Unlock instant, AI-driven research and patent intelligence for your innovation.

An authorized group signature system and method

A group signature and signer technology, applied in the field of cryptography, can solve the problems of difficulty in tracking defectors, the need for a secure channel to update user keys, and poor results, achieving low-loss effects.

Active Publication Date: 2022-03-04
WUHAN UNIV
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2001, Kim et al. proposed the first group signature scheme that can revoke group members, but the effect is not good
[0004] However, none of the existing group signature schemes can solve the following problems at the same time: 1) Group members cannot trace the identity of the signer when they are offline (without the assistance of an administrator), that is, offline traceability; 2) Update users after revoking them The key requires a secure channel; 3) It is not possible to further restrict the permissions of group members
[0005] It should be noted that although the group signature can make all group members have the ability to trace the identity of the signer by publicly opening the key in the group, this will make it difficult to track the betrayer in the group. In addition, when revoking, you need to Establish a secure channel between administrators and unrevoked users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authorized group signature system and method
  • An authorized group signature system and method
  • An authorized group signature system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to facilitate those of ordinary skill in the art to understand and implement the present invention, the following are combined with the accompanying drawings and embodiments, but it should be noted that these embodiments are not limitations of the present invention, and the functions and methods performed by those of ordinary skill in the art according to these embodiments , or structurally equivalent transformations or substitutions, all fall within the protection scope of the present invention.

[0033] please see figure 1 , an authorizable group signature system provided by the present invention, including group administrators, group users, and users outside the group;

[0034] The group administrator is the manager of the group, who keeps the private key of the group and the user key of the group members, and is responsible for the initialization of the public-private key pair of the group, the generation of the user key of the group member, the group Memb...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authorizable group signature system and method. The system includes a group administrator, a group user, and a user outside the group; The user key of the group member, and is responsible for the initialization of the public-private key pair of the group, the generation of the user key of the group member, and the revocation operation of the group member; the user key of the group member includes the signature key and the disclosure key. Key; group users are general users of the group. After joining the group, they will obtain their own user key through the group administrator, and can perform operations such as signing, verifying signatures, and revealing the signer; outside the group Users can verify messages and signatures through the public key disclosed by the group. The invention can realize the anonymity facing outside the group and the traceability facing inside the group.

Description

technical field [0001] The invention belongs to the technical field of cryptography, and relates to a group signature system and method, in particular to an authorizable group signature system and method. Background technique [0002] With the rapid development of applications related to group cooperation, people realize that signature mechanisms are needed to verify the legitimacy of identities and utilize their traceability and non-repudiation functions. Group members do not want the outside world of the group to be able to obtain the exact identity of the signer. This led to the birth of group signatures. The goal of group signature is to use the group to hide the signer's identity, and to get the real signer through the open operation when needed. [0003] The development of group signature (or anonymous signature mechanism based on group public key) can be roughly divided into four stages. The first stage is before 1999. Chaum and Heyst proposed the concept of group...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/088H04L9/0825H04L9/3255
Inventor 何琨陈晶杜瑞颖吴昊林张书东郑明辉
Owner WUHAN UNIV