The invention discloses a
data security duplicate removal method based on a threshold
blind signature. The invention relates to the field of digital signatures in
information security, and solves theproblems that n
key management nodes are adopted to perform blind signing on messages at the same time, a large amount of
information needs to be interacted among the
key management nodes, and the calculation overhead for verifying signatures is large.
System initialization is firstly performed, and a main key node generates a public key and a public key; the n sub-key nodes are numbered as k1, k2,..., kn, and a t-1-order polynomial is constructed: f(x)=a0+a1x+...+a<t-1>x<t-1>; partial private keys corresponding to each sub-key node: f(k1), f(k2),...,f(kn), are calculated and safely transmitted to the sub-key nodes; and then the
client blinds the message, and sends the blinded message to the sub-key node. And the sub-key node signs the message and returns the message to the
client. And theclient uploads the
ciphertext data to the
cloud server. According to the method provided by the invention, a single-point fault problem does not exist, the main key node can be offline after initialization is completed, and the n sub-key nodes only need at least t available sub-key nodes to complete subsequent steps.