发明授权
US08130964B2 Systems and methods for identity-based encryption and related cryptographic techniques
有权
用于基于身份的加密和相关加密技术的系统和方法
- 专利标题: Systems and methods for identity-based encryption and related cryptographic techniques
- 专利标题(中): 用于基于身份的加密和相关加密技术的系统和方法
-
申请号: US12589880申请日: 2009-10-28
-
公开(公告)号: US08130964B2公开(公告)日: 2012-03-06
- 发明人: Dan Boneh , Matthew Franklin
- 申请人: Dan Boneh , Matthew Franklin
- 申请人地址: US CA Palo Alto US CA Oakland
- 专利权人: The Board of Trustees of the Leland Stanford Junior University,The Regents of the University of California, Davis
- 当前专利权人: The Board of Trustees of the Leland Stanford Junior University,The Regents of the University of California, Davis
- 当前专利权人地址: US CA Palo Alto US CA Oakland
- 代理机构: Lumen Patent Firm
- 主分类号: H04L9/30
- IPC分类号: H04L9/30 ; H04L9/00 ; H04L9/08 ; H04L9/28 ; H04K1/00 ; G06F17/00 ; G06F21/24 ; G09C1/00 ; H04L12/22
摘要:
A method and system for encrypting a first piece of information M to be sent by a sender [100] to a receiver [110] allows both sender and receiver to compute a secret message key using identity-based information and a bilinear map. In a one embodiment, the sender [100] computes an identity-based encryption key from an identifier ID associated with the receiver [110]. The identifier ID may include various types of information such as the receiver's e-mail address, a receiver credential, a message identifier, or a date. The sender uses a bilinear map and the encryption key to compute a secret message key gIDr, which is then used to encrypt a message M, producing ciphertext V to be sent from the sender [100] to the receiver [110] together with an element rP. An identity-based decryption key dID is computed by a private key generator [120] based on the ID associated with the receiver and a secret master key s. After obtaining the private decryption key from the key generator [120], the receiver [110] uses it together with the element rP and the bilinear map to compute the secret message key gIDr, which is then used to decrypt V and recover the original message M. According to one embodiment, the bilinear map is based on a Weil pairing or a Tate pairing defined on a subgroup of an elliptic curve. Also described are several applications of the techniques, including key revocation, credential management, and return receipt notification.
公开/授权文献
信息查询