Block chain system user identity anonymity and traceability method, corresponding storage medium and electronic device
A system user and user identity technology, applied in user identity/authority verification, transmission system, digital transmission system, etc., can solve the problems of not considering user identity supervision, low proof efficiency, complex implementation, etc., and achieve traceability Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0034] In order to make the above-mentioned objects, features and advantages of the present invention more obvious and understandable, the following will further illustrate the structure of the present invention through specific embodiments and drawings.
[0035] The present invention adopts the following technical solutions:
[0036] 1) Generation of certificates
[0037] The idea of certified signature in the paper "Fully Anonymous Group Signatures Without Random Oracles" written by Groth in 2007 is used to generate user certificates. Its verifiable signature scheme contains 4 algorithms (create, register, sign, verify). Among them, the present invention only uses the certificate generation part of the scheme, namely creation and registration.
[0038] A) Create algorithm Setup(1 k ):
[0039] The central Issuer produces the bilinear group gk:=(p,G,G T ,e,g)←G(1 k )., where G is the bilinear group generation algorithm, k is the system safety parameter, p is a large prime number, G...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap