Attribute-Based Linkable Network Ring Signature Method

A ring signature and attribute technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve problems such as failure to resist collusion attacks, difficulty in solving secondary signatures, and failure to achieve linkability. High security, strong anonymity, and the effect of ensuring anti-collusion attack

Active Publication Date: 2021-08-03
芽米科技(广州)有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method fails to achieve linkability, cannot determine whether two signatures are signed by the same person, and is difficult to solve the problem of secondary signatures in the Internet field such as electronic cash, electronic elections, and electronic spending.
In addition, this signature method also has the problem of being unable to resist collusion attacks. Users with complementary attributes can still generate legal signatures that they cannot generate individually by combining keys.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attribute-Based Linkable Network Ring Signature Method
  • Attribute-Based Linkable Network Ring Signature Method
  • Attribute-Based Linkable Network Ring Signature Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0053] A specific embodiment of the present invention is an attribute-based linkable network ring signature method, and the process of the proposed method is as follows:

[0054] (1) System establishment stage

[0055] a) System public parameter generation

[0056] First, the attribute authorization center AA is in the finite domain Randomly select an integer α as the system master key MSK, where q is greater than 2 512 is a safe prime number; then, the attribute authorization center AA randomly selects two cyclic multiplicative groups G with order p 1 , G 2 , and define a bilinear map e:G 1 ×G 1 →G 2 ; Finally, the attribute authorization center AA from the group G 1 Randomly select two elements in the public key as a g 1 and public key three g 3 , at the same time the public key - g 1 Perform modular exponent operation to get the public key 2g 2 : public key 2 , public key three g 3 Perform bilinear pairing operation to generate public key 4g 4 , g 4 =e(g ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an attribute-based linkable network ring signature method. The method is mainly as follows: in the signature stage, the link label is generated by randomly selecting parameters to ensure linkability between signatures with the same link label, and the linkability It can be decided by the signer independently, and can prove whether the two signatures are signed by the same person without revealing the identity of the real signer; by injecting an identity into each user's private key during the attribute key generation stage, this method can Resists Collusion Attacks. This method has strong anonymity and high security, can effectively solve the secondary signature problem existing in electronic cash, electronic voting, etc., and provides anonymous identity authentication and access control functions.

Description

technical field [0001] The invention belongs to the technical field of digital signatures in cryptography, and relates to a network anonymous identity authentication method supporting chainability. Background technique [0002] As a new type of asymmetric cryptography, attribute-based signature has the advantages of strong expressive ability, flexible use, and convenient identity concealment. It is especially suitable for providing anonymous identity authentication in the Internet, and has attracted more and more scholars' attention. This system divides the population at a fine-grained level through attributes, expresses the identity in the original identity-based signature system as an attribute set, and adds the concept of access structure to the identity-based signature system, if and only if the user attribute set Only when the access structure is satisfied can the attribute private key be used for signature. Compared with the identity-based signature system, the attrib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/085H04L9/0861H04L9/3255
Inventor 张文芳管桂林王小敏焦恒
Owner 芽米科技(广州)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products