Identity-based threshold ring signature method
A threshold ring and identity technology, applied in the field of identity-based threshold ring signatures, can solve problems such as the difficulty of trapdoor one-way functions in public key cryptosystems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] Such as figure 1 As shown, the present invention is an identity-based threshold ring signature method, which includes the following steps:
[0031] An identity-based threshold ring signature method includes the following steps:
[0032] S1. System establishment: randomly select parameters, generate system parameters and corresponding master keys, where system parameters are public parameters, the specific steps are:
[0033] Let G, G T Is the cyclic group of prime number p, e: G×G→G T Is a bilinear map, two collision-free hash functions with Output any length of identity ID and message m to length n u And n m Bit string
[0034] A trusted third party randomly selects the parameter α∈Z p , Generator g∈G, calculate g 1 =g a . Randomly select parameter g 2 ,u',m'∈G, n u Dimensional vector n m Dimensional vector Where u i ,m i ∈G, the system parameter is param = ( G , G T , e , g , g 1 , g 2 , u ′ , U ^ , m ′ ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 