Editable, linkable and non-repudiation ring signature method

A ring signature and editing technology, applied in the field of network security, can solve problems such as lack of privacy protection and flexible authentication mechanism, difficulty in tracing malicious user identity information, and difficulty in revoking ring signatures

Active Publication Date: 2019-07-30
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problems of the above research, the purpose of the present invention is to provide an editable, linkable and non-repudiable ring signature method, which solves the difficulty of revoking the ring signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Editable, linkable and non-repudiation ring signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0057] An editable, linkable and non-repudiable ring signature method includes the following steps:

[0058] Step a. System initialization:

[0059] Select the security parameter λ, and set the system public parameter P;

[0060] Set the system public parameter P, the specific steps are:

[0061] Select a group G whose generator is g and group order is q according to the security parameter λ;

[0062] Set the hash function as: H 1 : {0, 1} * →G and H 2 : {0, 1} * → Z q ,Z q = {0, 1, ..., q-1}, which is an integer group of order q;

[0063] Output system public parameters P=1 , H 2 >.

[0064] Step b. User key generation:

[0065] According to the public parameter P of the system, calculate the private key sk of user i i and the public key pk of user i i ;

[0066] The specific steps are:

[0067] According to the public paramete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an editable, linkable and non-repudiation ring signature method, belongs to the field of network security, and solves the problems of difficulty in revocation of a ring signature, difficulty in tracing identity information of a malicious user, capability of being authenticated by the signature after being edited, no privacy protection, no flexible authentication mechanism and the like in the prior art. The method is used for sequentially carrying out system initialization, user key generation, hash key generation and signature and providing conditional revocation identity privacy, editable and non-repudiation ring signatures. After the signature is edited, if the signature is required to be edited and whether the signature can be linked or repudiated is judged, thesignature is verified respectively, and after the verification is passed, the signature is edited and whether the signature can be linked or repudiated and the like is judged to be used for providingidentity privacy capable of being revoked, editable and non-repudiated ring signatures.

Description

technical field [0001] An editable, linkable, and non-repudiable ring signature method belongs to the field of network security, and is used to provide identity privacy, editable, and non-repudiation ring signatures that can be conditionally revoked. Background technique [0002] The ring signature is evolved from the group signature. Unlike the group signature, which has a group administrator as the center, the ring signature does not rely on such a center. Simply put, ring signature is spontaneous, that is, a user in the ring arbitrarily selects the public keys of other users to form a ring required for signature, which is used to hide the user's public key, while other users on the ring The identity privacy of the signers is achieved without any knowledge that they are being added to the ring. [0003] The current ring signature has the problem that identity privacy conditions are difficult to revoke and cannot be edited. For the former (difficult to revoke), due to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3255
Inventor 张小松黄可牛伟纳谢鑫蒋天宇葛洪麟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products