Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method capable of updating chameleon hash function

A hash function and chameleon technology, applied in digital transmission system and key distribution, to achieve the effect of anti-key leakage, satisfying key leakage and using requirements

Active Publication Date: 2019-08-02
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the problems of the above research, the purpose of the present invention is to provide a method for updating the chameleon hash function to solve the problems of efficiency and security of the chameleon hash value of the chameleon hash function in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method capable of updating chameleon hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0050] The invention includes: system initialization, key generation, hash calculation, verification of chameleon hash value, calculation of collision, update of collision, periodic update of chameleon random numbers satisfying collision according to trapdoor key, and correct update The following Chameleon random number can pass the authentication at the current time point, otherwise, it cannot pass the authentication. The present invention is suitable for safe and efficient calculation of chameleon hash values, and can resist key leakage, and can periodically update chameleon random numbers that satisfy collisions, prevent collision values ​​from being abused, and improve the freshness of chameleon hash values ​​at the same time . details as follows:

[0051] A method for updating a chameleon hash function, comprising the following steps:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method capable of updating a chameleon hash function, and belongs to the technical field of network security. The method comprises the steps of initializing a system, generating a secret key, computing hash, verifying hash, computing collision, updating the collision, periodically updating a chameleon random number meeting the collision according to a trap door secret key, enabling the chameleon random number which is correctly updated to pass authentication at the current time point, otherwise, enabling the chameleon random number not to pass authentication, therebysolving the efficiency and safety problems of a chameleon hash value of the chameleon hash function in the prior art. The method is suitable for safely and efficiently calculating the chameleon hash value, can resist the secret key leakage, can periodically update the chameleon random number meeting collision, prevents the collision value from being abused, and improves the freshness of the chameleon hash value at the same time.

Description

technical field [0001] A method capable of updating a chameleon hash function belongs to the field of network security and is used for updating the hash value of the chameleon hash function of the chameleon hash function. Background technique [0002] To put it simply, the chameleon hash function is a one-way trapdoor function. In the absence of a trapdoor key, the output of a pair of chameleon hash values ​​that satisfy the collision is calculated (that is, the chameleon hash values ​​are consistent, but the chameleon random inconsistent numbers) is difficult. Chameleon hash function, as an early proposed cryptographic scheme, has been widely used in the design of schemes including: chameleon signature, non-repudiation signature, non-repudiation authentication, offline online signature and encryption, etc., as the cornerstone of the bottom layer of scheme design. [0003] There are efficiency and security issues with the current Chameleon hashrate. In terms of efficiency,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/0891H04L9/3236H04L9/3247
Inventor 张小松牛伟纳黄可李江超王垭胡斌
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products