Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy re-signature method based on ip signature

A re-signature and manager technology, which is applied to user identity/authority verification and key distribution, can solve problems such as poor anti-quantum attack

Inactive Publication Date: 2019-09-24
NORTHWESTERN POLYTECHNICAL UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to overcome the shortcomings of the existing proxy re-signature method with poor anti-quantum attack, the present invention provides a proxy re-signature method based on IP signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy re-signature method based on ip signature
  • Proxy re-signature method based on ip signature
  • Proxy re-signature method based on ip signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] The comparison table of the meanings of variables and operation symbols in the specific embodiment.

[0068]

[0069] In this embodiment, based on the proxy re-signature method of IP signature, Alice is selected as the trustee, that is, the original signer; Bob is the delegator, that is, the owner of the converted signature. Specific steps are as follows:

[0070] Step 1: Generate system parameters.

[0071] The system administrator chooses order 2 p The finite field K of , p is a positive integer selected by the system administrator. The system administrator chooses three positive integers n, u and q;

[0072] The system administrator chooses a collision-resistant hash function H(x):{0,1} in cryptography * →{0,1} q ;

[0073] The system administrator chooses a system Q of quadratic polynomial equations Q with n variables, which is of the form:

[0074]

[0075] The system administrator publishes the system-generated parameters (n, u, q, K, Q, H(x)).

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy re-signature method based on IP signature for solving the technical problem of poor quantum aggression defense of the existing proxy re-signature method. The technical scheme is as follows: performing secret affine transformation on private keys of a trustee and a client to construct a re-signature key, designing a proxy re-signature and a verification process of the proxy re-signature based on a polynomial isomorphism (IP) problem, and thus the quantum aggression defense of the proxy re-signature method is ensured; and in addition, the affine transformation of a quadratic multivariable polynomial group mainly executes multiplication, so the amount of computation is small, and the proxy re-signature method has relatively high computation efficiency.

Description

technical field [0001] The invention relates to a proxy re-signature method, in particular to a proxy re-signature method based on IP (Isomorphisms of Polynomials, polynomial isomorphism) signature. Background technique [0002] With the continuous development of computer science and technology, digital signature technology also develops rapidly. Many signature types with different functions have been proposed, such as proxy signature, group signature, multi-signature, etc. In recent years, proxy re-signature has also become an emerging research direction in this field. Proxy re-signature technology requires a semi-trusted proxy with a re-signature key, which can convert the trustee's signature for a certain message into the delegator's signature for the same message. Proxy re-signature has a good application prospect in specific path traversal proof, transparent authentication, management group signature, and digital certificate sharing and conversion. [0003] In 2007, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 李慧贤邵璐韩智鹏庞辽军
Owner NORTHWESTERN POLYTECHNICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products