A safe and efficient sm9 ring signature generation and verification method

A verification method and ring signature technology are applied in the field of information security to ensure unforgeability, improve the efficiency of signature and verification operations, and reduce the number of bilinear pairs.

Active Publication Date: 2021-04-27
WUHAN UNIV
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, many researchers have designed a variety of identity-based ring signature schemes based on the ring structure designed by Rivest et al., but this structure will cause computational overhead to grow linearly with the number of ring users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A safe and efficient sm9 ring signature generation and verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] This patent designs a safe and efficient SM9 ring signature generation scheme. In this scheme, the key generation center (KGC) is responsible for key distribution, and the signer (Signer) is responsible for spontaneously forming a signature group and completing the message signature. The verifier (Verifier) ​​can verify the validity of the message signature and judge whether the signer is a ring users. In terms of computational overhead, the ring signature scheme designed in this patent only needs one bilinear pairing operation to complete the signature, and the verifier only needs to perform two bilinear pairing op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe and efficient SM9 ring signature generation and verification method, including a key generation center KGC, a signer Signer, and a verifier Verifier, wherein the KGC is responsible for generating the user private key of the signing user in the system; The number of users is n, and the signer is the πth user in the user group; the method includes the following steps: 1) generating a ring signature for the message M; 2) verifying the validity of the signature obtained in step 1), and judging the signature Whether the user is an in-ring user. The invention provides a ring signature generation and verification scheme based on the SM9 digital signature algorithm, which ensures the unforgeability of the signature and the anonymity of the signer. The scheme ensures the spontaneity of the signer to generate user groups without the cooperation of other users. The invention adopts an accumulative structure to realize the ring signature, so that the number of bilinear pairings performed by the signature generation and verification algorithm is greatly reduced, and the efficiency of the signature and verification operation is effectively improved.

Description

technical field [0001] The invention relates to information security technology, in particular to a safe and efficient SM9 ring signature generation and verification method. Background technique [0002] Ring signature is a typical digital signature mechanism to achieve anonymity. It can realize that a certain user completes the signing of a message on behalf of a user group, and hides the identity of the signer in the user group. The signer first selects a temporary user group, which includes the signer himself, and then uses his own private key and the public key of other people in the user group to independently generate a signature without the help of others. The group of users chosen by the signer is generally called a ring. [0003] The ring signature technology was proposed by Ron Rivest, Adi Shamir and Yael Tauman in 2001, and it got its name from the ring signature structure in the scheme proposed by the three of them. Compared with group signature, it does not re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0825H04L9/0833H04L9/3066H04L9/3255
Inventor 何德彪彭聪范青贾小英罗敏黄欣沂
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products