Proxy blind signing system and method based on identification

A technology of proxy signature and blind signature, which is applied in the direction of user identity/authority verification, etc.

Inactive Publication Date: 2009-03-04
SONY CHINA
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this is a serious flaw because PKG knows each signer's private key, so PKG can forge any signer's signature without being noticed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy blind signing system and method based on identification
  • Proxy blind signing system and method based on identification
  • Proxy blind signing system and method based on identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0095] The present invention will be described more fully hereinafter with reference to the accompanying drawings showing preferred embodiments of the invention. It should be understood that the invention may be embodied in other different forms and should not be limited to the embodiments described herein. Rather, the following embodiments are provided only to fully and completely convey the scope of the present invention to those skilled in the art.

[0096] The identity-based proxy blind signature system and method without a trusted private key generator (PKG) according to the present invention will now be described with reference to the accompanying drawings. In the following description, a detailed description of well-known functions and configurations incorporated herein will be omitted since it may obscure the present invention.

[0097] First refer to figure 1 , figure 1 A block diagram of an identity-based proxy blind signature system without a trusted private key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an ID-based proxy blind signature system of an incredible private key generator and a method. The system comprises the key generator used for calculating the key according to the obtained key data so as to utilize the signature of the key on a message m to verify the reliability of the message m; a proxy certificate generation part used for generating the key data used by a signer according to the private data of the user and transmitting the key data to the private key generator to calculate the private key SA of the signer and constructing a certificate m Omega and signaling on the certificate m Omega by the private key, so that a proxy certificate W A-B is obtained; and a proxy signature part used for selecting proxy private data to generate corresponding private data and sending the private data to the private key generator to calculate a proxy private key SB and obtaining a proxy signature key according to the private key SB and a proxy public key W A-B, and constructing a premise according the proxy signature key and the proxy certificate W A-B, thereby leading the signature algorithm to satisfying the performances of non-forgery and non-repudiation.

Description

technical field [0001] In general, the present invention relates to systems and methods for proxy blind signatures and computer products thereof, and more particularly to systems and methods for proxy blind signatures in identity-based proxy blind signature systems without trusted private key generators and its computer products. Background technique [0002] With the continuous advancement of computer technology and Internet technology, the global economic development has entered a new information age. In the information age, the confidentiality of information and data is becoming more and more important. Whether it is personal information communication or e-commerce development, it is urgent to ensure the security of information transmission on the Internet, that is, to ensure information security. Information security technology involves information theory, computer science and cryptography, and its main function is to ensure reliable, confidential, authentic and complet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 余翊华杨义先郑世慧张智辉
Owner SONY CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products