Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Hash calculation method and signcryption method based on homomorphic chameleon Hash function

A hash function and hash calculation technology, applied in the hash calculation method and signcryption field of the homomorphic chameleon hash function, can solve the problem that the chameleon hash function does not have homomorphism, the effect of user privacy protection is not good enough, and the Problems such as aggregation of multiple hash values

Active Publication Date: 2019-08-02
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem that the existing chameleon hash function for hash calculation does not have homomorphism, cannot aggregate multiple hash values, and the existing signcryption method cannot support proxy re-signature and simultaneous signature in one framework. Multiple functions of morphism and non-repudiation, the user privacy protection effect is not good enough, a hash calculation method and a signcryption method of the homomorphic chameleon hash function are proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash calculation method and signcryption method based on homomorphic chameleon Hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] A preferred embodiment of the present invention provides a hash calculation method based on the homomorphic chameleon hash function, the method is as follows:

[0060] Step 1. System initialization: get the system public parameter param HKFC . Specifically:

[0061] First select the security parameter λ, select a prime number q according to the security parameter λ, and then select a GDH group G whose order is q and whose generator is g, and then select the hash function H 1 : {0, 1} * → Z q ,Z q is an integer group of order q, output {G, q, g, H 1} as the system public parameter param HKFC. The GDH group here refers to such a group: on it, the Computational Diffie-Hellman (CDH) problem is difficult, but the Decisional Diffie-Hellman (DDH) problem is simple, and the GDH group can be formed by a superbasis elliptic curve or The hyperelliptic curve construction on the finite field is obtained, and the specific method can be found in the article "Short signature fr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Hash calculation method and a signcryption method based on a homomorphic chameleon Hash function. According to the provided homomorphic chameleon hash function, a chameleon hash value result adopts a logarithm form, a signcryption result based on the hash in the signcryption method is also a logarithm form, so that the homomorphic property is achieved, the homomorphic aggregation can be conducted in hash calculation, hash is more efficiently calculated, and the homomorphic chameleon hash function has both the homomorphic state and the key leakage prevention characteristics. The signcryption method is realized on the basis of the homomorphic chameleon hash function, the homomorphic aggregation signcryption ensures the homomorphism, the system public parameters generated by the system initialization are used together by the chameleon hash function and the signcryption, and two password schemes share one set of system parameters, so that multiple function effectscan be realized under one set of shared system parameters, and multiple functions are supported under the same framework. Secondly, the proxy key generation and proxy re-signature steps realize the proxy re-signature, and the non-repudiation is realized through a repudiation step.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a hash calculation method and a signcryption method of a homomorphic chameleon hash function. Background technique [0002] The chameleon hash function is a trapdoor one-way hash function, which can efficiently calculate the hash value, and without the trapdoor, it is difficult to find the collision of the hash. Existing chameleon hash functions are not homomorphic, so they cannot aggregate multiple hash values ​​into one hash value. The hash value without homomorphism needs to be hash calculated for each message, and the calculation results are not relevant. For a message composed of multiple messages, it needs to be recalculated according to its plaintext, so the calculation frequency is high. The computational overhead is high, and the hash value with homomorphism only needs to aggregate multiple values ​​simply and efficiently. Therefore, the calculation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L9/32
CPCH04L9/008H04L9/0643H04L9/085H04L9/0861H04L9/0869H04L9/3247
Inventor 张小松牛伟纳黄可李江超王垭潘文强
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products