Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous revokable ring signature based on public chain and its generation and revocation methods

A ring signature and ring membership technology, applied in the field of network security, can solve the problems of anonymous identity tracking, poor network security, and inability to achieve anonymous identity, and achieve the effect of efficient generation and improved network security.

Active Publication Date: 2021-11-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The purpose of the present invention is to provide a method for generating an anonymously revocable ring signature based on a public chain in order to solve the problem that the anonymous identity of nodes in the existing public chain cannot be tracked, resulting in poor network security
At the same time, in order to solve the problem that it is impossible to adjudicate the anonymous identity of the nodes in the existing public chain and revoke the rebellious nodes, resulting in poor network security, a ring signature revocation method based on the public chain that can be anonymously revoked is provided.
In order to solve the problem of poor network security caused by the inability to track and adjudicate the anonymous identity of nodes in the existing public chain and revoke the rebellious nodes in the public chain at the same time, a ring signature based on the public chain that can be anonymously revoked is provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous revokable ring signature based on public chain and its generation and revocation methods
  • Anonymous revokable ring signature based on public chain and its generation and revocation methods
  • Anonymous revokable ring signature based on public chain and its generation and revocation methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] The preferred embodiment of the present invention provides an anonymously revokable ring signature based on the public chain, such as figure 1 As shown, it includes a self-certification-based ring signature generation module and an anonymous identity revocation module. The self-certification-based ring signature generation module is used to generate a ring signature that can be revoked anonymously, and the anonymous identity revocation module is used to revoke a ring signature with anonymous revocation The anonymous identity of the signed ring member. The ring signature generation module based on self-certification includes a key generation unit, a self-certification generation unit, a self-certification verification unit, and a parallel ring signature generation unit. The anonymous identity revocation module includes a revocation initialization unit, a revocation resolution initiation unit, and a revocation resolution judgment unit. , canceling the valid judgment unit....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymously revocable ring signature based on a public chain and its generation and revocation methods, and relates to the technical field of network security. The ring signature includes a self-certification-based ring signature generation module and an anonymous identity revocation module, and a self-certification-based The ring signature generation module includes a key generation unit, a self-certification generation unit, a self-certification verification unit, and a parallel ring signature generation unit. The anonymous identity revocation module includes a revocation initialization unit, a revocation decision initiation unit, a revocation decision judgment unit, and a revocation validation judgment unit. The present invention comprehensively uses the cloud computing-based ring signature parallel computing method, the ring signature-based anonymous voting method and the threshold password strategy, and realizes the efficient generation of ring signatures of users on the public chain, conditional revocation of anonymous identities, and the completeness of the revocation process. Safe, impartial and trustworthy, thereby improving network security.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to an anonymously revokable ring signature based on a public chain and a method for generating and revoking the ring signature, which is used to realize efficient generation of ring signatures for users on the public chain, conditional revocation of anonymous identities, and Ensure the security, fairness and credibility of the revocation process. Background technique [0002] Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm, etc. It is essentially a decentralized database. According to the classification of participants, blockchain can be divided into public chain, alliance chain and private chain. Among them, the public chain refers to a blockchain in which anyone in the world can read and send transactions and the transactions can be effectively co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3255H04L63/0407H04L63/12H04L67/104H04L2209/42H04L2209/463
Inventor 张小松黄可牛伟纳潘文强蓝皓月罗宇恒
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products