Encrypted blind signature method based on quantum secret communication technology

A quantum secure communication and blind signature technology, which is applied in key distribution, can solve the problems of unproven actual security benefits, no unified industry standard, and large consumption of optical fiber resources.

Pending Publication Date: 2019-12-20
STATE GRID CORP OF CHINA +4
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, at present, quantum security communication technology is facing a series of problems in the process of marketization. One is the problems existing in the quantum security communication system itself, such as high equipment cost, large size, low stability, unproven actual security benefits, and product structure. Problems such as singleness, no unified industry standard, and large consumption of optical fiber resources are inevitable in the process of productization. In the final analysis, technological breakthroughs and industry standardization promotion are needed
Second, quantum secure communication technology mainly solves the problem of secure transmission of keys or random numbers, but key transmission is only a part of cryptographic applications. Separate key transmission from cryptographic applications will cause a series of problems due to different application modes. Key coordination and matching problems caused by

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted blind signature method based on quantum secret communication technology
  • Encrypted blind signature method based on quantum secret communication technology
  • Encrypted blind signature method based on quantum secret communication technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] An encrypted blind signature method based on quantum secret communication technology, (1) select two algorithms of blind signature and linear encryption, (2) construct encrypted blind signature by blind signature and linear encryption algorithm; (3) confuse encrypted blind signature ; (4) The core parameters in the process of steps 1-3 are transmitted using quantum secure communication technology.

[0077] Discuss technical scheme of the present invention in detail below and verify

[0078] (1) Overall architecture deployment method

[0079] The main deployment methods of traditional cryptographic devices are point-to-point and point-to-multipoint, specifically as figure 1 shown. Key generation is generated by a random number generator, and the key is transmitted to the peer cryptographic device through a key transmission protocol such as Diffie-Hellman or a digital envelope to realize key sharing. The key agreement is directly performed between the encryption devic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted blind signature method based on a quantum secret communication technology. According to the method, the encrypted blind signature function is obfuscated by adopting an obfuscation technology, so that the code of the code obtained by reverse engineering of an enemy is an obfuscated code, the blindness and the one-mcore unforgeability under the encrypted blind signature obfuscator are proposed, and a source program is prevented from being obtained by a user or an unauthorized user. Then, in the protocol interaction process, a cooperation mode of a quantum keygeneration device and an encryption device is adopted, and the transmission security is ensured through a quantum key security distribution system of the quantum key generation device.

Description

technical field [0001] The invention relates to an encryption blind signature method, in particular to an encryption blind signature method based on quantum secret communication technology. Background technique [0002] Digital signature is one of the main application directions of cryptographic algorithms, and it is an information security technology with message authentication, identity authentication, integrity authentication and encryption. With the in-depth application of signature technology in military, communication, e-commerce and other fields, ordinary digital signature can no longer meet people's special needs, so the special digital signature technology blind signature used to protect user privacy was proposed. The difference between it and the usual digital signature is that the user can obtain a valid signature without letting the signer know the signed message and any information related to the signed message, even if the signer obtains the signature later , ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0852H04L9/3257H04L9/0861
Inventor 冯笑黄琦斌欧清海林树洪汛林超赵鲲翔张伍伟张喆吴庆黄长贵叶跃骈陈如尹黎金城柯金发李锐李金泽张鸿凯
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products