Certificateless partially blind signature method

A partially blind and certificateless technology, applied in the field of information security, can solve problems such as poor practicability, low execution efficiency, and complex algorithms, and achieve the effect of eliminating the disadvantages of fully blind signatures

Inactive Publication Date: 2012-03-21
XIDIAN UNIV
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the complex algorithm and low execution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless partially blind signature method
  • Certificateless partially blind signature method
  • Certificateless partially blind signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Reference figure 1 , The present invention is a certificate-free partial blind signature method, and its implementation steps are:

[0029] Step 1. The key generation center PKG establishes system parameters. The specific steps are as follows:

[0030] (1a) Determine the size of the safety factor l and the prime number q according to safety requirements, and use the elliptic curve to construct the bilinear mapping e(G 1 , G 1 )→G 2 Cyclic additive group 1 , +> And cyclic multiplication group 2 ,·> For simplicity, this embodiment uses the P-192 elliptic curve in the prime number domain recommended by the National Institute of Standards and Technology (NIST);

[0031] (1b) Choose the following collision-free hash function H: {0, 1} * →G1 and In this embodiment, the hash function SHA-1 is selected;

[0032] (1c) From the integer multiplication group of mod q Randomly select an integer s PKG As own private key and calculate Q PKG =s PKG P as its own public key;

[0033] (1d) Publi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a certificateless partially blind signature method. In the prior art, practicality of the partially blind signature method is low. The method of the invention is mainly used to solve the above problem. The method comprises the following steps that: 1) a secret key generation center randomly selects an integer sPKG as a private key in an integer multiplication group of mod q and stores secretly, and discloses a system parameter: (G1, q, 1, P, G2, e, H, h, QPKG); 2) a signer generates the partial private key s1 and a partial public key Q1, the secret key generation center generates the other partial private key S2 and the public key Q2 and sends to the signer through a safe authentication channel, and the signer acquires a private key pair (s1, S2) and a public key pair (Q1, Q2); 3) the signer carries out signature; 4) an authenticator verifies validity of the signature by using the public key pair (Q1, Q2) of the signer. By using the method of the invention, a demand to a certificate can be eliminated. There is no disadvantage of secret key escrow. A partial blind characteristic is possessed. Simultaneously, the method is simple and high efficient and possesses good practicality and security. The method can be used in an electronic cash transaction and electronic voting.

Description

Technical field [0001] The invention belongs to the technical field of information security, and relates to a certificate-free partial blind signature method, which is suitable for digital signature and authentication, and is especially suitable for electronic cash transactions and electronic elections. Background technique [0002] As one of the means to ensure the security of network information, digital signature can effectively solve the problems of forgery, denial, impersonation and tampering in network information transmission. It is one of the core technologies to realize the security of electronic transactions. It guarantees the security, authenticity and Non-repudiation has important applications. It has important application value in key distribution, electronic banking, electronic bond, e-commerce and electronic government affairs. [0003] However, in some special cases, the message owner wants the signer to sign the information he owns, but does not want the signer to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 刘景伟孙蓉何剑辉白宝明
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products