An Anonymous Authentication Method Based on Group Signature in Standard Model
A standard model and group signature technology, applied in the field of network information security, can solve the problem that the hash function cannot achieve randomness, and achieve the effect of reducing interaction overhead and simplifying the amount of calculation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] Such as Figure 1-2 As shown, the scheme adopted by the present invention is zero-knowledge proof, based on the Camenisch-Lysyanskaya signature scheme, which absorbs the advantages of group signature, identity trusteeship and other technologies, and protects user privacy while verifying user identity. It uses Zero Knowledge Proof. In zero-knowledge proofs, one can prove to others that one knows a secret without revealing it.
[0044] The present invention includes that the subjects involved in the scheme are some computer nodes connected to the network that process specific operation steps, including the publisher issue, the group manager GM and the group member A, and the digital signature scheme used is ∑ 0 , ∑ 1 , ∑ cert , ∑ ots . Each signature scheme includes a key generation algorithm keygen, a signature algorithm sign, and a verification algorithm verify.
[0045] ∑ 0 : A structure-preserving signature method used to generate a member's personal key pair. ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

