Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attribute-based network ring signing method for distributed authorization

A distributed, ring signature technology, applied in user identity/authority verification and key distribution, can solve problems such as increasing the communication cost between the attribute authority AA and the user, attribute key escrow, and anonymity degradation.

Active Publication Date: 2017-11-10
刁伟强
View PDF3 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method embeds user identity information directly into the attribute key, although it can ensure that the signature cannot be generated by collusion of multiple users, but the anonymity of the method is degraded due to the introduction of identity information.
In addition, since the use of a single attribute authority is responsible for the distribution and management of all attribute keys in the system, as long as the attribute authority is compromised by the attacker, the attacker can use the key of the attribute authority to generate the attribute key of any user in the system. Therefore, this approach also suffers from property key escrow issues
[0004] Li et al. "Li J, Chen XF, Huang XY. New attribute-based authentication and its application in anonymous cloud access service [J]. Journal on International Journal of Web and Grid Services, 2015, 11(1): 125-141." Reference Chase et al. "Chase M, Chow S. Improving privacy and security in multi-authority attribute-based encryption [A], In Proceedings of the 16th ACM Conference on Computer and Communications Security [C], 2009: 121-130." The key anonymous distribution protocol improves the existing attribute-based ring signature method, but the introduction of the key anonymous distribution protocol causes the attribute authority AA to generate user attribute keys in the key distribution stage. t 2 key to ensure the security of the scheme, where t is the number of attribute authority AA in the attribute authority set
This undoubtedly reduces the work efficiency of the attribute authority AA and increases the communication cost between the attribute authority AA and the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-based network ring signing method for distributed authorization
  • Attribute-based network ring signing method for distributed authorization
  • Attribute-based network ring signing method for distributed authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0072] A specific embodiment of the present invention is a distributed authorization attribute-based network ring signature method, the steps of which are:

[0073] A. Parameter generation

[0074] A1. Establishment of attribute set

[0075] The system establishes attribute collection space W, W={W 1 ,...,W k ,...,W K},in is the kth attribute subset of the attribute set space W, and K is the total number of attribute subsets in the attribute set space W; w i,k is the kth attribute subset W k The i-th attribute in |W k | is the kth attribute subset W k The total number of attributes in;

[0076] A2. Generation of system public key and private key

[0077] System setting P≥K distributed attribute authority AA p , where p is the attribute authority AA p serial number, p={1,2,...,P}; construct q factorial method cyclic group G and q factorial method cyclic group Y, q is greater than 2 512 and there is a bilinear mapping relationship y=e(g a , g b ); among them, e(g ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute-based network ring signing method for distributed authorization and belongs to the field of information security. The method comprises the steps of in an initialization phase, removing a credible system centre through utilization of a distributed key negotiation protocol, dispersing key management authority of an attribute authorization mechanism, and solving an attribute key trusteeship problem; in a key distribution phase, embedding a user identity into the attribute key and determining that through utilization of the method, a collusion attack can be resisted; and in a signature generation phase, introducing a user identity fuzzy factor, thereby enabling the method to have unconditional high anonymity. The method is high in anonymity and high in security; and anonymous identity authentication and access control function can be effectively carried out on cloud computing and electronic medical networks.

Description

technical field [0001] The invention relates to a distributed authorization network anonymous identity authentication and signature method for access. Background technique [0002] With the vigorous development of big data applications such as electronic medical care and cloud computing, data authentication and privacy protection have become very realistic and urgently needed to be solved. Attribute-based (attribute-based) ring signatures have no group organization process in the signing process, do not require the participation of group administrators, facilitate the concealment of signer privacy, and can provide stronger anonymity protection than ordinary attribute-based signatures, so they are especially suitable for implementing Anonymous identity authentication and access control functions in networks with high anonymity requirements such as cloud computing and electronic medical care. The analysis shows that the existing attribute-based (attribute-based) ring signatur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3247H04L63/0421H04L63/062H04L63/0876H04L63/10
Inventor 张文芳刘旭东王小敏
Owner 刁伟强
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More