With the rapid development of computer network technology, the Internet hasbecome an indispensable part in people’s life, while the network brings them someconvenience,it is also confronted with a huge challenge in security. The dataencryption technology which is a key techniques in the field of information securityhas gained more and more attention. However, how can we ensure the security ofprivate information on the Internet, which is a difficult task that needs to be solved.With this demand, a great number of experts and scholars begin to research onvarious technologies of data encryption and network security.The one-to-many encryption scheme is an important research subclass in groupcryptography. The definition of the one-to-many encryption is that many senderssend data messages to multiple recipients and ensure the confidentiality of themessages during the transmission. Currently, The popular research works in theone-to-many encryption schemes include the broadcast encryption, multicastencryption and multi-recipient encryption and so on. In contrast with theone-to-many schemes, the other situation is many-to-one encryption scheme whichis proposed in this thesis.Firstly, in this thesis we describe the development, the principle and the usageof information security and public key cryptography, compare the similarities anddifferences in the symmetry and asymmetric cryptography, then introduce briefly thedefinition and the structure of Public Key Infrastructure(PKI), and the basictheoretical knowledge of the elliptic curve,bilinear mapping and the Pairing-BasedCryptography(PBC). We analyze the characteristics and applications of the PBCfunction library. By analyzing the Weil pairing and Tate pairing on the elliptic curves,we design a many-to-one encryption algorithm based on super-singular elliptic curves, and elaborated on the implementation process about this algorithm,then weprove the security of the algorithm.Secondly, we use the functions in the PBC library to implement the many-to-oneencryption algorithm on the platform of Microsoft Visual C plus and plus. Becauseof the computing speed of the A curve and the high efficiency on pairing of ellipticcurve, we adopt the A curve to simulate the experiments and analyze the results.Finally, we present a simple application of our algorithm. According to theexisting safety problems and the causes in video conference, we proposes thescheme that using many-to-one encryption algorithm to encrypt the session key inthe video conference, our method can effectively solve the problem of illegal usingof transmitted data caused by leakage of the session key, and reduce the burden ofkey management... |