Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Elliptic curve-based forward security member-revocable certificateless group signature scheme

An elliptic curve, forward security technology, applied in the field of information security, can solve the problems of key and certificate leakage, administrator storage pressure, affecting efficiency, etc., to reduce key leakage, improve efficiency and stability, and achieve high security. sexual effect

Active Publication Date: 2015-07-15
BEIHANG UNIV
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there are still many deficiencies in ACJT. First, the scheme is based on the difficulty of discrete logarithms in finite fields. The operations are modular multiplication, modular exponentiation, and inverse operations on finite fields. The number of operations is large, the calculation is complicated, and the communication volume large, resulting in low efficiency; secondly, in the scheme, there are more information exchanged between group members and administrators during the member joining process, and the algorithm is cumbersome, which affects efficiency and makes the administrator’s storage pressure greater; the whole scheme does not have the function of system update, and keys will appear , certificates and other leaks; and the scheme does not have the function of member revocation. In order to be more practical, the group signature should meet the needs of group members to freely join and withdraw from the group, but the scheme does not have this

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Elliptic curve-based forward security member-revocable certificateless group signature scheme
  • Elliptic curve-based forward security member-revocable certificateless group signature scheme
  • Elliptic curve-based forward security member-revocable certificateless group signature scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0059] The present invention is a member-revocable non-certificate group signature scheme based on elliptic curve forward security. The combination of signatures improves the efficiency and stability of the scheme; the scheme has forward security, which enables the system information to be updated over time, reducing the harm caused by key leakage; at the same time, it realizes the revocation function of members, which is more in line with actual needs , making up for the defects in similar schemes.

[0060] Such as figure 1 , figure 2 Shown, the specific implementation steps of the present invention are as follows:

[0061] Step 1: In the system initialization stage, select the finite field F q An elliptic curve y on 2 =x 3 +ax+b, where a,b∈F q And satisfy △=4a 3 +27b 2 ≠0. P∈E(F q ) is the generator of the elliptic curve, its orde...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an elliptic curve-based forward security member-revocable certificateless group signature scheme, and belongs to the field of information security. The scheme mainly comprises the following six steps: system initialization algorithm, key generation algorithm, key pick-up algorithm, member joining algorithm, signature algorithm and verification algorithm. According to the scheme, the group signature is based on the elliptic curve cryptosystem, and the shorter key is used for realizing higher security; in the scheme, the certificateless system is combined with the group signature, and the key generation center is introduced to reduce the memory stress of a group administrator, so as to share the risk and improve the system stability; the scheme possesses the forward security, and the system time is sliced, so that the member information is updated according to the time, the hazard due to key reveal is reduced, and the system is better in security; the group signature algorithm designed by the scheme can realize the member revocation process, is fit for the practical application, and makes up the defects in the schemes of the same kind.

Description

technical field [0001] The invention relates to a digital signature scheme applicable to electronic commerce and electronic government affairs, and belongs to the field of information security. Background technique [0002] As one of the core technologies in the field of information security, digital signature technology can provide security functions such as authentication, integrity, and non-repudiation. Due to its special properties, digital signatures are widely used in e-commerce and e-government affairs. With the continuous deepening of digital signature research and the rapid development of e-commerce, digital signatures with special functions have become a hot research topic at present. [0003] In 1991, Chaum and Heyst first proposed the concept of group signatures. In group signatures, group members can generate valid signatures in the name of the group, and the group signatures can be publicly verified. Since the first group signature scheme was proposed, scholars...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08G06F21/64
Inventor 张筱郭炳晖姜鑫郑志明梁艳
Owner BEIHANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products