163309B (en) A method of the wireless sensor network security communication based on combination pin
US11870891B2 (en) Certificateless public key encryption using pairings
CN109831430A (en) Safely controllable efficient data sharing method and system under a kind of cloud computing environment
CN104618109B (en) A kind of electric power terminal data safe transmission method based on digital signature
CN107172043B (en) A kind of smart power grid user sale of electricity method based on homomorphic cryptography
CN104301108A (en) Signcryption method based from identity environment to certificateless environment
CN102523093A (en) Encapsulation method and encapsulation system for certificate-based key with label
CN105897784A (en) Internet of things terminal equipment encryption communication method and device
CN113141247B (en) Homomorphic encryption method, homomorphic encryption device, homomorphic encryption system and readable storage medium
CN103297230B (en) Information encipher-decipher method, Apparatus and system
CN108400862A (en) A kind of intelligent power trusted end-user data fusion encryption method
CN106713349A (en) Inter-group proxy re-encryption method capable of resisting selected ciphertext attack
CN109547413A (en) The access control method of convertible data cloud storage with data source authentication
Lu et al. Transactive energy system deployment over insecure communication links
Mutsvangwa et al. Secured access control architecture consideration for smart grids
US20220038267A1 (en) Methods and devices for secured identity-based encryption systems with two trusted centers
CN108933659A (en) A kind of authentication system and verification method of smart grid

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20201125

Address after: 211100 No. 1009 Tianyuan East Road, Jiangning District, Nanjing, Jiangsu (Jiangning hi tech Zone)

Patentee after: Fanyun software (Nanjing) Co.,Ltd.

Address before: No.1, Meicheng East Road, Huaian Economic and Technological Development Zone, Jiangsu Province

Patentee before: HUAIYIN INSTITUTE OF TECHNOLOGY

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230420

Address after: Room 310, Incubation Building A, Haichuang Space, No. 12 Tongyuan Road, Huai'an Economic and Technological Development Zone, Huai'an City, Jiangsu Province, 223005

Patentee after: HUAIAN FUN SOFWARE CO.,LTD.

Address before: 211100 No. 1009 Tianyuan East Road, Jiangning District, Nanjing, Jiangsu (Jiangning hi tech Zone)

Patentee before: Fanyun software (Nanjing) Co.,Ltd.

TR01 Transfer of patent right