CN114024683A - 一种从clc环境到pki环境的在线离线签密方法 - Google Patents
一种从clc环境到pki环境的在线离线签密方法 Download PDFInfo
- Publication number
- CN114024683A CN114024683A CN202111141523.4A CN202111141523A CN114024683A CN 114024683 A CN114024683 A CN 114024683A CN 202111141523 A CN202111141523 A CN 202111141523A CN 114024683 A CN114024683 A CN 114024683A
- Authority
- CN
- China
- Prior art keywords
- environment
- signcryption
- online
- key
- clc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 239000000654 additive Substances 0.000 claims description 4
- 230000000996 additive effect Effects 0.000 claims description 4
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 239000004576 sand Substances 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 abstract description 7
- 238000012795 verification Methods 0.000 abstract 2
- 238000004891 communication Methods 0.000 description 9
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Description
符号 | 符号说明 | 符号 | 符号说明 |
PKG | 私钥生成中心 | params | 系统参数 |
k | 安全参数 | q | 大素数 |
G<sub>1</sub> | 加法群 | P | G<sub>1</sub>中的生成元 |
ω,P<sub>pub</sub> | PKG的主私钥和它相应的公 | H<sub>i</sub> | 单向哈希函数 |
m | 消息 | SK<sub>s</sub>,ID<sub>s</sub> | 发送者的私钥和它相应的身 |
SK<sub>r</sub>,PK<sub>r</sub> | 接收者的私钥和它相应的公 | δ | 离线签密密文 |
σ | 签密密文 | β | 接收方对应的私钥值 |
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111141523.4A CN114024683B (zh) | 2021-09-28 | 2021-09-28 | 一种从clc环境到pki环境的在线离线签密方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111141523.4A CN114024683B (zh) | 2021-09-28 | 2021-09-28 | 一种从clc环境到pki环境的在线离线签密方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114024683A true CN114024683A (zh) | 2022-02-08 |
CN114024683B CN114024683B (zh) | 2024-03-26 |
Family
ID=80054893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111141523.4A Active CN114024683B (zh) | 2021-09-28 | 2021-09-28 | 一种从clc环境到pki环境的在线离线签密方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114024683B (zh) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970138A (zh) * | 2011-08-29 | 2013-03-13 | 汤姆森特许公司 | 签密方法和装置以及对应的签密验证方法和装置 |
CN104270249A (zh) * | 2014-09-23 | 2015-01-07 | 电子科技大学 | 一种从无证书环境到基于身份环境的签密方法 |
CN104301108A (zh) * | 2014-09-23 | 2015-01-21 | 电子科技大学 | 一种从基于身份环境到无证书环境的签密方法 |
CN104767612A (zh) * | 2015-05-05 | 2015-07-08 | 九江学院 | 一种从无证书环境到公钥基础设施环境的签密方法 |
CN104767611A (zh) * | 2015-05-05 | 2015-07-08 | 九江学院 | 一种从公钥基础设施环境到无证书环境的签密方法 |
CN106897879A (zh) * | 2017-03-06 | 2017-06-27 | 广东工业大学 | 基于pki‑clc异构聚合签密算法的区块链加密方法 |
CN107483209A (zh) * | 2017-08-03 | 2017-12-15 | 淮阴工学院 | 一种安全的基于异构系统的签密方法 |
CN110120939A (zh) * | 2019-04-08 | 2019-08-13 | 淮阴工学院 | 一种基于异构系统的可否认认证的加密方法和系统 |
CN111342973A (zh) * | 2020-02-27 | 2020-06-26 | 中南民族大学 | 一种安全的pki与ibc之间的双向异构数字签名方法 |
US10700875B1 (en) * | 2017-05-01 | 2020-06-30 | Wells Fargo Bank, N.A. | Systems and methods for value transfers using signcryption |
CN113162773A (zh) * | 2021-05-25 | 2021-07-23 | 辽宁工程技术大学 | 一种可证安全的异构盲签密方法 |
-
2021
- 2021-09-28 CN CN202111141523.4A patent/CN114024683B/zh active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102970138A (zh) * | 2011-08-29 | 2013-03-13 | 汤姆森特许公司 | 签密方法和装置以及对应的签密验证方法和装置 |
CN104270249A (zh) * | 2014-09-23 | 2015-01-07 | 电子科技大学 | 一种从无证书环境到基于身份环境的签密方法 |
CN104301108A (zh) * | 2014-09-23 | 2015-01-21 | 电子科技大学 | 一种从基于身份环境到无证书环境的签密方法 |
CN104767612A (zh) * | 2015-05-05 | 2015-07-08 | 九江学院 | 一种从无证书环境到公钥基础设施环境的签密方法 |
CN104767611A (zh) * | 2015-05-05 | 2015-07-08 | 九江学院 | 一种从公钥基础设施环境到无证书环境的签密方法 |
CN106897879A (zh) * | 2017-03-06 | 2017-06-27 | 广东工业大学 | 基于pki‑clc异构聚合签密算法的区块链加密方法 |
US10700875B1 (en) * | 2017-05-01 | 2020-06-30 | Wells Fargo Bank, N.A. | Systems and methods for value transfers using signcryption |
CN107483209A (zh) * | 2017-08-03 | 2017-12-15 | 淮阴工学院 | 一种安全的基于异构系统的签密方法 |
CN110120939A (zh) * | 2019-04-08 | 2019-08-13 | 淮阴工学院 | 一种基于异构系统的可否认认证的加密方法和系统 |
CN111342973A (zh) * | 2020-02-27 | 2020-06-26 | 中南民族大学 | 一种安全的pki与ibc之间的双向异构数字签名方法 |
CN113162773A (zh) * | 2021-05-25 | 2021-07-23 | 辽宁工程技术大学 | 一种可证安全的异构盲签密方法 |
Non-Patent Citations (3)
Title |
---|
MUTAZ ELRADI S. SAEED等: "HOOSC heterogeneous onlineoffline signcryption", 《WIRELESS NETWORKS》 * |
MUTAZ ELRADI S. SAEED等: "HOOSC: heterogeneous online/offline signcryption for the Internet of Things", 《WIRELESS NETWORKS》, pages 2 - 4 * |
党小超等: "适用于WSN的在线/离线异构签密方案", 《计算机工程》 * |
Also Published As
Publication number | Publication date |
---|---|
CN114024683B (zh) | 2024-03-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108989053B (zh) | 一种基于椭圆曲线的无证书公钥密码体制实现方法 | |
CN108173639B (zh) | 一种基于sm9签名算法的两方合作签名方法 | |
CN110113150B (zh) | 基于无证书环境的可否认认证的加密方法和系统 | |
WO2007071265A1 (en) | Group signature scheme with improved efficiency, in particular in a join procedure | |
CN113300856B (zh) | 一种可证安全的异构混合签密方法 | |
CN104767612A (zh) | 一种从无证书环境到公钥基础设施环境的签密方法 | |
CN110995412B (zh) | 基于乘法群的无证书环签密方法 | |
CN104767611B (zh) | 一种从公钥基础设施环境到无证书环境的签密方法 | |
CN106936584B (zh) | 一种无证书公钥密码系统的构造方法 | |
Yao et al. | A light-weight certificate-less public key cryptography scheme based on ECC | |
CN113162773A (zh) | 一种可证安全的异构盲签密方法 | |
Ren et al. | Provably secure aggregate signcryption scheme | |
Sui et al. | Separable and anonymous identity-based key issuing | |
Oh et al. | How to solve key escrow and identity revocation in identity-based encryption schemes | |
CN114285580B (zh) | 一种从无证书到公钥基础设施的在线离线签密方法 | |
CN114285576B (zh) | 一种非对的在线离线签密方法 | |
CN114024683B (zh) | 一种从clc环境到pki环境的在线离线签密方法 | |
Ahirwal et al. | Signcryption scheme that utilizes elliptic curve for both encryption and signature generation | |
Verma et al. | An efficient signcryption algorithm using bilinear mapping | |
Shakerian et al. | An identity based public key cryptography blind signature scheme from bilinear pairings | |
Lin et al. | A novel identity-based key-insulated convertible authenticated encryption scheme | |
Swapna et al. | Efficient identity based multi-signcryption scheme with public verifiability | |
Zhang et al. | A novel authenticated encryption scheme and its extension | |
Hölbl et al. | Comparative study of tripartite identity-based authenticated key agreement protocols | |
Han et al. | Bpgsc: Bilinear paring based genearlized signcryption scheme |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20240520 Address after: 230000 b-1018, Woye Garden commercial office building, 81 Ganquan Road, Shushan District, Hefei City, Anhui Province Patentee after: HEFEI WISDOM DRAGON MACHINERY DESIGN Co.,Ltd. Country or region after: China Address before: 223003 No. 1, Meicheng East Road, economic and technological development, Huai'an City, Jiangsu Province Patentee before: HUAIYIN INSTITUTE OF TECHNOLOGY Country or region before: China |