Agent re-assignment verifier signature method

A designation verifier and re-signature technology, applied in the field of information security, can solve the problem of the absence of a designated verifier signature, etc.

Inactive Publication Date: 2016-04-06
SUN YAT SEN UNIV
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The purpose of the present invention is to provide a proxy re-designated verifier signature method to solve the problem that there is no designated verifier signature suitable for cloud environment in the background technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent re-assignment verifier signature method
  • Agent re-assignment verifier signature method
  • Agent re-assignment verifier signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] 1. The cloud storage platform runs the setting algorithm, and the steps to generate system parameters shared by all parties include:

[0061] 1)选择PBC软件库附带提供的A类型参数,其中素数阶q的取值为8780710799663312522437781984754049815806883199414208211028653399266475630880222957078625179422662221423155858769582317459277713367317481324925129998224791,生成元g是群G中的随机元素,对运算由PBC库所提供的“pairing”运算提供。

[0062] 2) Select the method disclosed by Tian et al. in the appendix of the ACISP2012 paper "Ashortnon-delegatablestrongdesignatedverifiersignature" to set the symmetric encryption and decryption operations in which both the plaintext space and the ciphertext space are in the group;

[0063] 3) Select the SHA-256 algorithm as the hash function, set H 1 The initial message of the function is "functionone", H 2 The initial message of the function is "functiontwo", H 3 The initial message of the function is "functionthree", and all involved group elements are input into the hash function as strings of 0 and...

Embodiment 2

[0098] Embodiment 2 is the same as Embodiment 1, except that the system parameters adopt other effective bilinear pairing mappings, such as other types of parameters in the PBC library.

Embodiment 3

[0100] Embodiment 3 is the same as Embodiment 1, except that other effective hash functions, such as SHA384, are adopted for the system parameters.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an agent re-assignment verifier signature method, comprising the steps of: a service provider operating a setting algorithm to generate public system parameters for all sides; a content provider and a content consumption side operating a key generation algorithm to generate a self key pair; the content provider using a self private key to perform a first level digital signature on contents, and uploading first level digital signature values and contents to the service provider; the content consumption side exchanging contents with the content provider, and the content provider generating a resign key and uploading key information to the service provider; the content consumption side requiring the service provider to provide assigned contents, the service provider generating a second level digital signature, and providing the assigned contents and the second level digital signature for the content consumption side; the content consumption side using the public key provided by the content provider to verify the second level digital signature; and the content consumption side using a self key to independently generate a verifiable second level digit signature about the obtained contents.

Description

technical field [0001] The invention relates to the field of information security, in particular to a signature method for proxy redesignation of a verifier. Background technique [0002] Jakobsson introduced the concept of designated verifier signatures in 1996. In addition to the general signature algorithm and verification algorithm, the specified verifier signature also includes a simulation algorithm. The designated verifier can simulate a digital signature through the simulation algorithm, and the simulated digital signature can also be verified by the verification algorithm. This means that except for the designated verifier, even if any other entity can verify a digital signature through the verification algorithm, it cannot confirm that the digital signature is generated by the signer or the designated verifier. [0003] In the field of copyright protection, software publishers can sign the signature of a designated verifier for each software buyer, so that the bu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/062H04L63/0869H04L63/0884
Inventor 田海博马宇峰吴迪
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products