A Blind Signature Generation Method for Recoverable Messages Based on Identity

A blind signature and message technology, applied in the field of information security, can solve problems such as message transmission overhead, dispute resolution, and adverse effects of behavior tracking, so as to avoid certificate management problems, reduce communication and storage overhead, and reduce system operation and maintenance costs. Effect

Active Publication Date: 2022-03-22
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2) Message transmission overhead problem
[0006] 3) Regulatory issues
Anonymity is a double-edged sword. On the one hand, the blinding nature of blind signatures protects user privacy well, but on the other hand, it has adverse effects on dispute resolution and behavior tracking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Blind Signature Generation Method for Recoverable Messages Based on Identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make it easier for those skilled in the art to understand the technical solution of this patent, and at the same time, in order to make the technical purpose, technical solution and beneficial effect of this patent clearer, and to fully support the protection scope of the claims, the following is a specific case in the form of this patent. The technical solution of the patent makes further and more detailed descriptions.

[0032] An identity-based blind signature generation method for recoverable messages involves four roles: key generation center KGC, signer, user and verifier. First, the KGC completes the system parameter setting and the generation of the system master key pair. Secondly, KGC issues the private key d corresponding to its identity ID to each signer ID . Afterwards, in the signature phase, the signer first challenges the user with a random point R, and the user uses blinding factors α, β to blind the message m to obtain The signer then u...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity-based method for generating a recoverable message blind signature, which belongs to the technical field of information security. In this method, the key is generated by the key generation center, and the signature private key is issued to each signer; then, the user blinds the message, and then the signer signs the blinded message to obtain a blinded signature, and finally The user deblinds the blinded signature to obtain the final signature. Finally, the verifier uses the signer's public key to verify the validity of the signature, and if it is legal, extracts the message. In the process of signing, the present invention uses a double-blind technology to destroy the linearity of messages and signatures, thereby realizing the blindness, untraceability and supervisability required by the blind signature scheme.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an identity-based method for generating blind signatures of recoverable messages. Background technique [0002] With the emergence and development of digital currency, blockchain technology is leading the global technological revolution, industrial revolution and digital revolution as a disruptive technology in the era of digital economy. Blockchain transaction security is the basis for the operation of the blockchain system, and anonymous transactions are an important means to protect user transaction privacy. Generally speaking, digital signatures replace traditional handwritten signatures with the feature of unforgeability, and are widely used in blockchain systems to identify data, behaviors, etc. However, in traditional digital signatures, the signer must know the specific content of the signed information, making it difficult to apply to scenarios such as elec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/06
CPCH04L9/3247H04L9/3257H04L9/3073H04L9/0643
Inventor 文义红彭聪罗敏何德彪王士成于君娜陈金勇徐小刚
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products