Traceable attribute-based anonymous authentication method and system and storage medium

An anonymous authentication and traceable technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as registration information interception and privacy leakage

Active Publication Date: 2021-04-02
JINAN UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the registration process, there may be a risk of privacy leakage, such as registration information being intercepted, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable attribute-based anonymous authentication method and system and storage medium
  • Traceable attribute-based anonymous authentication method and system and storage medium
  • Traceable attribute-based anonymous authentication method and system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0063] Such as figure 1 As shown, in the present invention, a traceable attribute-based anonymous authentication method comprises the following steps:

[0064] S1, system initialization, generate the master public key and the master private key by setting the algorithm, in this embodiment, specifically:

[0065] S11, system initialization, specifically:

[0066] Let Cre = (Cre.Setup, Cre.Gen, Cre.Verify) be an anonymous credential scheme with attributes;

[0067] Cre.Setup is the setup algorithm of the Cre scheme, specifically Cre.Setup(λ)→(pk,msk), input the security parameter λ, output the public parameter pk and the master private key msk, which are used to initialize the anonymous credential scheme;

[0068] Cre.Gen is the certificate generation algorithm of the Cre scheme, which is used to generate the user's anonymous credentials. Specifically, the common input of the user and the certificate authority is the public parameter pk and the commitment C i =Commit(L i ,r ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traceable attribute-based anonymous authentication method and system and a storage medium, and the method comprises the following steps: initializing a system, and generatinga main public key and a main private key through setting an algorithm; generating a user anonymous certificate: generating the anonymous certificate of the user through an interactive anonymous certificate generation algorithm; anonymously authenticating the message, and authenticating the message through an authentication algorithm; verification and authentication: verifying the obtained authentication through a verification algorithm; and tracking the user subjected to secondary authentication, wherein if a certain user is authenticated twice, any person can track and authenticate the usersubjected to secondary authentication through a tracking algorithm. On the basis of existing anonymous authentication, stronger privacy protection, namely complete anonymity, of registration anonymityand authentication anonymity is achieved, a certain access control function is achieved, meanwhile, the function of allowing anyone to open and track is achieved, and anonymity and responsibility arebalanced on the premise that strong privacy protection is provided.

Description

technical field [0001] The invention belongs to the technical field of anonymous authentication, and in particular relates to a traceable attribute-based anonymous authentication method, system and storage medium. Background technique [0002] Anonymous authentication is a typical authentication protocol, which can not only realize the function of authentication, but also ensure anonymity without revealing privacy. In group signature, group members can sign messages on behalf of the entire group without revealing their identities, but the group administrator can open the signature in case of disputes, so as to find the signer and achieve the purpose of tracking. The ring signature achieves stronger anonymity. Because there is no role of group administrator, no one can open the signature and find the signer. The general linkable group signature and linkable ring signature can realize the identification of two signatures of the same user, but cannot further trace a specific p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0421H04L63/0823H04L63/083H04L9/3218H04L63/10
Inventor 赖俊祚李鹏吴永东
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products