Method for multi-way encryption and signing and zero knowledge certification

A zero-knowledge proof and multi-party technology, applied in the field of information security, can solve the problem that the asymmetric encryption system cannot guarantee multi-party encryption concisely

Inactive Publication Date: 2013-05-15
彭艳兵
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] This patent application is to solve the problem that when multiple parties are required to perform encryption and signature simultaneously, the conventional asymmetric encryption system cannot simply guarantee that multiple parties must and uniquely participate in the encryption process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for multi-way encryption and signing and zero knowledge certification
  • Method for multi-way encryption and signing and zero knowledge certification
  • Method for multi-way encryption and signing and zero knowledge certification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] An implementation process is given here, but it does not mean that the solution of this application can only be implemented in this way. The ".eq." here means equality discrimination. The implementation process is as follows:

[0045] The process of generating a private key is as follows figure 1 Shown: Step 101, producing a large prime number a so that it satisfies p=2a+1 is also a prime number; Step 102, producing a large prime number b so that it satisfies q=2b+1 is also a prime number; Step 103, calculating n=pq and the Euler function t=4ab; 104 steps, randomly generate k-1 different random odd numbers x large enough i , so that x i meet x i %a > 0 and x i %b > 0; 105 steps, find a sufficiently large odd number x k , such that x k meet x k %a > 0 and x k %b>0 and (∏x i )%t=1(0i )(0

[0046] In the above steps, the three steps 101, 102, and 105 can all adopt the method similar to the RSA system, which will not be repeated here, and other methods can ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for multi-way encryption, signing and zero knowledge certification. Large prime number a, b, p and q are chosen, p=2a+1 and q=2b+1, n=pq, and t=4ab; k large odd numbers xk are found, the requirements that (pi xi) %t=1 (0<i<=k) and xi, a and b are relatively prime respectively; each participant i possesses (xi, n) which serves as a private key, namely, a multi-way encryption system is formed; when I sends a plaintext M to J, after I conducts power modular arithmetic encryption on the plaintext M through a private key of I, a result is sent to other participants in the system so that the private key of the participant is used as the only one iteration encryption until J encodes the plaintext through a private key of J. When signing is conducted in a group, each participant adds self signing to the plaintext behind the signing of other participant for checking. In the condition of zero knowledge certification, a decoded ciphertext is compared with the plaintext so that verification is conducted without leakage of information. The method has the advantage that each participant participates in a iteration encryption process for only once.

Description

technical field [0001] The present application relates to a method for encryption, signature, and zero-knowledge proof in the field of information security, and in particular to a method for multi-party simultaneous participation and collaborative encryption, signature, zero-knowledge proof, and establishment of communication within a trusted group. Background technique [0002] The current asymmetric encryption systems such as RSA can only handle one-way message transmission between the two, and it is more complicated when dealing with multi-party participation in encryption, signature and zero-knowledge proof. Generally, the common public key is used. Or the way of private key, but the exchange process of public key and private key is very complicated, and the distribution process is more complicated when there is no trusted channel. lead to a common mode attack. In order to realize multi-party zero-knowledge proof, the conventional method uses a probability-based bit pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06
Inventor 不公告发明人
Owner 彭艳兵
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products