Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity-based threshold ring signature method

A threshold ring and identity technology, applied in the field of identity-based threshold ring signatures, can solve problems such as the difficulty of trapdoor one-way functions in public key cryptosystems

Inactive Publication Date: 2014-09-10
孙华 +4
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the security proof based on the random oracle model, it is necessary to assume that the cryptographic hash function used in the public key cryptosystem has the security properties of the random oracle machine, but the security cryptographic scheme under the random oracle model is not necessarily safe in the actual environment , and the security proof based on the standard model only depends on the difficulty of the trapdoor one-way function contained in the public key cryptosystem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based threshold ring signature method
  • Identity-based threshold ring signature method
  • Identity-based threshold ring signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Such as figure 1 As shown, the present invention is an identity-based threshold ring signature method, which includes the following steps:

[0031] An identity-based threshold ring signature method includes the following steps:

[0032] S1. System establishment: randomly select parameters, generate system parameters and corresponding master keys, where system parameters are public parameters, the specific steps are:

[0033] Let G, G T Is the cyclic group of prime number p, e: G×G→G T Is a bilinear map, two collision-free hash functions with Output any length of identity ID and message m to length n u And n m Bit string

[0034] A trusted third party randomly selects the parameter α∈Z p , Generator g∈G, calculate g 1 =g a . Randomly select parameter g 2 ,u',m'∈G, n u Dimensional vector n m Dimensional vector Where u i ,m i ∈G, the system parameter is param = ( G , G T , e , g , g 1 , g 2 , u ′ , U ^ , m ′ ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An identity-based threshold ring signature method comprises the following steps: (1), system establishment; (2), private key extraction; (3), signature; and (4), verification. The method provided by the invention is established under a standard model and has better security compared with a scheme designed under a random predictive model.

Description

Technical field [0001] The invention relates to a ring signature method, in particular to an identity-based threshold ring signature method. Background technique [0002] In traditional public key cryptosystems, an important issue is the authenticity of the public key. Generally speaking, in order to apply public key cryptographic algorithms in the real world, a mechanism is needed to verify the connection between a public key and the identity of a subject at any time. The usual method is to establish a public key infrastructure, and bind the public key with the user's identity through the public key digital certificate issued by its certification center. In this type of public key digital certificate-based system, before using the user's public key, people need to obtain the user's public key digital certificate and verify the correctness and legitimacy of the certificate. This requires a larger storage space to store the public key certificates of different users, and also re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 孙华王爱民梁燕军郭丽孙虹
Owner 孙华