Unlock instant, AI-driven research and patent intelligence for your innovation.

An Anonymous Authentication Method Based on Group Signature in Standard Model

A standard model and group signature technology, applied in the field of network information security, can solve the problem that the hash function cannot achieve randomness, and achieve the effect of reducing interaction overhead and simplifying the amount of calculation

Active Publication Date: 2021-08-03
SHENYANG POLYTECHNIC UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Most of the practical group signature schemes that have been proposed have proved security in the random oracle model (ROM). completely random
Ateniese et al. gave an efficient group signature scheme in the standard model, but proved its security under non-standard assumptions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Anonymous Authentication Method Based on Group Signature in Standard Model
  • An Anonymous Authentication Method Based on Group Signature in Standard Model

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Such as Figure 1-2 As shown, the scheme adopted by the present invention is zero-knowledge proof, based on the Camenisch-Lysyanskaya signature scheme, which absorbs the advantages of group signature, identity trusteeship and other technologies, and protects user privacy while verifying user identity. It uses Zero Knowledge Proof. In zero-knowledge proofs, one can prove to others that one knows a secret without revealing it.

[0044] The present invention includes that the subjects involved in the scheme are some computer nodes connected to the network that process specific operation steps, including the publisher issue, the group manager GM and the group member A, and the digital signature scheme used is ∑ 0 , ∑ 1 , ∑ cert , ∑ ots . Each signature scheme includes a key generation algorithm keygen, a signature algorithm sign, and a verification algorithm verify.

[0045] ∑ 0 : A structure-preserving signature method used to generate a member's personal key pair. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anonymous authentication method based on a group signature under a standard model, belonging to the field of network information security. It can meet the anonymous authentication requirements between platforms and the anonymous authentication algorithm of remote proof. Including: Step 1: The publisher generates system parameters, group public key and publisher private key. Step 2: Extract keys for group manager GM and group member A. Step 3: When user i wants to perform group signature on a message m, first re-randomize his certificate to generate a key pair; use his own group signature key to perform group signature on message m, member certificate, and strong one-time signature verification key Sign and give a zero-knowledge proof. Step 4: After receiving the signature, the recipient verifies the signature and the user identity certificate. If both the identity and the signature satisfy the verification equation, the verification is passed and the signature is accepted, otherwise it is rejected. Step 5: When a dispute occurs among group members, the group manager GM opens the group member certificate and returns i, evidence, thereby confirming the identity of the group member.

Description

technical field [0001] The invention relates to an anonymous authentication method based on a group signature under a standard model, belonging to the field of network information security. Background technique [0002] With the continuous development of electronic technology and network technology, people are more and more dependent on the network, especially communication technology has become an indispensable part of people's life, and network and information security are also increasingly affected by the development of technology. Widespread concern. In the group signature system, some signing members form a group, each member has a different signature key, and the signature key corresponds to the unique group public key in the group. Any member of the group can sign the message on behalf of the group, and the verifier can use the group public key to verify the validity of the signature, but cannot determine the identity of the signer from a group signature. When a dis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/08H04L9/30H04L9/32
CPCH04L9/0869H04L9/3066H04L9/3247H04L63/0421H04L63/083
Inventor 岳笑含王溪波惠明亨
Owner SHENYANG POLYTECHNIC UNIV