Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Obfuscation Method for Encrypted Group Signature

A technology of group signature and signature key, applied in the fields of cryptography, group signature and confusion theory

Active Publication Date: 2018-02-09
TONGJI UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

A typical white-box attack environment is, for example: a computer that has been compromised and obtained administrator privileges, a mobile agent running on a malicious host, a stolen tablet or smart phone, etc. (at this time, for professional hackers , breaking access passwords or graphic passwords is not difficult), in addition, the SSL Heartbleed vulnerability exposed in 2014 can allow attackers to remotely obtain certain memory segments on the server, and if the signature key is stored in it, the consequences are equally serious

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Obfuscation Method for Encrypted Group Signature
  • An Obfuscation Method for Encrypted Group Signature
  • An Obfuscation Method for Encrypted Group Signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0084] Such as figure 1 As shown in , an obfuscation method for encrypting group signatures, which is used to protect the signature private keys of members in the group, includes the following steps:

[0085] 1) The group owner builds a signature group, and after determining the administrator, obtains the group parameter sequence pub, the master private key MK and the tracking key TK according to the setup algorithm, sets the signature message length to m bits according to the setup algorithm, and the group members Quantity does not exceed 2 k When , the calculated expression of group parameter sequence pub, master private key MK and tracking key TK is:

[0086]

[0087] PP=(g,h,u,v',v 1 ,...,v m ,Ω,A)

[0088] MK=(g α ,ω)∈G×Z n

[0089]

[0090] n=p·q

[0091]

[0092] Ω=g ω

[0093] And meet the constraints: the size of k is linear with λ, and there is a positive integer c 1 and c 2 , with c 1 ×λ≤log 2 p≤c 2 ×λ and c 1 ×λ≤log 2 q≤c 2 ×λ holds,

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an obfuscation method for encrypting group signatures, which is used to protect the signature private keys of members in the group. Secret key TK; 2) Information receivers obtain their own encrypted public key PKe and decrypted private key SKe through the EKGen algorithm according to the group parameter sequence pub; 3) The group owner obtains the signature tracking information sID of the members in the group and their respective IDs through the Enroll algorithm Corresponding signature key KID, and send the signature key KID to the corresponding group members; 4) Obfuscate the initial encrypted group signature algorithm EGS of the group members and the signature key KID of the group members according to the obfuscation algorithm Obf , to obtain the encrypted group signature algorithm after obfuscation; 5) Encrypt the message M to be sent with information signature encryption to generate encrypted ciphertext C, and send encrypted ciphertext C to the information receiver. Compared with the prior art, the present invention has the advantages of being suitable for protecting private keys, having good secrecy effect and the like.

Description

technical field [0001] The invention relates to the fields of cryptography, group signatures and confusion theory, in particular to a method for confusing encryption group signatures. Background technique [0002] Group signature is a special digital signature designed for a group of members, originally proposed by Cham and Heyst. In a group signature, there is a group manager and many members. Each group has a group public key for authentication. Each group member has an independent private key to generate a group signature, and its signature can be detected by the group public key. Group managers have a master key. Assuming a signature, the group administrator can use the master key to know which group member generated the signature. This is traceability. In addition, other group members without the master key cannot know which group member generated the signature, which is called anonymity. In fact, group signatures have the following four properties: 1) only group ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 史扬韩景轩汪舒培邓志杰
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products