Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for verifying range of ciphertext message

A message and ciphertext technology, applied in the field of information security, can solve problems such as leakage

Active Publication Date: 2020-10-30
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The prover proves to the verifier and makes him believe that he knows or has a certain message, but the proof process cannot leak any information about the proven message to the verifier

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for verifying range of ciphertext message
  • A method and system for verifying range of ciphertext message
  • A method and system for verifying range of ciphertext message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to more clearly illustrate the technical solutions of the embodiments of the present specification, the following briefly introduces the drawings that need to be used in the description of the embodiments. Apparently, the accompanying drawings in the following description are only some examples or embodiments of this specification, and those skilled in the art can also apply this specification to other similar scenarios. Unless otherwise apparent from context or otherwise indicated, like reference numerals in the figures represent like structures or operations.

[0022] It should be understood that "system", "device", "unit" and / or "module" as used herein is a method for distinguishing different components, elements, components, parts or assemblies of different levels. However, the words may be replaced by other expressions if other words can achieve the same purpose.

[0023] As indicated in the specification and claims, the terms "a", "an", "an" and / or "the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and system for verifying a ciphertext message range. The method comprises the following steps: acquiring a ciphertext message; obtaining commitmentsof an attestation party for a to-be-verified message and an interference value of the to-be-verified message; acquiring commitments of the proving party to the first interference factor and commitments of the proving party to the disturbance coefficient of the disturbance polynomial; acquiring an aggregation factor interference value generated by a proving party, a second-order interference valueof the first random factor, a first interference value, a second interference value and a private key interference value; and verifying whether the to-be-verified message belongs to a to-be-verified range at least based on the obtained message, commitment and value. The verification party verifies the range of the ciphertext message in a zero-knowledge proof mode, the verification party does not know any specific numerical value of the to-be-verified message in the verification process, and then privacy of all parties is protected.

Description

technical field [0001] This specification relates to the field of information security, in particular to a method and system for verifying the range of ciphertext messages. Background technique [0002] Zero-Knowledge Proof refers to the fact that the prover can convince the verifier that a certain assertion is correct without providing any useful information to the verifier. A zero-knowledge proof is essentially an agreement involving two or more parties, that is, a series of steps that two or more parties need to take to complete a task. The prover proves to the verifier and makes him believe that he knows or has a certain message, but the proof process cannot leak any information about the proven message to the verifier. [0003] The verification of the ciphertext message range is a zero-knowledge proof, in which the prover does not disclose the message to be verified to the verifier, and the verifier proves and makes it believe that it has a value within a certain range...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0822H04L9/3221H04L63/0428H04L63/0876
Inventor 马宝利
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD