A Traceable Attribute Signature Method Without Trusted Center

A traceable and attribute technology, applied in the field of information confidentiality or secure communication, can solve the problems of lack of malicious user accountability mechanism, high authority of attribute authentication center, and meet the requirements of public verification, security risk reduction, and authority reduction. Effect

Active Publication Date: 2019-03-05
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is that the authority of the attribute authentication center in the attribute-based signature mechanism is too high, and the lack of accountability mechanism for malicious users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Traceable Attribute Signature Method Without Trusted Center
  • A Traceable Attribute Signature Method Without Trusted Center
  • A Traceable Attribute Signature Method Without Trusted Center

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The specific implementation of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0032] Such as figure 1 As shown, the present invention proposes a system that can implement a traceable attribute signature method without a trusted center, which is composed of five functional entities: an attribute authentication center, a data server, a signer, a receiver, and a signature tracker. Among them, the attribute authentication center is responsible for managing the user's attributes, and generating and distributing part of the user's initial private key. The signer and receiver are the two parties of the communication. After receiving the initial private key, the signer adds the privacy value he chooses to generate his own signature private key. After that, a file is signed and sent to the receiver through the data server. The receiver verifies the validity of the signature through the system public parameters....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traceable attribute signature method without a trusted center. The method comprises initialization, signature key generation, signature generation, signature authentication and signature tracing. The system comprises five modules including an attribute authentication center, a data server, a signer, a receiver and a signature tracer. The attribute authentication center takes charge of managing the attribute of a user, and generating and distributing part of initial private keys of the user. The signer generates own signature private key for signing a file, and transmits the signature private key to the receiver via the data server. The receiver verifies the validity of the signature via public parameters of the system. The signature tracer provides identity registration for the signer in the system, and responds to a signature tracing request of the receiver when necessary. Since the authority of the attribute authentication center is weakened, even if the system is attacked, the security risk of the signature mechanism is greatly reduced. By introducing a signature accountability mechanism, when a malicious user in the system spreads invalid information, the identity of the publisher can be accurately positioned and accountability can be given.

Description

technical field [0001] The invention relates to the field of confidential or safe communication of information, including a technology for checking the identity of a system user, in particular to a traceable attribute signature method without a trusted center. Background technique [0002] The attribute-based signature system has been widely used in recent years. The principle is that the signer claims that the signature corresponds to a set of specific attributes, and the verifier verifies this. Its advantages are intuition and flexibility, fine-grained division of identity features, and good anonymity, while meeting the requirements of distributed network systems. However, this mechanism still has security risks. In the traditional attribute-based cryptographic mechanism, the attribute authentication center is completely trusted, is responsible for generating the private keys of all users, and has top-level authority. However, in the actual network environment, the attrib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0825H04L9/083H04L9/3247
Inventor 孙知信洪汉舒宫婧邰淳亮陈梓洋
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products