Democratic signature method with threshold tracking
A group signature and democratic group technology, applied in the field of democratic group signatures, can solve problems such as abuse of tracking ability, and achieve the effect of great flexibility and computational complexity and security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] The embodiments of the present invention are described in detail below in conjunction with the accompanying drawings: this embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following the described embodiment.
[0036] Such as figure 1 As shown, this embodiment includes the following steps:
[0037] Step 1, the trusted center generates system public parameters, that is, according to the given security parameter λ, the system trusted center generates system parameters G, q, g, h, H, where q is a prime number with a length of λ bits, and G is the factorial of q Normal cyclic group, g and h are any two generators on G, H: {0, 1} * → Z q is a cryptographically secure hash function, where Z q = {0, 1, ..., q-1}, G, q, g, h, H together constitute the public parameters of the sy...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 