Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An identity-based multi-proxy signature method and device for protecting private keys

A proxy signature and proxy signer technology, which is applied in the field of identity-based multiple proxy signatures and devices for protecting private keys, can solve the problems of key protection that cannot be solved in application scenarios, cannot be protected by multiple proxy signature keys, etc. Avoid revocation of identity problems and the effect of resisting key leakage

Active Publication Date: 2022-06-28
HUAIYIN INSTITUTE OF TECHNOLOGY
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method uses a helper, which can be used for key protection of proxy signature system, but not for key protection of multi-proxy signature
[0006] The above three methods cannot be used in the application scenario where an original signer authorizes a group of proxy signers to sign on behalf of the original signer, so it cannot solve the key protection problem in this application scenario

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An identity-based multi-proxy signature method and device for protecting private keys
  • An identity-based multi-proxy signature method and device for protecting private keys

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0050] The invention provides an identity-based multiple proxy signature method for protecting private keys. A credible facilitator is set up, and the facilitator helps the proxy signer generate an initial private key and a public key, and checks the proxy private key at the starting point of each time period. Update, generate the sub-agent keys of n proxy signers, n proxy signers jointly generate multiple proxy signatures, and the message verifier uses the identity of the original signer and the identity of the n proxy signers after receiving the multiple proxy signatures Verify multi-proxy signatures. like figure 1 shown, including the following steps:

[0051] Step 1: Build an identity-based multi-agent signature system and establish system parameters.

[0052] The identity-based multi-agent signature system constructed by the present invention includes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based multi-proxy signature method and device for protecting private keys. The method includes the following steps: (1) constructing an identity-based multi-proxy signature system and establishing system parameters; (2) generating real-time user private (3) generate real-time sub-proxy keys of n proxy signers; (4) n proxy signers jointly generate real-time multi-proxy signatures; (5) message verifier receives real-time multi-proxy After signing, verify the real-time multi-proxy signature with the identity of the original signer and the identities of n proxy signers. The present invention sets an independent and physically secure trusted assistant for each original signer and proxy signer, and this assistant helps the original signer and proxy signer to generate the initial value of the cryptographic system when using the secret value chosen by themselves. The private key avoids the problem of revoking the identity and realizes the anti-key disclosure function.

Description

technical field [0001] The invention relates to a multiple proxy signature method for protecting private keys, in particular to an identity-based multiple proxy signature method and device for protecting the original signer's private key, the proxy signer's private key and the sub-proxy private key. Background technique [0002] With the development of computer network technology, digital signatures have replaced traditional manual signatures and solved the problems of impersonation, denial and tampering in the network. A multi-proxy signature is a signature with special features that can be used in situations where the signer cannot complete the signature. The users of the multi-proxy signature scheme include the original signer, multiple proxy signers, and verifiers of proxy signatures. The original signer delegates the signing power to multiple proxy signers, multiple proxy signers jointly generate proxy signatures, and the proxy signature verifier verifies the validity ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/3247H04L9/0861H04L2209/76
Inventor 陈剑洪王文豪
Owner HUAIYIN INSTITUTE OF TECHNOLOGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products