Linkable ring signature method based on anonymous broadcast encryption

A technology of broadcast encryption and ring signature, applied in the field of information security, can solve the problems of inability to guarantee the anonymity of linkable verifiers, insufficient security, and narrow application range, so as to improve the efficiency of verification, improve security, and increase the scope of application Effect

Active Publication Date: 2019-01-22
XIDIAN UNIV
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the linkability of this method can be verified by all verifiers. It is not suitable for scenarios that require permission to judge whethe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Linkable ring signature method based on anonymous broadcast encryption
  • Linkable ring signature method based on anonymous broadcast encryption
  • Linkable ring signature method based on anonymous broadcast encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be described in further detail below in conjunction with the accompanying drawings and specific embodiments.

[0045] refer to figure 1 , a linkable ring signature method based on anonymous broadcast encryption, including the following steps:

[0046] Step 1) Set ring signature parameters:

[0047] Set the number of ring members to be n, n≥2, take n=5 in this embodiment, and the identity of each ring member is ID x , x is the label of the ring member, x=[1,5]; set the one-way function sent by the trusted third party to the ring member as f;

[0048] Step 2) Ring Member ID x Get public parameters:

[0049] Step 2a) Ring Member ID x Using the group generation algorithm of probabilistic polynomial time, the group parameter gk of the ring signature is generated through the security parameters of the ring signature x :gk x =(G,q,g), wherein, G is a group whose order is a prime number q and whose generator is g;

[0050] In this step, the gr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a linkablering signature method based on anonymous broadcast encryption, aiming at widening the application range of the linkable ring signature and improving the safety of thelinking verifier.The implementation method comprises following steps: setting ring signature parameters;a ring member IDx gets the public parameter; thering member IDx generates a key and a linkable hash value PKskx. The trusted third party obtains broadcast encryption parameters and calculates broadcast encryption private key SKIDx of ring member IDx. The signer calculates a linkable flag Tag anda flag ciphertext CT and obtains a ring signature sigma of the message m. The verifier verifies the correctness of the ring signature sigma; judging the identity of the verifier; an authorized user verifies the linkability of ring signature sigma; an obtainer calculates the signer information to prove Psi. The verifier verifies the correctness of Psi. The invention can be used for a transaction scene under a block chain which needs permission to judge whether the transaction scene can be linked or not.

Description

technical field [0001] The invention belongs to the technical field of information security, and relates to a ring signature method, in particular to a linkable ring signature method based on anonymous broadcast encryption, which can be used in transaction scenarios that require authority to judge whether linkability is required under the blockchain. Background technique [0002] Digital signatures, also known as public key digital signatures and electronic signatures, are similar to ordinary physical signatures written on paper. At the same time, they use the technology in the field of public key encryption to identify digital information. This method is a digital string that only the sender of the message can produce and cannot be forged by others. This digital string is also an effective proof of the authenticity of the message sent by the sender of the message. Group signature is a kind of digital signature. It satisfies that in a group signature scheme, any member of a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3218H04L9/3236H04L9/3255
Inventor 陈杰王启宇张跃宇庄立爽
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products