Traceable attribute-based anonymous authentication method, system and storage medium

An anonymous authentication and traceable technology, applied in transmission systems, digital transmission systems, user identity/authority verification, etc., can solve problems such as registration information interception and privacy leakage, and achieve strong privacy protection, high innovation and practical application value. Effect

Active Publication Date: 2022-05-03
JINAN UNIVERSITY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, during the registration process, there may be a risk of privacy leakage, such as registration information being intercepted, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traceable attribute-based anonymous authentication method, system and storage medium
  • Traceable attribute-based anonymous authentication method, system and storage medium
  • Traceable attribute-based anonymous authentication method, system and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0063] Such as figure 1 As shown, in the present invention, a traceable attribute-based anonymous authentication method comprises the following steps:

[0064] S1, system initialization, generate the master public key and the master private key by setting the algorithm, in this embodiment, specifically:

[0065] S11, system initialization, specifically:

[0066] Let Cre = (Cre.Setup, Cre.Gen, Cre.Verify) be an anonymous credential scheme with attributes;

[0067] Cre.Setup is the setup algorithm of the Cre scheme, specifically Cre.Setup(λ)→(pk,msk), input the security parameter λ, output the public parameter pk and the master private key msk, which are used to initialize the anonymous credential scheme;

[0068] Cre.Gen is the certificate generation algorithm of the Cre scheme, which is used to generate the user's anonymous credentials. Specifically, the common input of the user and the certificate authority is the public parameter pk and the commitment C i =Commit(L i ,r ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traceable attribute-based anonymous authentication method, system and storage medium. The method includes the following steps: system initialization, generating a master public key and a master private key by setting an algorithm; user anonymous credential generation, through interactive anonymous credential generation The algorithm generates the user's anonymous credential; anonymous authentication message, which authenticates the message through the authentication algorithm; verifies the authentication, verifies the authentication obtained through the authentication algorithm; tracks the secondary authentication user, if a user authenticates twice, anyone can pass Tracking algorithm to track users who have authenticated twice. Based on the existing anonymous authentication, the present invention realizes stronger privacy protection of registration anonymity and authentication anonymity, that is, complete anonymity, has a certain access control function, and at the same time realizes the function of allowing anyone to be publicly tracked. Anonymity and accountability are balanced under the premise of strong privacy protection.

Description

technical field [0001] The invention belongs to the technical field of anonymous authentication, and in particular relates to a traceable attribute-based anonymous authentication method, system and storage medium. Background technique [0002] Anonymous authentication is a typical authentication protocol, which can not only realize the function of authentication, but also ensure anonymity without revealing privacy. In group signature, group members can sign messages on behalf of the entire group without revealing their identities, but the group administrator can open the signature in case of disputes, so as to find the signer and achieve the purpose of tracking. The ring signature achieves stronger anonymity. Because there is no role of group administrator, no one can open the signature and find the signer. The general linkable group signature and linkable ring signature can realize the identification of two signatures of the same user, but cannot further trace a specific p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/0421H04L63/0823H04L63/083H04L9/3218H04L63/10
Inventor 赖俊祚李鹏吴永东
Owner JINAN UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products