Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encrypted blind signature method based on obfuscation technology

A technology of blind signature and technology, applied in the field of cryptography, can solve the problems that cannot meet the actual application requirements, low efficiency, key leakage, etc., and achieve the effect of reducing data volume, improving execution efficiency, and improving security

Active Publication Date: 2017-08-18
XIDIAN UNIV
View PDF5 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the encrypted signature algorithm after obfuscation uses bilinear mapping in the signature verification process, which is not efficient and cannot meet the actual application requirements.
The disadvantages of this method are: because the manager may obtain the keys of other members in the group together with the members in the group, resulting in the problem of key leakage, and the receiver needs to encrypt multiple groups of ciphertexts of the members in the group, The amount of data that needs to be encrypted is too large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted blind signature method based on obfuscation technology
  • Encrypted blind signature method based on obfuscation technology
  • Encrypted blind signature method based on obfuscation technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Attached below figure 1 The present invention will be further described.

[0041] Step 1. Generate public parameters of the cryptographic system.

[0042] Randomly choose two independent large prime numbers p and q, where p and q are both greater than 2. λ ,λ represents the cryptographic system parameters determined by the key generation center, λ≤2 64 .

[0043] The key generation center uses a large prime q as the order to construct an additive cyclic group and a multiplicative cyclic group respectively.

[0044] The key generation center maps the additive cyclic group to the multiplicative cyclic group to obtain a bilinear mapping.

[0045] The key generation center randomly selects a generator from the additive cyclic group.

[0046] The key generation center publishes the public parameters generated above to the signer and receiver.

[0047] The public parameters are:

[0048] params=(p,q,G,G T ,e,g)

[0049] Among them, params represents public parameters, G represents additi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an encrypted blind signature method based on an obfuscation technology. The method comprises the specific realization steps of 1, generating cipher system public parameters; 2, generating a signature key pair and an encryption key pair; 3, obfuscating signature keys; 4, generating a ciphertext; 5, re-randomizing the ciphertext; 6, decrypting an encrypted blind signature; 7, judging whether the blind signature satisfies a blind signature matching condition or not; 8, confirming that the blind signature is valid by a user; and 9, logging out a cipher system. According to the method, the obfuscation technology is adopted, a signer obfuscates the keys, so the signature keys of the signer are effectively protected, and the security of the encrypted blind signature is improved. According to the method, the ciphertext is re-randomized by a receiver, so the data volume processed by the receiver is greatly reduced. According to the method, the blind signature matching condition is simple, so the performance efficiency of judging the validity of the blind signature is greatly improved.

Description

Technical field [0001] The invention belongs to the field of cryptography, and further relates to an encryption blind signature method based on obfuscation technology in the technical field of blind signature and password obfuscation. The present invention is based on blind signature and linear encryption, and proposes an encrypted blind signature method based on obfuscation technology, that is, an encrypted blind signature method that hides the interactive process of blind signature. The present invention can be used in Web mail services, while protecting the privacy and safety of both parties in communication, the blind signature can be entrusted to the Web mail provider. Background technique [0002] Blind signature is a special digital signature. The difference between it and ordinary digital signature is that the signer signs the message provided by the user without knowing the content of the signed message. Even if the signer gets the signature in the future, he cannot Lin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3257
Inventor 何宇帆李磊班学华王通
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products