Range proof method, device, computer equipment and storage medium

A client-end and key generation technology, applied in the field of information security, can solve the problem of high certificate management overhead

Active Publication Date: 2022-03-22
JUZIX TECH SHENZHEN CO LTD +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a data processing method, device, computer equipment, and storage medium to solve the problem of high certificate management overhead in the scheme of verifying the target object in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Range proof method, device, computer equipment and storage medium
  • Range proof method, device, computer equipment and storage medium
  • Range proof method, device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The principle and spirit of the present application will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present application, rather than to limit the scope of the present application in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of this disclosure to those skilled in the art.

[0073] Those skilled in the art know that the embodiments of the present application may be realized as a system, device, method or computer program product. Therefore, the disclosure of the present application can be specifically implemented in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0074]Considering that the current method of data verific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a range proof method, device, computer equipment and storage medium, wherein the method includes: sending the identity information of the first client to the key generation system, and receiving the user private key returned by the key generation system, Among them, the user's private key is generated by the key generation system based on the identity information and the system master private key; the preset base number is obtained, and each natural number smaller than the preset base number is signed according to the SM9 signature algorithm and the user's private key, and Send the multiple signatures obtained to the second client; receive the commitment value sent by the second client, wherein the commitment value is generated by the second client according to the target object; receive the blinded value returned by the second client, wherein the blind The devalue is generated by the second client according to multiple signatures and the target object, wherein the system master public key is generated by the key generation system; the target object is verified according to the commitment value and the blind value. The above solution avoids the high cost of certificate management and effectively reduces the cost.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a range proof method, device, computer equipment and storage medium. Background technique [0002] The zero-knowledge proof protocol can verify the target object without providing any useful information to the verifier, so that the verifier believes that a certain assertion is correct. This protocol is widely used in blockchain privacy protection, electronic cash Systems, group signature schemes, public verification secret sharing schemes, etc. [0003] At present, the most widely used method of verifying the target object is the signature blind method, but at present, this method uses a cryptographic system based on the PKI (Public Key Infrastructure, public key infrastructure) system, which requires CA ( Certificate Authority (Certificate Authorization Center) maintains and manages user public key certificates, mainly including the issuance, renewal, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/06
CPCH04L9/0863H04L9/3247H04L9/0643
Inventor 何德彪林超谢翔李升林孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products