Unlock instant, AI-driven research and patent intelligence for your innovation.

Hash Calculation Method and Signcryption Method Based on Homomorphic Chameleon Hash Function

A hash function and hash calculation technology, applied in the hash calculation method of the homomorphic chameleon hash function and the field of signcryption, can solve the problem that the user privacy protection effect is not good enough, the chameleon hash function does not have homomorphism, cannot Problems such as aggregation of multiple hash values

Active Publication Date: 2021-01-08
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to solve the problem that the existing chameleon hash function for hash calculation does not have homomorphism, cannot aggregate multiple hash values, and the existing signcryption method cannot support proxy re-signature and simultaneous signature in one framework. Multiple functions of morphism and non-repudiation, the user privacy protection effect is not good enough, a hash calculation method and a signcryption method of the homomorphic chameleon hash function are proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hash Calculation Method and Signcryption Method Based on Homomorphic Chameleon Hash Function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] A preferred embodiment of the present invention provides a hash calculation method based on the homomorphic chameleon hash function, the method is as follows:

[0060] Step 1. System initialization: get the system public parameter param HKFC . Specifically:

[0061] First select the security parameter λ, select a prime number q according to the security parameter λ, and then select a GDH group G whose order is q and whose generator is g, and then select the hash function H 1 :{0,1} * → Z q ,Z q It is an integer group of order q, output {G,q,g,H 1} as the system public parameter param HKFC . The GDH group here refers to such a group: on it, the Computational Diffie-Hellman (CDH) problem is difficult, but the Decisional Diffie-Hellman (DDH) problem is simple, and the GDH group can be formed by a superbasis elliptic curve or The hyperelliptic curve construction on the finite field is obtained, and the specific method can be found in the article "Short signature fro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a hash calculation method and a signcryption method based on a homomorphic chameleon hash function. The proposed homomorphic chameleon hash function has a chameleon hash value in the form of a logarithm. The signcryption method is based on the The result of hash signcryption is also in the form of logarithm, which is homomorphic. Homomorphic aggregation can be performed in hash calculation to calculate hash more efficiently, and the homomorphic chameleon hash function is both homomorphic and anti-secret There are two key leaks. The implementation of the signcryption method is based on the homomorphic chameleon hash function. Homomorphic aggregation signcryption guarantees homomorphism. The system public parameters generated by system initialization are used together by the chameleon hash function and signcryption. The two cryptographic schemes share a set System parameters, so multiple functional effects can be realized under a set of shared system parameters, and multiple functions can be supported under the same framework. Second, the proxy key generation and proxy re-signature steps implement proxy re-signature. Performing the repudiation step achieves non-repudiation.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a hash calculation method and a signcryption method of a homomorphic chameleon hash function. Background technique [0002] The chameleon hash function is a trapdoor one-way hash function, which can efficiently calculate the hash value, and without the trapdoor, it is difficult to find the collision of the hash. Existing chameleon hash functions are not homomorphic, so they cannot aggregate multiple hash values ​​into one hash value. The hash value without homomorphism needs to be hash calculated for each message, and the calculation results are not relevant. For a message composed of multiple messages, it needs to be recalculated according to its plaintext, so the calculation frequency is high. The computational overhead is high, and the hash value with homomorphism only needs to aggregate multiple values ​​simply and efficiently. Therefore, the calculation...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/00H04L9/06H04L9/08H04L9/32
CPCH04L9/008H04L9/0643H04L9/085H04L9/0861H04L9/0869H04L9/3247
Inventor 张小松牛伟纳黄可李江超王垭潘文强
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA