Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

62 results about "Aggregate signature" patented technology

Motorcade establishment and management method and system based on block chain and PKI authentication mechanism

The invention belongs to the technical field of safety communication between motorcades in Internet of Vehicles, and discloses a motorcade establishment and management method and system based on a block chain and a PKI authentication mechanism. The method is mainly divided into two parts of motorcade establishment and group key agreement and update; the motorcade establishment part comprises the following main processes of member registration, member identity authentication and group head aggregate signature; and the group key agreement and update part comprises the following main processes ofgroup key agreement and group key update for dynamic joining and exiting of a vehicle. According to the method and the system, the block chain is combined with the PKI authentication mechanism, a problem of identity authentication of the vehicle, a server and an RSU in the Internet of Vehicles is solved; the motorcade establishment is completed based on an elliptic curve, a bilinear pairing technology and an aggregate signature; and the group key agreement and update can be realized based on a DDH difficulty problem, the forward and backward safety is achieved, and the safety of member communication in the motorcade is ensured.
Owner:XIAN UNIV OF POSTS & TELECOMM

A medical health monitoring network model information processing method and system based on signature aggregation

The invention belongs to the technical field of information security, and discloses a medical health monitoring network model information processing method and system based on signature aggregation. The third party authority center provides a pair of public and private keys and a pseudo identity for the user sensor, and stores the real identity and the pseudo identity of the user in a key value pair form; The user sensor encrypts medical information through a public key of the medical server and signs the encrypted information by using a sensor private key; Enabling the aggregator to obtain aseries of information, and performing signature authentication and signature aggregation by the aggregator; The signature aggregation aims to save bandwidth and server storage space; And the medical server decrypts the data after performing the aggregate signature authentication, and provides the medical information of the patient to the medical care personnel. According to the invention, judgmentinformation of health care professionals is transmitted to a real patient through the third-party authority center and the aggregator; A plurality of signatures can be combined into a single aggregated signature through the aggregated signature, so that the bandwidth and the storage cost of the network are greatly reduced.
Owner:XIAN UNIV OF POSTS & TELECOMM

Multiple users-based outsourcing database audit method

The present invention discloses a multiple users-based outsourcing database audit method, aiming to solve problems of low signature verification efficiency and complex decryption in the prior art. The method comprises a first step that a data owner encrypts data by using a proxy re-encryption method so as to form a second-level ciphertext, generates a re-encryption secret key by inquiring a public key of a user, generates a searching label by using an Evdokimov encryption manner, and generates hash tree root signature by using aggregate signature; and the signature, second-level ciphertext, re-encryption secret key and the searching label are transmitted to a cloud server; a second step that the cloud server encrypts the second-level ciphertext so as to generate a first-level ciphertext; a third step that a user sends a search request to the cloud server, and the cloud server searches and returns a corresponding first-level ciphertext; and a fourth step that the user decrypts the first-level ciphertext so as to form a plaintext, and performs aggregate verification on the plaintext. Through adoption of the method, the burden on the data owner is greatly reduced, interaction is reduced for one time, data privacy protection is improved, and the method can be applied to safe data outsourcing in a cloud calculation environment.
Owner:XIDIAN UNIV

Game blockchain consensus method based on bilinear mapping algorithm and set signature algorithm

The present invention relates to a game blockchain consensus method based on a bilinear mapping algorithm and a set signature algorithm. The method comprises the steps of: broadcasting transaction data to a whole network through any node, and attaching signature of a sender to the transaction data; after a set node receives m messages without insertion, employing a set signature algorithm and a bilinear mapping algorithm to perform operation of the m messages to obtain a set signature, and sending the set signature in the round of consensus time; receiving set signature information with a given quantity by the any node in the network to reach a consensus and publish a whole block; and deleting the included transaction from the memory after any node receives the whole block, and starting the next round of consensus. The game blockchain consensus method based on the bilinear mapping algorithm and the set signature algorithm can aggregate the signatures of the m original messages into onesignature to reduce the confirmed consumption of the message transmission and allow the space complexity to be reduced to 1/m of the original space complexity so as to improve the transaction processing efficiency and increase the network capacity.
Owner:广东微链科技有限公司

Identity-based aggregate signature method with parallel key-insulation

The invention provides an identity-based aggregate signature method with parallel key-insulation. According to the identity-based aggregate signature method with parallel key-insulation, a set of n users who participate in the aggregate signature method is a set of n different messages, each user Pi (1<=i<=n) selects a message mi (1<=i<=n) which is different from others to conduct signature so that sigmai can be obtained, each generated signature sigmai is sent to an aggregation side, the aggregation side can conduct aggregation operation on the n relieved independent signatures, and a verification side verifies the aggregate signatures and determines whether the aggregate signatures come from the n designated users; at the same time, a key of each user is updated periodically, two assisting devices alternatively help the users to update the keys in each time period, and leakage of the keys of the users in one time period cannot influence the safety of a system in other time periods. The identity-based aggregate signature method with parallel key-insulation integrates the advantages of the parallel key-insulation mechanism and the advantages of an identity-based aggregate signature, the signature verification efficiency is improved, and the safety of the whole system is guaranteed.
Owner:QINGDAO UNIV

Access authentication method of electric automobile

The invention relates to an access authentication method of electric automobiles. The method comprises the following steps that: access authentication systems of the electric automobiles are established; access authentication between the electric automobiles and a charging station is carried out; and the charging station carries out batch signature authentication on the electric automobiles. According to the invention, identity aggregate signatures are introduced into identity validity inspection of the electric automobiles, and bidirectional authentication and session key negotiation are designed between the electric automobiles and the access authentication systems, so that the reasonable usage of the information resources in the station is ensured, and the safety of the whole network system is fundamentally ensured. The batch signature authentication mechanism enables the charging station to verify a plurality of electric automobile terminal signatures in the aggregate manner, the calculation load is lightened, and the performance is improved. The typical identity aggregate signature system is composed of five algorithms: system initialization, private key generation, signing, aggregation and aggregate verification, user identity information can be used to replace a public key thereof, the problem of high certificate cost is solved, and by compressing the plurality signatures into one, the high-efficiency verification is carried out.
Owner:STATE GRID CORP OF CHINA +2
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products