Blind Signcryption Method in Lattice Public Key Cryptosystem

A public key cryptography system and blind signature technology, applied in the field of network information security, can solve problems such as low calculation efficiency, abnormal scheme signature, unqualified, etc., and achieve the effect of improving operation efficiency, resisting quantum attacks, and high operation efficiency

Active Publication Date: 2022-07-22
XIAN UNIV OF POSTS & TELECOMM
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2005, Yuan first proposed a provably secure identity-based blind signcryption using bilinear pairings, but this scheme uses too many bilinear pairing operations and has low computational efficiency.
In 2016, Tian et al. proposed the first identity-based partial blind signature scheme against quantum attacks on the lattice, but the scheme has a signature anomaly problem; even the signature generated by the interaction between the honest signer and the requester in the scheme may be unqualified signature
Currently there is no blind signcryption method under lattice public key cryptography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blind Signcryption Method in Lattice Public Key Cryptosystem
  • Blind Signcryption Method in Lattice Public Key Cryptosystem
  • Blind Signcryption Method in Lattice Public Key Cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] In this embodiment, the large prime number q is 2 128 For example, in figure 1 , the blind signcryption method under the lattice public key system of the present embodiment consists of the following steps:

[0077] A. System initialization

[0078] (A1) A trusted party defines a residual-like ring Z modulo q q The n-row and nk-column matrix G on, modulo q is:

[0079] q=p v

[0080] Wherein p is a large prime number, and v is a finite positive integer; in this embodiment, p is 2, and v is 128.

[0081] (A2) The trusted party defines three integers m 0 , m, m 1 Dimension to use as a matrix vector.

[0082] (A3) The trusted party defines the error rate α∈(0, 1) with error learning, and selects the Gaussian parameter

[0083]

[0084] (A4) The trusted party defines the ring R:

[0085] R=Z q [x] / f(x)

[0086] where f(x) is a polynomial. The f(x) of this embodiment is:

[0087] f(x)=x n +a n x n-1 +…+a 2 x+a 1

[0088] An irreducible polynomial whose ...

Embodiment 2

[0144] In this embodiment, the large prime number q is 2 256 For example, the blind signcryption method under the lattice public key system consists of the following steps:

[0145] A. System initialization

[0146] (A1) A trusted party defines a residual-like ring Z modulo q q The n-row and nk-column matrix G on, modulo q is:

[0147] q=p v

[0148] where p is a large prime number, and v is a finite positive integer; in this embodiment, p is 2 and v is 256.

[0149] The other steps of this step are the same as in Example 1.

[0150] Other steps are the same as in Example 1.

Embodiment 3

[0152] In this embodiment, the large prime number q is 2 512 For example, the blind signcryption method under the lattice public key system consists of the following steps:

[0153] A. System initialization

[0154] (A1) A trusted party defines a residual-like ring Z modulo q q On an n-row and nk-column matrix G, q is:

[0155] q=p v

[0156] where p is a large prime number, and v is a finite positive integer; in this embodiment, p is 2 and v is 512.

[0157] The other steps of this step are the same as in Example 1.

[0158] Other steps are the same as in Example 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A blind sign encryption method under lattice public key cryptosystem is characterized in that it consists of system initialization, user key generation, message owner blinded message, user signature and encryption, and verification steps. The invention learns from the blind signcryption and lattice encryption methods under the traditional cryptosystem, and constructs a lattice-based post-quantum blind signcryption method. Compared with the blind signcryption method under the assumption of finite field discrete logarithm and elliptic curve discrete logarithm, the blind signature method of , adds a certain blinding message μ in the signcryption scheme, which increases the blinding function. , which makes the signcryption anonymous, which effectively protects the privacy of the message owner, can resist quantum attacks and has higher computational efficiency, and can be used in the field of electronic signcryption technology.

Description

technical field [0001] The invention belongs to the technical field of network information security, and specifically relates to cryptography, a lattice public key cryptosystem or a blind signcryption method. Background technique [0002] Signcryption can perform both encryption and signing operations in one logical step at a much lower computational and communication cost than signing before encrypting. However, as a very important cryptographic primitive, the development of signcryption on lattices is relatively slow. [0003] In 1996, Ajtai found a connection between the worst-case and average-case complexity of some well-known lattice problems. Later, Ajtai and Dwork proposed a public key cryptosystem based on lattice theory, which has opened up a new field for public key cryptosystems since then. Public key cryptosystems based on lattice theory, such as GGH public key cryptosystem, NTRU public key cryptosystem and Regev public key cryptosystem, have been proposed succ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0643H04L9/3247H04L9/0863H04L9/0869H04L9/0861
Inventor 俞惠芳白璐
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products