Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multivariable-based proxy re-signature method capable of resisting conspiracy attacks

A collusion attack and re-signature technology, applied in the field of information security, can solve the problems of collusion attack private key information leakage and so on

Inactive Publication Date: 2016-12-07
SHAANXI NORMAL UNIV
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Sun Changyi, Li Yifa, Si Xueming. Proxy re-signature scheme based on multivariable public key cryptosystem [J]. Computer Engineering, 2012, 38(17): 116-118. For the first time, a rainbow scheme based on multivariable system was proposed A proxy re-signature scheme, but unfortunately, as stated in Section 3.3 of the text, this scheme cannot resist collusion attacks "...the agent and the trustee conspire...the private key information of the principal will be leaked..."

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multivariable-based proxy re-signature method capable of resisting conspiracy attacks
  • Multivariable-based proxy re-signature method capable of resisting conspiracy attacks
  • Multivariable-based proxy re-signature method capable of resisting conspiracy attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0101] Taking n=2 in the quadratic equation system, that is, the number of independent variables and the number of equations are both 2 as an example, the steps of the proxy re-signature method based on multivariable collusion attack resistance are as follows:

[0102] (1) Generation system

[0103] Select system parameters: take a finite field F 5 , that is, the field elements are {0, 1, 2, 3, 4}, and the operation is modulo 5 addition and modulo 5 multiplication. The inverse of an element o refers to an element that satisfies multiplication with o and then modulo 5 is 1. Record for o -1 , that is, at F 5 On: -5=0mod5, -4=1mod 5, -3=2mod 5, -2=3mod 5, -1=4mod5, 1 -1 =1,2 -1 =3,3 -1 =2,4 -1 =4; take n=2, that is, the number of independent variables and equations are both 2; take a 111 =0,a 112 = 1,a 122 =0,b 11 =0,b 12 =0,c 1 = 0; a 211 =0,a 212 =0,a 222 =0,b 21 =1,b 22 =0,c 2 =0, then the quadratic equation system Q is:

[0104]

[0105] The inverse Q of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A multivariable-based proxy re-signature method capable of resisting conspiracy attacks comprises the steps of system generation, key generation, re-signature key generation, trustee A signature generation, agent re-signature generation, and re-signature correctness verification. As two random keys (H<*>A and H<*>B) used by a trustee A and a trustee B in proxy re-signature are generated by adopting a trusted third party, and are used for generating new re-signature keys respectively, an agent converts a signature of the trustee A to a certain message into a signature of the trustee B to the same message by using the corresponding new re-signature key, and the confidentiality of the random keys is high, whether the trustee B and the agent or the trustee A and the agent cannot conspire to acquire the private key of the other trustee, that is, the conspiracy attacks can be resisted effectively. The multivariable-based proxy re-signature method is high in efficiency, safe, reliable, and capable of resisting the conspiracy attacks of the trustee A and the agent or the agent and the trustee B, and can be used in proxy re-signature.

Description

technical field [0001] The invention belongs to the technical field of information security, relates to a multi-variable public key system and proxy authentication of messages, and in particular to a multi-variable proxy re-signature method which can resist collusion attacks. Background technique [0002] Proxy re-signature means that a semi-trusted agent (who has a re-signature key related to the information of trustee A and trustee B) is responsible for converting trustee A's signature on a message into trustee B's signature The signature of the same message, meanwhile, requires the agent to only have the re-signature key, and cannot learn the private keys of trustee A and trustee B, and cannot generate new signatures on behalf of trustee B or trustee A. [0003] The security of proxy re-signature is divided into internal security and external security. External Security: Illegal third parties cannot collude with signing parties. Internal security: the principal B and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L9/00
CPCH04L9/002H04L9/0869H04L9/3249
Inventor 王鑫杨波
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products