Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based threshold ring signature method

A threshold ring and identity technology, which is applied in the field of identity-based threshold ring signatures, can solve problems such as the difficulty of trapdoor one-way functions in public key cryptography

Inactive Publication Date: 2012-09-19
孙华 +4
View PDF1 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the security proof based on the random oracle model, it is necessary to assume that the cryptographic hash function used in the public key cryptosystem has the security properties of the random oracle machine, but the security cryptographic scheme under the random oracle model is not necessarily safe in the actual environment , and the security proof based on the standard model only depends on the difficulty of the trapdoor one-way function contained in the public key cryptosystem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based threshold ring signature method
  • Identity-based threshold ring signature method
  • Identity-based threshold ring signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 As shown, the present invention is an identity-based threshold ring signature method, comprising the following steps:

[0031] An identity-based threshold ring signature method, comprising the following steps:

[0032] S1. System establishment: randomly select parameters, generate system parameters and corresponding master keys, where system parameters are public parameters, and the specific steps are:

[0033] Let G, G T is a cyclic group whose order is a prime number p, e: G×G→G T is a bilinear map, two collision-free hash functions and Output the identity ID and message m of any length with a length of n u and n m the bit string;

[0034] The trusted third party randomly selects the parameter α∈Z p , generating element g∈G, computing g 1 =g a . Randomly choose the parameter g 2 , u′,m′∈G,n u dimension vector no m dimension vector where u i , m i ∈ R G, then the system parameters are param = ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity-based threshold ring signature method comprises the following steps: (1), system establishment; (2), private key extraction; (3), signature; and (4), verification. The method provided by the invention is established under a standard model and has better security compared with a scheme designed under a random predictive model.

Description

technical field [0001] The invention relates to a ring signature method, in particular to an identity-based threshold ring signature method. Background technique [0002] In the traditional public key cryptosystem, an important issue is the authenticity of the public key. Generally speaking, in order to apply public key cryptography algorithms in the real world, there needs to be a mechanism that can verify the connection between a certain public key and a certain subject's identity at any time. The usual method is to establish a public key infrastructure, and bind the public key with the user's identity through the public key digital certificate issued by its certification center. In such systems based on public key digital certificates, before using the user's public key, people need to obtain the user's public key digital certificate and verify the correctness and legitimacy of the certificate. This requires a larger storage space to store the public key certificates of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30
Inventor 孙华王爱民梁燕军郭丽孙虹
Owner 孙华
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products