Encryption threshold signature method based on confusion technology

A technology and threshold technology, applied in the field of threshold cryptography, can solve security risks and other problems, and achieve the effect of overcoming leakage and protecting private key fragmentation

Pending Publication Date: 2021-03-16
LANZHOU JIAOTONG UNIV
View PDF1 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security of the threshold cryptosystem is based on the security of the private key. Once the private key is leaked, the system will have a greater security risk.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption threshold signature method based on confusion technology
  • Encryption threshold signature method based on confusion technology
  • Encryption threshold signature method based on confusion technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them.

[0039] Such as figure 1 As shown, the encrypted threshold signature method based on obfuscation technology is applied to a cryptographic system based on obfuscation technology, and the method includes:

[0040] S101: The trusted third party generates the member's public parameter p and private key fragment sk according to the Setup algorithm i ; The public parameter p is public, and the private key fragment sk i is confidential;

[0041] The specific expression is:

[0042] p={q,G,G T ,e,g,g 1 , g 2,u′,U,VK};

[0043] sk=(sk 1 ,sk 2 ,...sk ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an encryption threshold signature method based on an obfuscation technology. The method comprises the following steps: generating a public parameter p and a private key fragmentski of a member according to a Setup algorithm; generating an encryption public key pke and a decryption private key ske of a receiver according to an encryption key generation algorithm; performingobfuscation processing on the private key fragments ski according to an obfuscation algorithm to obtain an obfuscated signature private key, performing message signature on a message m to be sent according to the obfuscated signature private key to generate a ciphertext, and sending the ciphertext to an information receiver. Due to the fact that the confusion technology is adopted, the threshold signer conducts confusion processing on the private key fragments, the problem that in the prior art, leakage is caused due to the fact that the private key fragments are prone to being attacked is solved, the private key fragments of the signer are effectively protected, and the safety of the private key fragments is greatly improved.

Description

technical field [0001] This application relates to the technical field of threshold cryptography, in particular, to an encryption threshold signature method based on obfuscation technology. Background technique [0002] In the (k,n) threshold signature scheme, when the number of participants is equal to or greater than the threshold value k, a valid signature can be generated. Threshold signature has the characteristics of power decentralization and risk sharing. In order to meet different application requirements, there are threshold group signatures suitable for mobile Internet, threshold ring signatures that implement blockchain technology, and threshold proxy signatures that solve ship ad hoc network authentication problems. However, the security of the threshold cryptosystem is based on the security of the private key. Once the private key is leaked, the system will have a greater security risk. For example, in a white-box attack environment, an attacker can easily ob...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3255H04L9/0861H04L9/0869
Inventor 李亚红王春丽黄海燕
Owner LANZHOU JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products