Anonymous authentication scheme of group signatures under standard model
A standard model and anonymous authentication technology, which is applied to the public key of secure communication, user identity/authority verification, and key distribution, can solve the problem that the hash function cannot achieve randomness, reduce the overhead of interaction, simplify the amount of calculation, The effect of improving quantity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] Such as Figure 1-2 As shown, the scheme adopted by the present invention is zero-knowledge proof, based on the Camenisch-Lysyanskaya signature scheme, which absorbs the advantages of group signature, identity trusteeship and other technologies, and protects user privacy while verifying user identity. It uses Zero Knowledge Proof. In zero-knowledge proofs, one can prove to others that one knows a secret without revealing it.
[0041] The present invention includes that the subjects involved in the scheme are some computer nodes connected to the network that process specific operation steps, including the publisher issue, the group manager GM and the group member A, and the digital signature scheme used is ∑ 0 , ∑ 1 , ∑ cert , ∑ ots . Each signature scheme includes a key generation algorithm keygen, a signature algorithm sign, and a verification algorithm verify.
[0042] ∑ 0 : A structure-preserving signature method used to generate a member's personal key pair. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


