Identity-based traceable ring signature authentication protocol

An authentication protocol and ring signature technology, which is applied in the field of identity-based traceable ring signature authentication protocol, can solve the problem of being unable to resist collusion attacks between dishonest signers and non-signers, and achieve simple generation and verification, resistance to collusion attacks, The effect of ensuring safety

Active Publication Date: 2018-03-23
HOHAI UNIV
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Wu et al. proposed a self-certifying ring signature scheme, but it cannot resist the collusion attack between dishonest signers and non-signers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based traceable ring signature authentication protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The present invention will be specifically introduced below in conjunction with the accompanying drawings and specific embodiments.

[0018] Explain and explain the relevant concepts involved in the above technical solutions:

[0019] 1. Anti-collision accumulator

[0020] The anti-collision accumulator is a tuple ({X 1} 1∈N ,{F 1} 1∈N ), where {X 1} 1∈N is called the value field of the accumulator, {F 1} 1∈N It is a collection of system functions. choose(f,g)∈{F 1},in while g:U f → U g is a bijective function. In the present invention, an ID-based accumulator can be implemented as follows: Select a security parameter 1 k , get a tuple t=(p,G 1 ,G M ,e,P), where p is a large prime number, and P is the additive cyclic group G 1 A generator of G M is a and g 1 For multiplicative groups of the same order, e is a bilinear pairing. then choose a Calculate t'=(P,sP,...,s q P), and t' is public. Then the accumulator function (f,g) is defined as:

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based traceable ring signature authentication protocol, comprising the steps of I, initializing a system, to be specific, generating a secret key and selecting parameters; II, generating and verifying a signature, to be specific, allowing a user to generate a ring signature, and allowing a receiver to verify validity of the signature; III, generating and verifying tracing evidence, to be specific, allowing the user to generate tracing evidence, and allowing a verifier to verify legality of the evidence. The identity-based traceable ring signature authentication protocol has the advantages that a signer can be effectively traced at the premise of implementing authentication security, and collusion attack can be resisted; since a signature of fixed lengthis generated based on a collision-resistant accumulator and signature of knowledge and the length is not proportional to the number of ring members, communication cost is effectively reduced.

Description

technical field [0001] The invention relates to a scheme of anonymous authentication and identity traceability, in particular to an identity-based traceable ring signature authentication protocol. Background technique [0002] With the increasing demand for anonymous communication, anonymous authentication technology has attracted more and more attention. Chaum et al. proposed a group signature technology, so that group members can generate signatures on behalf of the group, and the verifier can only confirm that the signature is generated by the group, but cannot identify the specific signing members. However, group administrators can revoke the anonymity of signed members, which limits its scope of application. Rivest et al. proposed the ring signature technology, which is a simplified group signature. The formation of the ring is completely self-organized by users, and there is no administrator, which can realize the unconditional anonymity of members. But this property...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3255
Inventor 吕鑫陈娟曾涛周琦
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products