Key isolation signing method based on attribute

An attribute and key technology, which is applied to the public key and key distribution of secure communication, can solve the problems of increasing terminal computing overhead and lack of protection measures for key leakage

Active Publication Date: 2016-10-12
NANJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to solve the problems existing in the prior art, such as th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key isolation signing method based on attribute
  • Key isolation signing method based on attribute
  • Key isolation signing method based on attribute

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The specific embodiment of the present invention will be further described in detail in conjunction with the accompanying drawings.

[0035] The present invention discloses an attribute-based key isolation signature method, and the entire signature system is divided into several independent time segments, such as figure 1 shown. Whenever the system enters a new time segment, the key assister generates a private key update segment, and the user updates the private key. For a file, the user signs with the private key corresponding to the current time segment, and the verification result of the signature also corresponds to a certain time segment of the system. If the user's private key is leaked in a certain time segment, the system can still maintain forward security and backward security in other time segments, minimizing the harm of private key leakage.

[0036] In the process of signing, no bilinear pairing operation is required, which reduces the calculation overhe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key isolation signing method based on attribute, which aims at problems of lack of protective measures for key leakage and increase of computation overhead of a terminal caused by bilinear pairing operation in the prior art. A whole signing system is divided into several independent time slices, when the system enters into a new time slice, a key helper generates a private key updating slice, and a user updates a private key. For a certain file, the user signs with the private key corresponding to the current time slice, and verification result of a signature is also corresponding to a certain time slice of the system. If the private key of the user is leaked within a certain time slice, the system also can keep forward security and backward security in other time slices, and thus, harm of private key leakage is minimized. In a process of signing, any operation of bilinear pairing is not required, and computation overhead of a user terminal is reduced. When system time slices evolve, system public parameters are not required to be updated again, and communication overhead caused by synchronization of the public parameters is reduced.

Description

technical field [0001] The invention relates to a secret or safe communication technology for digital information transmission, in particular to an attribute-based key isolation signature method. Background technique [0002] Attribute-based cryptography is an important part of information security. At the same time, attribute-based signature schemes have been widely used in recent years. In the attribute-based signature system, the user's private key corresponds to an attribute structure, and the signature generated by a legitimate user with the corresponding private key can be verified into the corresponding attribute structure owned by him. However, there are still two problems to be solved in the current attribute signature mechanism: first, when a user's attribute private key is leaked, any user who obtains the private key can use the private key to generate a legal signature, thereby bringing There are a series of security risks. Second, most of the current attribute...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L9/30
CPCH04L9/0825H04L9/0847H04L9/0861H04L9/3073
Inventor 孙知信徐睿洪汉舒李冬军陈梓洋邰淳亮
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products