Identity-based aggregate signature method with parallel key-insulation

A technology of keys and identities, applied in the field of aggregated signatures, can solve problems such as assisting key threats to system security

Inactive Publication Date: 2013-11-27
QINGDAO UNIV
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the disclosure of the facilitator key al

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based aggregate signature method with parallel key-insulation
  • Identity-based aggregate signature method with parallel key-insulation
  • Identity-based aggregate signature method with parallel key-insulation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The invention provides an identity-based aggregation signature method with parallel key isolation, is the set of n users participating in the aggregated signature method, is a collection of n different messages, each user P i (1≤i≤n) choose different messages m i (1≤i≤n) to sign to get σ i , and put the generated signature σ i Sent to the aggregator, the aggregator can perform an aggregation operation on the received n independent signatures, and the verifier verifies the aggregate signature to make sure whether the generated aggregate signature comes from the specified n users.

[0077] The aggregated signature method further includes:

[0078] In the first step, the system parameter param generation step of the identity-based aggregate signature system with parallel key isolation;

[0079] The second step is the key generation step;

[0080] The third step is the key update step of the facilitator;

[0081] The fourth step is the user key update step;

[008...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an identity-based aggregate signature method with parallel key-insulation. According to the identity-based aggregate signature method with parallel key-insulation, a set of n users who participate in the aggregate signature method is a set of n different messages, each user Pi (1<=i<=n) selects a message mi (1<=i<=n) which is different from others to conduct signature so that sigmai can be obtained, each generated signature sigmai is sent to an aggregation side, the aggregation side can conduct aggregation operation on the n relieved independent signatures, and a verification side verifies the aggregate signatures and determines whether the aggregate signatures come from the n designated users; at the same time, a key of each user is updated periodically, two assisting devices alternatively help the users to update the keys in each time period, and leakage of the keys of the users in one time period cannot influence the safety of a system in other time periods. The identity-based aggregate signature method with parallel key-insulation integrates the advantages of the parallel key-insulation mechanism and the advantages of an identity-based aggregate signature, the signature verification efficiency is improved, and the safety of the whole system is guaranteed.

Description

technical field [0001] The invention relates to the field of data authentication of group communication in network communication, in particular to an identity-based aggregation signature method that can efficiently verify multiple signatures and mitigate key leakage hazards. Background technique [0002] In reality, multiple signatures are required to be verified in a short period of time in many applications, especially for energy-constrained wireless mobile communication environments. For example, in a mail server, in order to reduce the processing time for the server to verify mail signatures, a fast verification method is required to verify a large number of signatures in a very short time. To deal with such problems, Boneh et al. proposed the concept of aggregated signatures, that is, the signatures of multiple users on different messages are aggregated into one signature, and the verifier only needs to verify the synthesized signature to be sure whether the signature c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 于佳郝蓉
Owner QINGDAO UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products