Sanitizable agent signature method in standard model

A proxy signature, standard model technology, used in electrical components, user identity/authority verification, transmission systems, etc.

Inactive Publication Date: 2013-10-16
CHANGAN UNIV
View PDF1 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to overcome the shortcomings of the above-mentioned prior art and provide a purifiable proxy signature method under the standard model, which

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Sanitizable agent signature method in standard model
  • Sanitizable agent signature method in standard model
  • Sanitizable agent signature method in standard model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] A purifiable proxy signature method of the present invention under the standard model, the method is implemented according to the following steps:

[0044] Step 1. System Setup

[0045] 1) Let user ID, authorization certificate W and message M be a bit string of length n, where n is a natural number;

[0046] 2) Select prime number q order cyclic group G 1 ,G 2 , g∈G 1 , the bilinear map is e:G 1 ×G 1 →G 2 ;

[0047] 3) PKG randomly selected calculate g 1 =g a ∈ G 1 .

[0048] 4) Randomly select u′∈Z q , v′∈G 1 , w′∈G, random number u i ,m j ,w k ∈ G 1 . n-dimensional vector U=(u i ), V=(v j ),W=(w k ). Then the public parameters of the system are params=(G 1 ,G 2 ,e,q,g,g 1 , g 2 ,u′,v′,w′,U,V,W), the master key is .

[0049] Step 2. Generic User Key Generation

[0050] 1) Assume that the user ID is a bit string ID of length n 1 ,...ID n . is the set of sequence number i with ID[i]=1;

[0051] 2) PKG randomly selected and calculate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a sanitizable agent signature method in a standard model. According to the utility model, agent authorization based on identity is performed first. Agent signature is signed after the agent authorization. Then, the agent signature is sanitized. A receiver receives and verifies the sanitized signature. The sanitized signature is accepted if validation passes or rejected if validation fails. The invention provides the sanitizable agent signature method in the standard model and based on CDH (Computational Diffie Hellman) problems and can guarantee the reliability and safety of the agent signature.

Description

technical field [0001] The invention belongs to the technical field of computer information security, and relates to a proxy signature method, in particular to a purifiable proxy signature method under a standard model. Background technique [0002] In the traditional way, the authentication of a document is realized through the personal signature or seal of the written document, but in the network environment, it is signed through the digital signature. However, with the development of the Internet, traditional digital signatures can no longer meet the more complex application environment in today's society. [0003] In real life, people sometimes delegate their signature rights to reliable people who sign documents on their behalf. For example, if a board of directors wants to reach an agreement, it must be signed by every participating director to be effective. It happens that one of the directors cannot sign in person due to business trips, so he must entrust a reliable...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 明洋周俊李瑞
Owner CHANGAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products