Supervisable anonymous authentication method based on zero knowledge proof

A zero-knowledge proof and anonymous authentication technology, applied in the field of supervised anonymous authentication, can solve problems such as excessive exposure of user identity and attribute information, and achieve the effect of increasing mandatory supervision functions, protecting identity privacy, and ensuring anonymity

Active Publication Date: 2019-03-08
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF7 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the above-mentioned shortcomings of the prior art, the present invention provides a supervised anonymous authentication method based on zero-knowledge proof. Aiming at the problem of excessive exposure of user identity and attribute information in the traditional authentication system, the technical means of anonymous authentication is used to protect the identity of the user. Identity privacy, while adopting a flexible authentication strategy, so that users can choose to present the attributes in the certificate to avoid excessive exposure of information; in view of the problem that cannot be supervised in anonymous authentication, combined with the technical means of group signature, CA can supervise the user's identity information , to avoid the occurrence of untrustworthy behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Supervisable anonymous authentication method based on zero knowledge proof
  • Supervisable anonymous authentication method based on zero knowledge proof
  • Supervisable anonymous authentication method based on zero knowledge proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention combines zero-knowledge proof, group signature scheme and other cryptography technologies to design an attribute-based supervised anonymous authentication method, which solves the problems of insufficient privacy protection and unsupervised user identity in the traditional authentication system.

[0012] 1. Program overview

[0013] The method includes three types of participants, CA (trusted center), user and verifier. After the system is established, the CA generates the issuing key pair, the tracking key and the group public key. Then the user registers, and the CA assigns a pair of private keys to it, and at the same time, the CA issues relevant certificates to the user according to the attribute information submitted by the user. When the user presents the certificate, the verifier can specify the attributes that need to be presented on the user certificate, and the user signs the certificate while hiding the attribute values ​​that do not ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a supervisable anonymous authentication method based on zero knowledge proof, comprising three types of participants: a CA, a user and a verifier, wherein the CA generates an issuer key pair and a group key, the CA allocates a pair of private keys to the user during registration of the user, and meanwhile the CA issues a relevant certificate to the user according to the attribute information submitted by the user; when the user presents the certificate, the verifier specifies an attribute that needs to be presented on the certificate of the user, and the user signs thecertificate and hides attribute values that do not need to be presented; and the verifier verifies the signature, if the signature passes the verification, the certificate presented by the user is valid, or otherwise, the certificate presented by the user is invalid. By adoption of the supervisable anonymous authentication method disclosed by the invention, the anonymity of the user is also ensured while increasing a mandatory supervision function, thereby greatly improving the identity privacy of the user compared with the general identity supervision scheme. By adoption of the supervisable anonymous authentication method disclosed by the invention, a supervisable function is also added.

Description

technical field [0001] The invention relates to a supervised anonymous authentication method based on zero-knowledge proof. Background technique [0002] Traditional identity authentication technology is mainly used for users to prove to the verifier that they are legitimate users, and can be widely used in communication, finance, social networking and other fields. However, the existing authentication technology does not consider the issue of user identity privacy protection. During authentication, users may over-expose their own information, resulting in information leakage or theft. Therefore, it is necessary to use anonymous authentication technology to protect the identity privacy of users. [0003] Anonymous authentication technology mainly uses cryptography to ensure the privacy of users. For example, the Identity Mixer scheme proposed by IBM provides an anonymous authentication method, and users can choose to present attributes independently during authentication. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0861H04L9/3218H04L9/3255H04L9/3263H04L63/0421H04L2209/42
Inventor 王震范佳白健安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products