Threshold group signature method based on public verification of block chain

A blockchain and group signature technology, applied in the field of information security, can solve the problems that the signature scheme cannot trace the user's identity and guarantee the user's privacy

Inactive Publication Date: 2019-11-01
ZHENGZHOU NORMAL UNIV
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of this application is to provide a threshold group signature method, trusted center and system based on blockchain that can be publicly verified, to solve the problem that existing signature schemes cannot trace user identities, and cannot achieve public verification. At the same time, the problem of ensuring user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold group signature method based on public verification of block chain
  • Threshold group signature method based on public verification of block chain
  • Threshold group signature method based on public verification of block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] The following is an introduction to Embodiment 1 of a threshold group signature method based on blockchain public verification provided by this application, see figure 1 , embodiment one includes:

[0060] S101. Determine the target message to be signed;

[0061] When users encounter electronic transactions or set private information during business processing, they often need to perform signature authentication on the business data of electronic transactions or private information. In this embodiment, the target message mainly refers to the business data to be signed and authenticated. in the field of e-commerce.

[0062] S102. Using the signature member to generate a share signature corresponding to the target message;

[0063] For signing members, when generating a share signature, first generate a random number, solve the corresponding hash value for the target message, and then use the random number, the hash value of the target message, the private key of the si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a threshold group signature method based on public verification of a block chain, a trusted center and a threshold group signature system. The scheme comprises the following steps: determining a to-be-signed target message; generating a share signature corresponding to the target message by using the signature member; synthesizing the share signatures of the signature members with the threshold number to obtain a target signature; and storing the target signature, the share signature of the signature member and the identity information of the signature member subjectedto secondary blinding processing into a block chain. Visibly, the scheme can trace back the user identity according to the signature information. In addition, the user identity is subjected to blind processing, so that the user privacy is effectively prevented from being leaked. Finally, the signature information and the blinded user identity information are stored on the block chain, and the block chain has non-revocable and non-tamperable capabilities, so that the third party can be prevented from maliciously tampering the contents, but other participants are allowed to open and verify the information.

Description

technical field [0001] This application relates to the field of information security, in particular to a threshold group signature method, a trusted center and a system based on a blockchain that can be publicly verified. Background technique [0002] E-commerce is a commercial activity that focuses on product exchange technology and has now become a popular form of trade. However, the security situation of e-commerce has been deteriorating. Billions of accounts have been stolen or controlled by hackers. Tens of thousands of user identities were leaked and even traded publicly. [0003] Electronic signature refers to the data existing in electronic form in the message, which is used to indicate that the signer approves the content, and is an important means to ensure information security. However, in the context of e-commerce, existing signature schemes either cannot trace user identities, or cannot guarantee user privacy while achieving public verification, or cannot guara...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06G06Q30/06
CPCG06Q30/0601H04L9/0866H04L9/3255H04L9/3257H04L63/12
Inventor 王利朋胡明生贾志娟付俊俊崔文军雷艳芳程亚歌张家蕾
Owner ZHENGZHOU NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products