Extensible false name certificate system and method
A technology called certificate and certificate, applied in the field of computer communication network security, can solve the problems of invalidity, conflicting user privacy concerns, and low efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0134] In the following description, a first embodiment according to the present invention will be described with reference to FIGS. 9 to 18 .
[0135] Fig. 9 is a block diagram schematically showing the system architecture of the first embodiment of the present invention.
[0136] According to a first embodiment, the trusted entity is a certification authority, CA. The data of user U to be verified by the verifier is user U's anonymous public key.
[0137] Assuming that U has passed the personal identity verification, the CA issues a root certificate (RC) to U. From this root certificate, U generates a pseudonym certificate for his / her anonymous public key. Then, U sends the anonymous public key (APK1, APK2, APK3...) equipped with the pseudonym certificate (PC1, PC2, PC3...) to the verifier V (V1, V2, V3...). V verifies the pseudonymous certificate received from U and accepts the certificate if predetermined conditions are met.
[0138] In the first embodiment, U can deri...
no. 2 example
[0210] In the following description, a second embodiment according to the present invention will be described with reference to FIGS. 19 to 24 .
[0211] A second embodiment of the present invention utilizes a group signature scheme to generate pseudonymous certificates of public keys. Here, the public key may be a noncomparable public key, an anonymous public key, or any other public key of the user.
[0212] Group signature schemes have been well studied over the past 15 years (see D. Chaum, E. van Heyst, Group Signatures, Advances in Cryptology - EUROCRYPTO'91, pp. 257-265, 1991; J. Camenisch, M. Michels, A Group Signature Scheme Based on an RSA-Variant, Advances in Cryptology-ASIACRYPT'98, pp.160-174, 1998; and G. Ateniese, J. Camenisch, M. Joye, G. Tsudik, A Practical and Provably Secure Coalition - Resistant Group Signature Scheme, Advances in Cryptology-CRYPTO'2000, pp. 255-270, 2000, which are hereby incorporated by reference). Briefly, there is a group manager, whic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 