Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Editable, Linkable, Non-Repudiable Ring Signature Method

A ring signature and editing technology, which is applied in the field of network security, can solve problems such as the difficulty of ring signature revocation, the lack of privacy protection and flexible authentication mechanism, and the difficulty of tracing malicious user identity information.

Active Publication Date: 2021-06-08
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the problems of the above research, the purpose of the present invention is to provide an editable, linkable and non-repudiable ring signature method, which solves the difficulty of revoking the ring signature in the prior art, and it is difficult to trace the identity information of malicious users. It can still be authenticated by signatures, and does not have issues such as privacy protection and flexible authentication mechanisms

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Editable, Linkable, Non-Repudiable Ring Signature Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0057] An editable, linkable and non-repudiable ring signature method includes the following steps:

[0058] Step a. System initialization:

[0059] Select the security parameter λ, and set the system public parameter P;

[0060] Set the system public parameter P, the specific steps are:

[0061] Select a group G whose generator is g and group order is q according to the security parameter λ;

[0062] Set the hash function as: H 1 : {0, 1} * →G and H 2 : {0, 1} * → Z q ,Z q = {0, 1, ..., q-1}, which is an integer group of order q;

[0063] Output system public parameters P=1 , H 2 >.

[0064] Step b. User key generation:

[0065] According to the public parameter P of the system, calculate the private key sk of user i i and the public key pk of user i i ;

[0066] The specific steps are:

[0067] According to the public paramete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An editable, linkable, and non-repudiable ring signature method belongs to the field of network security. It solves the difficulty of revoking the ring signature in the prior art, and it is difficult to trace the identity information of malicious users. After editing, it can still be authenticated by the signature. It does not have issues such as privacy protection and flexible authentication mechanisms. The invention is used to sequentially perform system initialization, user key generation, hash key generation, signature and provide conditionally revocable identity privacy, editable and non-repudiable ring signature. After signing, if you want to edit the signature and judge whether the signature is If the signature is linkable or negotiable, the signature is verified separately, and after the verification is passed, the signature is edited to determine whether the signature is linkable or negotiable, etc., to provide a conditionally revokable identity privacy, editable, and non-repudiable environment. sign.

Description

technical field [0001] An editable, linkable, and non-repudiable ring signature method belongs to the field of network security, and is used to provide identity privacy, editable, and non-repudiation ring signatures that can be conditionally revoked. Background technique [0002] The ring signature is evolved from the group signature. Unlike the group signature, which has a group administrator as the center, the ring signature does not rely on such a center. Simply put, ring signature is spontaneous, that is, a user in the ring arbitrarily selects the public keys of other users to form a ring required for signature, which is used to hide the user's public key, while other users on the ring The identity privacy of the signers is achieved without any knowledge that they are being added to the ring. [0003] The current ring signature has the problem that identity privacy conditions are difficult to revoke and cannot be edited. For the former (difficult to revoke), due to the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3255
Inventor 张小松黄可牛伟纳谢鑫蒋天宇葛洪麟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products