Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Construction method of strong anti-collision chameleon hash function

A technology of hash function and construction method, which is applied in the field of information security, and can solve problems such as being unable to resist quantum computer attacks and being unable to resist strong anti-collision attacks.

Active Publication Date: 2019-04-09
ANHUI UNIVERSITY
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing strong anti-collision chameleon hash functions are based on traditional difficult problems such as large number decomposition and discrete logarithm, so they cannot resist the attack of quantum computers
Existing chameleon hash functions that can resist quantum computers, such as the literature "Cash, D., Hofheinz, D., Kiltz, E., & Peikert, C. (2012). Bonsai trees, or how to delegate a lattice basis. Journal of cryptology ,25(4),601-639."The proposed chameleon hash function cannot resist strong anti-collision attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Construction method of strong anti-collision chameleon hash function
  • Construction method of strong anti-collision chameleon hash function
  • Construction method of strong anti-collision chameleon hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The embodiments of the present invention are described in detail below. This embodiment is implemented on the premise of the technical solution of the present invention, and detailed implementation methods and specific operating procedures are provided, but the protection scope of the present invention is not limited to the following implementation example.

[0034] see figure 1: a construction method of a strong anti-collision chameleon hash function of the present embodiment, the method uses the following q-cell: Define parameter s>0, center The discrete Gaussian distribution on the m-dimensional grid Λ is: where ρ s,c (Λ)=∑ x∈Λ ρ s,c(x) , When c=0, record ρ s,0 and ρ s and Let the integers n≥1, q≥2, matrix by the vector g t =[1 2 4 ... 2 k-1 ] composition, namely in stands for tensor product;

[0035] make message space A random vector (r, t) sampled from The method includes the following steps:

[0036] S1. System parameter genera...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a construction method of a strong anti-collision chameleon hash function, which comprises the following steps of S1, inputting a security parameter n, and generating public andprivate key pairs (PK, SK) by a system, the public key PK being capable of specifying a message space M, a random space R and a chameleon hash function range Y; and S2, inputting the public key PK generated by the KGen and a message m Epsilon M, Hash algorithm outputting Hash y Epsilon Y and random r Epsilon R; and S3, inputting a public key PK, and outputting b belongs to {0, 1} through a Hash Epsilon Y of the message m Epsilon M and a random vector r Epsilon R check algorithm, if b = 1, then (y, r) is a valid hash of the message m, otherwise is invalid; and S4, inputting a private key SK, amessage m Epsilon M and a corresponding Hash random pair (y, r), and a new message m' Epsilon M to output a random vector r' satisfying HCheck (PK, m', y, r ') = 1. The invention also discloses a verification method of the strong anti-collision chameleon hash function. The method can resist strong anti-collision attacks and can be well applied to the scene of a high-security chameleon hash function.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a construction method of a strong anti-collision chameleon hash function. Background technique [0002] The chameleon hash function is a special hash function. In addition to being used for ordinary hash functions, it can also adapt the message content of the hash function with a private key. Therefore, it is widely used in chameleon signatures, In the design of online and offline signatures and some advanced encryption schemes. The chameleon hash function with strong anti-collision is a more secure chameleon hash function. This kind of chameleon hash function cannot forge a legal new hash message pair after many hash message pairs are known by the adversary, so In addition to replacing the general chameleon hash function, it can also be applied to scenarios such as purifiable signatures and mutable blockchains. [0003] The existing strong anti-collision chameleon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0643H04L9/0836H04L9/0869
Inventor 田苗苗
Owner ANHUI UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products