A Quantum Key Based Group Signature System

A quantum key and group signature technology, applied in the field of cryptography, can solve the problems that the technology is difficult to adapt to the complex group signature environment, the group signature scheme is difficult to resist joint attacks or collusion attacks, and it is difficult to adapt to the dynamic changes of group members.

Active Publication Date: 2020-08-04
CHINA THREE GORGES UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The efficiency of existing group signature schemes is relatively low
The length of the existing group signature and group public key depends on the size of the group. To ensure the security of the group signature, a certain length of the group signature and group public key is often required. As the group grows, the group signature and group public key The number of digits of the key also increases significantly, which will lead to a significant increase in the amount of calculations in the signature process and open operations, resulting in a reduction in the efficiency of group signatures
[0006] 2. The existing group signature scheme is difficult to adapt to the dynamic changes of group members
[0007] 3. Existing group signature schemes are based on classic algorithms, and their security is challenged
For the classic group encryption or group signature algorithm currently provided, it is mainly based on the limited computing power of the existing computer, or the existing computer is difficult to crack within a limited time. The method to increase the security of the group signature is often to increase the encryption algorithm. The length of the key is used to increase the difficulty of cracking, because the calculation amount of classical computers will increase exponentially with the increase of the calculation scale, but this method of simply increasing the key length is vulnerable to quantum algorithms. Such as the public key encryption algorithm RSA, the data encryption standard DES, etc. have been greatly challenged
[0008] 4. Existing technologies are difficult to adapt to the needs of complex group signature environments
For example, existing group signature schemes are difficult to resist joint attacks or collusion attacks
The joint attack or collusion attack on the group signature is usually carried out jointly by several legitimate group members in the group. They can use their legal identity information to forge the group signature, and in the existing group signature scheme, this kind of forgery is very difficult. Difficult to be discovered by group managers
[0009] 5. The existing technology is difficult to realize the joint signature of multiple group members
If the signature of two or more group members is to be realized, the existing technology often needs to add the keys of two or more group members. On the one hand, the group signature algorithm is complicated, and the opening operation is time-consuming; Leakage of group member keys, leading to group signature security threats and other issues
[0010] With the continuous development and application of quantum computers and quantum computing, the current group signature scheme faces great security threats, but at the same time, quantum computing and quantum encryption also provide an improved idea for group signature, which may produce a A more secure group signature scheme, however, there are few quantum key-based group signature systems on the market

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Quantum Key Based Group Signature System
  • A Quantum Key Based Group Signature System
  • A Quantum Key Based Group Signature System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Such as figure 1 As shown, a quantum key-based group signature method and system includes: quantum key generator 101, signature key 102, quantum group key generator 103, group key 104, quantum group signature module 105, group Signature 106, quantum group signature verification module 107.

[0043] The quantum key generator 101 is a quantum sequence device generated by a laser light source, preferably, it is composed of a laser source, a beam splitter, an encoding module, and a photon detector, and is used to generate a quantum sequence and its encoding; further Ground, the group manager CA divides the quantum sequence into two photons through the beam splitter, and sends the photons to the group manager CA and the group member Alice through the beam splitter to form the group manager CA and the newly joined group Member Alice's shared key K CA ; Similarly, when the group member Bob joins the group, the shared key K between the group manager CA and the newly joined gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a group signature system based on quantum keys. The group signature system comprises a quantum key generator, a signature key, a quantum group key generator, a group key, a quantum group signature module, a group signature and a quantum group signature verification, wherein the quantum key generator is a quantum sequence device generated by a laser source, and is used for forming a shared key of a newly-added group member and a group administrator; the quantum group key is issued to group members by the group administrator and used for encryption in signing according to a quantum state sequence generated by means of the quantum group key generator, and different sequences are generated according to different business transactions; and the quantum group signature module is used for performing quantum encryption on messages and signatures by the group members. The group signature system based on the quantum keys has the significant advantages that: identities are determined through distribution and measurement of the quantum keys, the efficiency is higher while the security is improved, and group members can be added and deleted quickly; and the group signature system is more suitable for a complex group signature environment, has the features of unlinkability and coalition attack resistance, and can realize coalition signature of a plurality of the group members.

Description

technical field [0001] The invention relates to the fields of cryptography, group signature and quantum encryption, in particular to a quantum key-based group signature system. Background technique [0002] With the rapid development of computer and communication technology, the number of people communicating and exchanging information through the network is constantly increasing, and the security of information transmission and effective identification of identities have become particularly important. In order to solve this kind of problem in time, digital signature emerges as the times require, which promotes the rapid development of communication technology and e-government. [0003] The so-called digital signature is a method similar to an ordinary physical signature written on paper, but it is realized by using the technology in the field of public key encryption to identify digital information. A set of digital signatures usually defines two complementary operations, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0833H04L9/0852H04L9/3255
Inventor 蔡政英江川胡绍齐罗强
Owner CHINA THREE GORGES UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products