Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Strategy control signature method supporting privacy protection

A technology of policy control and privacy protection, applied to the public key and key distribution of secure communication, which can solve the problems of access policy hiding and achieve the effect of solving privacy protection problems

Active Publication Date: 2020-07-17
武汉力龙信息科技股份有限公司
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2011, Waters proposed a CP-ABE scheme based on LSSS access matrix, but the access strategy was not hidden in the scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Strategy control signature method supporting privacy protection
  • Strategy control signature method supporting privacy protection
  • Strategy control signature method supporting privacy protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the implementation examples described here are only used to illustrate and explain the present invention, and are not intended to limit this invention.

[0022] In order to integrate the above-mentioned advantages of attribute-based signature, policy-based signature and policy hiding technology, the present invention firstly forms an LSSS-based policy control signature based on Chen Weidan's LSSS-based hidden policy attribute-based encryption scheme and policy control signature, and introduces a hidden The idea of ​​access policy finally proposes a policy-controlled signature method that supports privacy protection, which meets three requirements: first, the signer formulates an access policy and attaches it to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a strategy control signature method supporting privacy protection. The idea of strategy control signature is introduced, the access strategy is embedded into the signature, a sender is allowed to specify a receiver with the attribute to verify the authenticity of the message, when sensitive data is processed, the privacy of the sender to the message and more application scenes are improved, and fine-grained permission control over the verifier is achieved. Meanwhile, global attributes are set, noise attributes are increased, a linear secret sharing matrix (LSSS) is adopted as an access structure, the expression capacity is high, a three-prime-number-sum-order bilinear group is used for hiding an actual access strategy, the processed global attributes are disclosed,and the verification efficiency and the feasibility of actual application are improved.

Description

technical field [0001] The invention belongs to the technical field of digital signatures in information security, and relates to a policy-controlled signature method supporting privacy protection, in particular to a method for digitally signing messages to be released in combination with policy-controlled signatures in an attribute-based encrypted signature system At the same time, attach the access control signature method that hides the detailed policy. Background technique [0002] Attribute-based signatures are developed from attribute-based public key cryptosystems, and Shamir first proposed the concept of identity-based encryption in 1984. In the cryptographic system based on identity encryption, the user's identity information can be directly used as a public key, thus avoiding the problem of public key certificates. Sahai and Waters first proposed the concept of attribute-based encryption in 2005. The user identity is represented by a set of attributes. The set of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/083H04L9/085H04L9/3073H04L9/3247H04L9/3252
Inventor 孟博郑绪睿王德军朱容波
Owner 武汉力龙信息科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products