Attribute base network signature method supporting dynamic attractive space

An attribute space and attribute-based technology, which is applied to public keys for secure communications, encryption devices with shift registers/memory, and key distribution, can solve problems such as inflexible use and inability to independently define message access structures

Inactive Publication Date: 2018-11-09
SOUTHWEST JIAOTONG UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, the system cannot independently define the access structure of the message, but can only define that the message is related to a set of attribute sets. Compared with the system in the signature policy, which can freely define the access structure of the message, its use in the cloud environment is not flexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute base network signature method supporting dynamic attractive space
  • Attribute base network signature method supporting dynamic attractive space
  • Attribute base network signature method supporting dynamic attractive space

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0054] A specific embodiment of the present invention is an attribute-based network signature method supporting dynamic attribute space, the steps of which are:

[0055] A. Parameter generation

[0056] A1. Generation of system public key and private key

[0057] The system respectively constructs the q-factorial method cyclic group G and the q-factorial method cyclic group Y, and there is a bilinear mapping relationship y=e(g a , g b ); where q is greater than 2 512 , y is an element in the cyclic group Y of q factorial method, e(g a , g b ) represents the element g in the cyclic group G of the q factorial method a and element g b Perform bilinear mapping operations;

[0058] The system randomly selects a number from the integers 1 to q as the system's master key α; the system randomly selects the generator g of the cyclic group G of the q factorial method 1 As the system's first public key g 1 , and then get the second public key g of the system 2 , The system th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute base network signature method supporting the dynamic attractive space, and belongs to the field of information security. The method is mainly characterized in thata layering technology (including an attribute layer and a secret shearing layer) is used for realizing the dynamic attribute space structure; in the attribute layer, an attribute authorizing center AA uses a random perturbance method for performing fuzzification processing on user attributes; when a new attribute needs to be added, the attribute authorizing center AA only needs to select a randomnumber for the attribute; the corresponding commitment is calculated and is used as a sub secret key of the attribute; the problem of initializing the system again is avoided; in the secret sharing layer, the linear secret sharing method is used for defining the visit structure for signing the message; the visit strategy supporting the fine granularity can be supported; high signature efficiencyis realized. The method has the advantages of high anonymity performance and high security; the access control functions and anonymity identity identification of cloud calculation, electronic medicinecare and the like can be effectively realized.

Description

technical field [0001] The invention relates to an attribute-based network signature method supporting dynamic attribute space. Background technique [0002] With the vigorous development of big data applications such as electronic medical care and cloud computing, data authentication and privacy protection have become very realistic and urgently needed to be solved. In the attribute-based signature scheme, the verifier can only verify whether the signer has the access structure (attribute) defined by the access message, but does not confirm the specific identity of the signer. Therefore, attribute-based signature has the advantages of strong expressive ability, flexible use, and easy to hide the identity of the signer. Therefore, it is especially suitable for anonymous identity authentication and access control functions in networks that require high anonymity such as cloud computing and electronic medical care. [0003] At present, the attribute-based signature method for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08H04L9/06H04L29/06
CPCH04L9/0643H04L9/0819H04L9/0869H04L9/3006H04L9/3236H04L9/3247H04L63/10
Inventor 张文芳管桂林王小敏
Owner SOUTHWEST JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products