Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous revocation ring signature based on public chain and generation and revocation method of anonymous revocation ring signature

A ring signature and ring member technology, applied in the field of network security, can solve the problems of inability to realize anonymous identity, poor network security, anonymous identity tracking, etc., and achieve the effect of traceable anonymous identity conditions, efficient generation, and improved network security

Active Publication Date: 2019-08-30
UNIV OF ELECTRONIC SCI & TECH OF CHINA
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a method for generating an anonymously revocable ring signature based on a public chain in order to solve the problem that the anonymous identity of nodes in the existing public chain cannot be tracked, resulting in poor network security
At the same time, in order to solve the problem that it is impossible to adjudicate the anonymous identity of the nodes in the existing public chain and revoke the rebellious nodes, resulting in poor network security, a ring signature revocation method based on the public chain that can be anonymously revoked is provided.
In order to solve the problem of poor network security caused by the inability to track and adjudicate the anonymous identity of nodes in the existing public chain and revoke the rebellious nodes in the public chain at the same time, a ring signature based on the public chain that can be anonymously revoked is provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous revocation ring signature based on public chain and generation and revocation method of anonymous revocation ring signature
  • Anonymous revocation ring signature based on public chain and generation and revocation method of anonymous revocation ring signature
  • Anonymous revocation ring signature based on public chain and generation and revocation method of anonymous revocation ring signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] The preferred embodiment of the present invention provides an anonymously revokable ring signature based on the public chain, such as figure 1 As shown, it includes a self-certification-based ring signature generation module and an anonymous identity revocation module. The self-certification-based ring signature generation module is used to generate a ring signature that can be revoked anonymously, and the anonymous identity revocation module is used to revoke a ring signature with anonymous revocation The anonymous identity of the signed ring member. The ring signature generation module based on self-certification includes a key generation unit, a self-certification generation unit, a self-certification verification unit, and a parallel ring signature generation unit. The anonymous identity revocation module includes a revocation initialization unit, a revocation resolution initiation unit, and a revocation resolution judgment unit. , canceling the valid judgment unit....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous revocation ring signature based on a public chain and a generation and revocation method of the anonymous revocation ring signature, relating to the technical field of network security, the ring signature comprises a self-proving-based ring signature generation module and an anonymous identity cancellation module; the self-proving-based ring signature generation module comprises a key generation unit, a self-proving generation unit, a self-proving verification unit and a parallelizable ring signature generation unit, and the anonymous identity revocation module comprises a revocation initialization unit, a revocation initiation unit, a revocation judgment unit and a revocation effectiveness judgment unit. According to the invention, a ring signature parallel computing method based on cloud computing, an anonymous voting method based on ring signatures and a threshold password strategy are comprehensively used to realize efficient generation of ringsignatures of users on a public chain, conditional revocation of anonymous identities and security, fairness and credibility of a revocation process, so that the network security is improved.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to an anonymously revokable ring signature based on a public chain and a method for generating and revoking the ring signature, which is used to realize efficient generation of ring signatures for users on the public chain, conditional revocation of anonymous identities, and Ensure the security, fairness and credibility of the revocation process. Background technique [0002] Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, etc. It is essentially a decentralized database. According to the classification of participants, blockchain can be divided into public chain, alliance chain and private chain. Among them, the public chain refers to a blockchain in which anyone in the world can read and send transactions and the transactions can be effectively co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3255H04L63/0407H04L63/12H04L67/104H04L2209/42H04L2209/463
Inventor 张小松黄可牛伟纳潘文强蓝皓月罗宇恒
Owner UNIV OF ELECTRONIC SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products