Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Distributed Authorized Attribute-Based Network Ring Signature Method

A distributed and ring signature technology, applied in user identity/authority verification and key distribution, can solve the problems of anonymity degradation, reduce the work efficiency of attribute authority AA, increase the communication cost between attribute authority AA and users, etc.

Active Publication Date: 2020-03-13
广州珠航校车服务有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method embeds user identity information directly into the attribute key, although it can ensure that the signature cannot be generated by collusion of multiple users, but the anonymity of the method is degraded due to the introduction of identity information.
In addition, since the use of a single attribute authority is responsible for the distribution and management of all attribute keys in the system, as long as the attribute authority is compromised by the attacker, the attacker can use the key of the attribute authority to generate the attribute key of any user in the system. Therefore, this approach also suffers from property key escrow issues
[0004] Li et al. "Li J, Chen XF, Huang XY. New attribute-based authentication and its application in anonymous cloud access service [J]. Journal on International Journal of Web and Grid Services, 2015, 11(1): 125-141." Reference Chase et al. "Chase M, Chow S. Improving privacy and security in multi-authority attribute-based encryption [A], In Proceedings of the 16th ACM Conference on Computer and Communications Security [C], 2009: 121-130." The key anonymous distribution protocol improves the existing attribute-based ring signature method, but the introduction of the key anonymous distribution protocol causes the attribute authority AA to generate user attribute keys in the key distribution stage. t 2 key to ensure the security of the scheme, where t is the number of attribute authority AA in the attribute authority set
This undoubtedly reduces the work efficiency of the attribute authority AA and increases the communication cost between the attribute authority AA and the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Distributed Authorized Attribute-Based Network Ring Signature Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0072] A specific embodiment of the present invention is a distributed authorization attribute-based network ring signature method, the steps of which are:

[0073] A. Parameter generation

[0074] A1. Establishment of attribute set

[0075] The system establishes attribute collection space W, W={W 1 ,...,W k ,...,W K},in is the kth attribute subset of the attribute set space W, and K is the total number of attribute subsets in the attribute set space W; w i,k is the kth attribute subset W k The i-th attribute in |W k | is the kth attribute subset W k The total number of attributes in;

[0076] A2. Generation of system public key and private key

[0077] System setting P≥K distributed attribute authority AA p , where p is the attribute authority AA p serial number, p={1,2,...,P}; construct q factorial method cyclic group G and q factorial method cyclic group Y, q is greater than 2 512 and there is a bilinear mapping relationship y=e(g a , g b ); among them, e(g ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attribute-based network ring signature method with distributed authorization, which belongs to the field of information security. The main method is: in the initialization stage, the distributed key negotiation protocol is used to remove the trusted system center and disperse the attribute authorization mechanism at the same time The key management authority solves the problem of attribute key escrow; in the key distribution stage, by embedding the user identity into the attribute key, it is ensured that the method can resist collusion attacks; in the signature generation stage, by introducing the user identity in the signature The fuzzy factor makes the method have unconditional strong anonymity at the same time. The method has strong anonymity and high security, and can effectively realize anonymous identity authentication and access control functions of cloud computing, electronic medical and other networks.

Description

technical field [0001] The invention relates to a distributed authorization network anonymous identity authentication and signature method for access. Background technique [0002] With the vigorous development of big data applications such as electronic medical care and cloud computing, data authentication and privacy protection have become very realistic and urgently needed to be solved. Attribute-based (attribute-based) ring signatures have no group organization process in the signing process, do not require the participation of group administrators, facilitate the concealment of signer privacy, and can provide stronger anonymity protection than ordinary attribute-based signatures, so they are especially suitable for implementing Anonymous identity authentication and access control functions in networks with high anonymity requirements such as cloud computing and electronic medical care. The analysis shows that the existing attribute-based (attribute-based) ring signatur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0869H04L9/3247H04L63/0421H04L63/062H04L63/0876H04L63/10
Inventor 张文芳刘旭东王小敏
Owner 广州珠航校车服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products