Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Elliptic curve and bilinear pairing cryptography based direct anonymous proving method

A bilinear pairing and elliptic curve technology, applied in the computer field, can solve the problems of low protocol efficiency, destruction of anonymity of the proving party, etc., and achieve the effect of ensuring security

Inactive Publication Date: 2011-06-15
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the participation of the privacy CA is required for each proof, the efficiency of the protocol is very low, and if the privacy CA is compromised or the privacy CA and the verifier collude, the anonymity of the prover will still be destroyed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve and bilinear pairing cryptography based direct anonymous proving method
  • Elliptic curve and bilinear pairing cryptography based direct anonymous proving method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] A direct anonymous proof method based on elliptic curve and bilinear pairing cryptosystem. The participating entities of the method include a certificate issuer, a prover and a verifier. The method mainly includes the following steps:

[0043] 1) Certificate issuer system initialization

[0044]A. The certificate issuer determines the blind signature method to be used; the certificate issuer can choose a suitable blind signature method according to the actual situation, for example, the CL-LRSW method (J.Camenisch, and A.Lysyanskaya.Signature schemes and anonymous credentials from bilinear maps.In: Franklin, M. (ed.) CRYPTO2004.LNCS, vol.3152, pp.56-72. Springer, Heidelberg (2004)) or the BBS+ method (M.H.Au, W.Susilo and Y. Mu. Constant-size dynamic k-TAA. In the Proceedings of 5th International Conference on Security and Cryptography for Networks (SCN 2006). LNCS, vol.4116, pp.111-125. Springer-Verlag, 2006.). The selected blind signature method requires that the own...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an elliptic curve and bilinear pairing cryptography based direct anonymous proving method, comprising the following steps of: (1) initializing a certificate issuing party system and sending common parameters to a certification party and a verification party; (2) issuing an anonymous certificate; (3) anonymously certifying DAACert (Computer emergency response team) by the certification party; and (4) anonymously verifying the anonymous certificate DAACert of the certification party by the verification party. According to the direct anonymous proving method provided by the invention, when the certification and the verification are carried out on the verification party by the certification party, high anonymity is maintained; the certified information is stored in a security chip and cannot be divulged; even the certified information is divulged, the real but broken certification party can be detected by utilizing the method provided by the invention; therefore, the safety of the certified information can be guaranteed. In the mean time, the method has the advantages of fast arithmetic speed and small traffic; when the security intensity of 128 bit is adopted,the arithmetic speed of the invention is at least 14 times faster than that of a scheme based on finite field arithmetic and the traffic of the invention is not more than 10 % of that of the scheme based on the finite field arithmetic.

Description

technical field [0001] The present invention mainly relates to a direct anonymous proof method. More precisely, it is a direct anonymous proof method based on elliptic curve and bilinear pairing cryptosystem, which is applied to security chips. The invention belongs to the field of computer technology. Background technique [0002] With the rapid development of computer technology, people rely more and more on computer software systems. At the same time, the difficulty of attacking computer systems is on the decline, and attacks are becoming more frequent. Solving the credibility of network software systems and their computing environments is a major challenge faced by both scientific research and industry. For this reason, the information technology industry has proposed the concept of "trusted computing" to enhance the credibility of computing platforms and systems based on hardware devices such as security chips. In addition to enabling local users to trust computing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/62
Inventor 冯登国秦宇初晓博张倩颖冯伟
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products