Unlock instant, AI-driven research and patent intelligence for your innovation.

Controllable anonymous authentication method, system and device based on ciphertext packet link encryption

An anonymous authentication and group encryption technology, applied in the blockchain field, can solve the problems of single point attack, loss of security of anonymous certificates, dishonesty of supervisor nodes, etc., to achieve the effect of high decryption efficiency and improved security

Pending Publication Date: 2022-08-05
HANGZHOU YUNXIANG NETWORK TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] There are also certain problems in this scheme. In the identity tracking stage, a single supervisor node uses its own key to reveal the true identity of the anonymous certificate holder. Therefore, the supervisor node is dishonest or suffers a single point of attack, and the anonymous certificate will be lost. security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Controllable anonymous authentication method, system and device based on ciphertext packet link encryption
  • Controllable anonymous authentication method, system and device based on ciphertext packet link encryption
  • Controllable anonymous authentication method, system and device based on ciphertext packet link encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0078] In order to clearly illustrate the present invention and make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. It enables those skilled in the art to refer to the description text and implement accordingly. The technology of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments.

[0079] The HMAC algorithm is a key-based verification method for message integrity, and its security is based on the Hash encryption algorithm. It requires both parties to share a key, agree on an algorithm, and perform Hash operation on the message to form a fixed-length authentication code. Both parties of the communication determine the validity of the message by chec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a controllable anonymous authentication method, system and device based on ciphertext packet link encryption, and the method comprises the steps: (1) an anonymous certificate authentication center receives an anonymous certificate request, and generates an anonymous certificate public key; (2) the anonymous certificate authentication center generates an expansion domain of the anonymous certificate; (3) the client generates an anonymous certificate private key; (4) the supervisor node carries out distributed storage on the supervision key and the anonymous certificate ID, and carries out packet encryption by adopting a ciphertext packet link encryption mode; and (5) the sub-supervisor node carries out grouping decryption on the supervision key and the anonymous certificate ID to obtain the supervision key and the anonymous certificate ID, and anonymous identity authentication is completed. According to the controllable anonymous authentication method, the resistance of controllable anonymous authentication to a single-point attack is enhanced through a distributed storage and block encryption method, parallel computing during decryption is supported, the decryption efficiency is high, and therefore the controllable anonymous authentication method which is more efficient, safer and more reliable is achieved.

Description

technical field [0001] The invention belongs to the technical field of blockchain, and in particular relates to a controllable anonymous authentication method, system and device based on ciphertext block chain encryption. Background technique [0002] As an emerging storage technology, blockchain has the characteristics of decentralization, immutability, distributed consensus, traceability and eventual consistency, which makes it suitable for solving data management problems in untrusted environments. [0003] However, on the public chain, transaction data can be viewed by all participants, so there is a serious privacy leakage problem. For example, an attacker can analyze the public data on the blockchain. Since the data on the chain saves a large number of transaction samples, it is not difficult to infer the corresponding entity identity behind the transaction account by establishing a mapping relationship between the input and output addresses and combining the transacti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/40
CPCH04L9/3255H04L63/0421H04L63/083
Inventor 黄步添陈弘超梁逸敏沈玮邵辉刘振广
Owner HANGZHOU YUNXIANG NETWORK TECH