Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous authentication scheme of group signatures under standard model

A standard model and anonymous authentication technology, which is applied to the public key of secure communication, user identity/authority verification, and key distribution, can solve the problem that the hash function cannot achieve randomness, reduce the overhead of interaction, simplify the amount of calculation, The effect of improving quantity

Active Publication Date: 2019-03-01
SHENYANG POLYTECHNIC UNIV
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Most of the practical group signature schemes that have been proposed have proved security in the random oracle model (ROM). completely random
Ateniese et al. gave an efficient group signature scheme in the standard model, but proved its security under non-standard assumptions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous authentication scheme of group signatures under standard model
  • Anonymous authentication scheme of group signatures under standard model
  • Anonymous authentication scheme of group signatures under standard model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Such as Figure 1-2 As shown, the scheme adopted by the present invention is zero-knowledge proof, based on the Camenisch-Lysyanskaya signature scheme, which absorbs the advantages of group signature, identity trusteeship and other technologies, and protects user privacy while verifying user identity. It uses Zero Knowledge Proof. In zero-knowledge proofs, one can prove to others that one knows a secret without revealing it.

[0041] The present invention includes that the subjects involved in the scheme are some computer nodes connected to the network that process specific operation steps, including the publisher issue, the group manager GM and the group member A, and the digital signature scheme used is ∑ 0 , ∑ 1 , ∑ cert , ∑ ots . Each signature scheme includes a key generation algorithm keygen, a signature algorithm sign, and a verification algorithm verify.

[0042] ∑ 0 : A structure-preserving signature method used to generate a member's personal key pair. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anonymous authentication scheme of group signatures under a standard model, and belongs to the field of network information security. The scheme can meet a requirement of anonymous authentication between platforms and an anonymous authentication algorithm of remote certification, and includes: step 1, generating system parameters, a group public-key and publisher private-keys by publishers; step 2, extracting keys for a group manager GM and a group member A; step 3, when a user i wants to carry out group signature on a message m, firstly re-randomizing a certificatethereof, generating a key pair, using a group signature key thereof to carry out signature on the message m, a member certificate and a verification key of previous signature, and giving a zero-knowledge proof; step 4, verifying a signature and a user identity certificate after a recipient receives the signature, if an identity and the signature both meet a verification equation, determining verification as successful, and accepting the signature, and otherwise, rejecting authentication; and step 5, when a dispute of group members occurs, opening group member certificates by the group managerGM, returning i and evidence, and thus determining a group membership identity.

Description

technical field [0001] The invention relates to an anonymous authentication scheme based on group signature under a standard model, which belongs to the field of network information security. Background technique [0002] With the continuous development of electronic technology and network technology, people are more and more dependent on the network, especially communication technology has become an indispensable part of people's life, and network and information security are also increasingly affected by the development of technology. Widespread concern. In the group signature system, some signing members form a group, each member has a different signature key, and the signature key corresponds to the unique group public key in the group. Any member of the group can sign the message on behalf of the group, and the verifier can use the group public key to verify the validity of the signature, but cannot determine the identity of the signer from a group signature. When a d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/30H04L9/32
CPCH04L9/0869H04L9/3066H04L9/3247H04L63/0421H04L63/083
Inventor 岳笑含王溪波惠明亨
Owner SHENYANG POLYTECHNIC UNIV