Partially blind signature method based on identity

A partial blindness and identity technology, applied in the field of information security, can solve the problems of poor practicability and high computational complexity, and achieve the effect of eliminating the need for certificates

Inactive Publication Date: 2015-02-04
XIDIAN UNIV
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In recent years, although identity-based partial blind signature schemes have been proposed one after another, most of them have disadvantages

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Partially blind signature method based on identity
  • Partially blind signature method based on identity
  • Partially blind signature method based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0031] The embodiment of the present invention provides an identity-based partial blind signature method, such as figure 1 As shown, the method includes the following steps:

[0032] S1. The private key generation center PKG establishes a public system parameter

[0033] PKG (Private Key Generator, private key generation center) can generate public system parameters {G 1 ,q,l,P,G 2 , e, H 1 , H 2 , H 3 , Q PKG}:

[0034] S1a. According to safety requir...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a partially blind signature method based on identity and relates to the technical field of information security. The partially blind signature method based on identity is capable of reducing the calculation complexity and improving the execution efficiency. The method comprises the following steps: public system parameters {G1, q, 1, P, G2, e, H1, H2, H3, QPKG} are established by PSK and an integer sPKG is randomly selected as a private key for secret storage from the integral multiplicative group as shown in the description of mod q; a signer sends own identity information as shown in the description to a private key generation center, the private key generation center generates the private key Did of the signer and sends the private key Did to the signer via a security authentication channel, and then the signal obtains the private key Sid and confirms that the private key is generated by the private key generation center; next, the signer signs; a verifier verifies the validity of the signature by use of the public key of the signer. The partially blind signature method based on identity can be applied to electronic cash, electronic voting and electron transactions.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity-based partial blind signature method. Background technique [0002] As one of the means to ensure network information security, digital signature can effectively solve the problems of forgery, repudiation, impersonation and tampering in network information transmission, and is one of the core technologies in cryptography to protect data authentication, integrity and non-repudiation. A digital signature is some data attached to a data unit, which electronically signs the data information to confirm the sender of the message, thereby ensuring the security of the message. Digital signature technology has important application value in the fields of key distribution, electronic banking, electronic government bonds, electronic commerce and electronic government affairs. [0003] In 1976, Diiffer and Hellman proposed the public key cryptosystem, and on this ba...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 刘景伟孙蓉燕婷婷张旭彬
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products