CN108551435A - A kind of Verifiable Encryptosystem group signature method with anonymity - Google Patents

A kind of Verifiable Encryptosystem group signature method with anonymity Download PDF

Info

Publication number
CN108551435A
CN108551435A CN201810198425.6A CN201810198425A CN108551435A CN 108551435 A CN108551435 A CN 108551435A CN 201810198425 A CN201810198425 A CN 201810198425A CN 108551435 A CN108551435 A CN 108551435A
Authority
CN
China
Prior art keywords
group
signature
key
user
ranking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810198425.6A
Other languages
Chinese (zh)
Other versions
CN108551435B (en
Inventor
罗喜伶
王震
周泽全
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201810198425.6A priority Critical patent/CN108551435B/en
Publication of CN108551435A publication Critical patent/CN108551435A/en
Application granted granted Critical
Publication of CN108551435B publication Critical patent/CN108551435B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of Verifiable Encryptosystem group signature method with anonymity, the main anonymity using cryptological technique means protection user during electronic document is contracted.In the method, it when user's determination will carry out file signing, is registered in systems first, obtains signature key, signature key and arbitrator's public key is then utilized to generate Verifiable Encryptosystem group ranking.Verifier in the case of non-decrypting can verify signature validity.Group administrator can utilize tracking key recovery to go out signer identity, and arbitrator can recover former signature from Verifiable Encryptosystem group ranking.Verifiable Encryptosystem group ranking proposed by the present invention compares most of signature schemes, not only realizes the confidentiality of digital signature, also achieves the anonymity of signer.

Description

A kind of Verifiable Encryptosystem group signature method with anonymity
Technical field
The present invention relates to information security and technical field of cryptology, specifically a kind of Verifiable Encryptosystem group with anonymity Endorsement method.
Background technology
With the rapid development of e-commerce, the novel electrons commercial affairs pattern layer such as electronic contract signature, electronic data interchange Go out not poor.Since there is also many unsafe factors in internet, the events such as hacker attack, information leakage happen occasionally, right Society, personal privacy and interests cause great harm, therefore safety is the premise realized in e-commerce.It can verify that and add Close signature is used as a kind of unique cryptological technique means, is a kind of important way for realizing safe electronic Contract Signing.
Verifiable Encryptosystem signature is the ciphering signature for being encrypted to digital signature, while possessing digital signature property, is tested Card person can verify the validity of original signature in the case of non-decrypting.It, can be with there are an arbitrator when controversial issue occurs Original signature is recovered from encrypted signature, prevents user from cheating and denying.Verifiable Encryptosystem signature is avoided to be closed in electronics With the leakage of digital signature in signature or electronic transaction process, therefore it ensure that the safety of digital signature to a certain extent. However, most of Verifiable Encryptosystem signature schemes do not consider the privacy of identities of signer at present, although these schemes can ensure The safety of digital signature, but cannot be guaranteed the privacy of identities safety of signer, once it is taken advantage of during electron contract Swindleness behavior, subscriber identity information may be compromised, be caused great harm to privacy of user.
Therefore, for the defect and deficiency of the above common Verifiable Encryptosystem signature scheme, the present invention proposes that one kind has and hides The Verifiable Encryptosystem group signature method of name property is ensureing digital signature using Verifiable Encryptosystem signature in conjunction with the technology of group ranking Safety under the premise of realize the privacy of identities of signer protected, improve in electronic contract signature and electronic transaction process Safety and privacy.
Invention content
The present invention proposes a kind of Verifiable Encryptosystem group signature method with anonymity, is signed and is tied using Verifiable Encryptosystem The technological means of gregarious signature, it is intended to solve user identity privacy present in current electronic contract signature and electronic transaction process The problems such as leakage.
A kind of Verifiable Encryptosystem group ranking with anonymity, includes the following steps:
S1:After user confirms the signature for carrying out file, is registered using identity information in signature system, receive note After volume information, group master adds the user in the group where system user, then generates Identity escrow key and is sent to Group administrator is given, while calculating the group ranking key of user using subscriber identity information, sends it to user;
S2:Arbitrator registers at CA (authentication center) center, obtains a key pair, including a public key and one Private key, public key are used for cryptographic digital signature, and private key is for decrypting;
S3:User generates the group ranking about file first with the signature key of oneself, and utilizes the public key of arbitrator Group ranking is encrypted, the Verifiable Encryptosystem group ranking with anonymity is obtained;
S4:Verifier can utilize public signature key and systematic parameter in the case of non-decrypting to Verifiable Encryptosystem group ranking Validity is verified;
S5:If Verifiable Encryptosystem group ranking generates the dispute or controversial issue about user identity, as certain user denies producing The signature, the then true identity that group administrator can utilize Identity escrow key recovery to go out signer are settled disputes;
S6:If controversial issue occurs for signature process, such as a certain user carries out that fraud, arbitrator occurs during contract signature Original group ranking is decrypted with the fairness of contract of guarantee signing process using private key.
As the further supplement of the present invention, which includes group master, group administrator, user, verifier and arbitrator 5 Entity:
Main group is that group administrator distributes Identity escrow key, and signature key is distributed for user, and system is added when there is new user When, group master is that new user distributes signature key, while updating the signature key of other members, and when there is user to leave, group master removes Its permission is sold, destroys signature key, while updating the signature key of other members;
Group administrator is responsible for tracking user identity, and track key using group recovers use from Verifiable Encryptosystem group ranking Family identity;
User generates group ranking using signature key, and group ranking is encrypted using arbitrator's public key, and generation has The Verifiable Encryptosystem group ranking of anonymity;
Verifier can verify the validity of Verifiable Encryptosystem group ranking in the case of non-decrypting;
Arbitrator can be decrypted Verifiable Encryptosystem group ranking using private key, and original group ranking is recovered.
As the further supplement of the present invention, this method realizes the anonymity of signer by the way of group ranking, simultaneously Group ranking is encrypted using public key cryptography, realizes the confidentiality of digital signature.
As the further supplement of the present invention, the user in system forms a group, and group master is that member distributes label in group Name key, group administrator are responsible for tracking user identity, and the identity for the user that signs mainly by being hidden in legal group by anonymity It is realized in body user identity, in the group, signature user can represent group and generate the group ranking of oneself, but cannot generate other The group ranking of user.
As the further supplement of the present invention, Verifiable Encryptosystem group ranking and group ranking which generates are identity-baseds Cipher system, i.e. the signature key of user is the identity information about user, and identity information includes user identity card number, hand Machine number, mailbox, address and biological information (fingerprint, iris) etc..The signature key of user is used to generate group ranking and can Verification encryption group ranking, and systematic parameter and public key are then used for the verification of group ranking and Verifiable Encryptosystem group ranking.
As the present invention further supplement, the centers CA include a key generator, arbitrator when the centers CA are registered, The centers CA generate a pair of secret keys for it, and private key is sent to user by short message, mail or other secret channels, and public key is then matched There are corresponding digital certificate, digital certificate to be used to prove the legitimacy of key.CA is responsible at center the public affairs of storage and maintenance arbitrator Key and digital certificate, and the public key of arbitrator and corresponding digital certificate are updated within time limit certain time.And private key is by arbitrating Person preserves, and when generation dispute or there are when fraud, arbitrator can be decrypted Verifiable Encryptosystem group ranking using private key, Obtain original group ranking.
As the present invention further supplement, if verifier will verify the validity of former group ranking, verifier without It needs to decrypt, Verifiable Encryptosystem group ranking need to only be verified, if Verifiable Encryptosystem group ranking is effective, former group ranking also has Effect;Otherwise, former group ranking is invalid.The present invention just can verify that the validity of former group ranking without decryption, it is ensured that digital signature Safety.
A kind of Verifiable Encryptosystem group signature method with anonymity proposed by the present invention, using the group ranking of identity-based Technology and public key cryptography ensure the hidden of the safety of digital signature and user identity in electronic contract and electronic transaction process Private.The present invention solves the problems, such as that lacking user anonymity present in most of Verifiable Encryptosystem signature schemes protects, both It can protect the safety of digital signature that can take into account the anonymity of user again, greatly improve electronic contract signature and electronic transaction Safety in the process plays a positive role to the development of e-commerce.
Description of the drawings
Attached drawing 1 is a kind of flow chart for Verifiable Encryptosystem group signature method with anonymity that present example provides.
Specific implementation mode
To keep the purpose, scheme and effect of the embodiment of the present invention clearer, clear, below with reference to attached drawing and illustrate to this Invention is further described.
Attached drawing is a kind of Verifiable Encryptosystem group signature method flow chart with anonymity proposed by the present invention.Such as Fig. 1 institutes Show, the present invention comprises the steps of:
S1:After user confirms the signature for carrying out file, is registered using identity information in signature system, receive note After volume information, group master adds the user in the group where system user, and then system generates following parameter.If G and GTFor Two exponent numbers are n=pq finite cyclic groups, and wherein p and q are two Big primes, Gp,GqFor p the and q ranks subgroup of G.e:G×G→GT It is a bilinear map, the generation member that g is the cyclic group G randomly selected, h is the cyclic group G randomly selectedqGeneration member. It is TK=q that user identity, which is arranged, to track key, and tracking key is sent to crowd administrator.User identity length is set as nu, body Part information is denoted asWherein for 0 < i≤nu, haveRandomly choose nuDimensional vector U=(ui), nmDimension Vector M=(mj) and element u ', m ' ∈ G, wherein ui,mjFor the random element in group G.If ZnFor n rank integer cyclic groups, with Machine selects α1∈Zn, g2∈ G, settingRandomly choose ru∈Zn, then the signature key of user be
Wherein d1,d2,d3For three component parts of user's signature key.
S2:Arbitrator registers at CA (authentication center) center, and the centers CA include a key generator, for generating The key pair of contract parties and third party (arbitrator).If ZnFor n rank integer cyclic groups, α is randomly choosedT∈Zn, then arbitrator Key pair isWherein PKTFor public key, it is used for cryptographic digital signature, public key to be issued equipped with the centers CA Digital certificate, CA is responsible at center the public key and digital certificate of storage and maintenance arbitrator, and is updated within time limit certain time The public key of arbitrator and corresponding digital certificate, SKTFor private key, for decrypting digital signature, private key is preserved by arbitrator.
S3:When generating Verifiable Encryptosystem group ranking, user generates first with the signature key of oneself about electronics text The group ranking of part.And when generating group ranking, n need to be generated first with digital digest algorithmmThe abstract of the electronic document of lengthWherein for 0 < j≤nm, there is mj∈{0,1}.Then system randomly choosesIt enablesCalculate the group ranking of user
It enablesHaveWherein σ12345And For the component part of group ranking.Then user utilizes the public key PK of arbitratorTTo the group ranking of generation into Row encryption, random selection s ∈ Zn, then calculate Verifiable Encryptosystem group ranking
Wherein ω123456AndFor the composition of Verifiable Encryptosystem group ranking Part.
S4:Verifier can in the case of non-decrypting test the validity of Verifiable Encryptosystem signature and former group ranking Card.It is whether effective firstly the need of the identity of verification signer, if forHave:Then sign Name person's identity information is effective, and otherwise signer identity information is invalid, and wherein e is bilinear map.If signer identity information has Whether true effect, then verify following equation.
e(ω1, g) and=e (PKT2)e(g2,g1)e(c,ω3)e(M,ω4), e (ω35)=e (ω6,h)
Wherein e is bilinear map,If above formula is all set up, signature has Effect;Otherwise, signature is invalid.
S5:If Verifiable Encryptosystem group ranking generates the dispute or controversial issue about user identity, as certain user denies producing The signature, the then true identity that group administrator can utilize Identity escrow cipher key T K=q to recover signer are settled disputes.For i =1 ..., nuIf (ci)q=g0, then enableOtherwise it enablesIt finally obtainsWhereinFor identity I-th of information, u are the identity information of finally obtained signer.Group administrator believes the identity of finally obtained signer The identity information of all users compares in breath and group, you can tracks actual signature person.
S6:If controversial issue occurs for signature process, such as a certain user carries out that fraud, arbitrator occurs during contract signature Using private key SKTOriginal group ranking is decrypted, arbitrator can be calculated by following equation
Finally obtain former group ranking σ, wherein σ12345AndFor the composition of group ranking Part.Terminal arbitration person sends it to request for arbitration side, ensures the fairness of electronic contract signature.
In the above embodiment, all calculate is completed by Verifiable Encryptosystem group ranking system, and user only need to be corresponding It is operated accordingly on platform, therefore the present invention has good practicability.User in system forms a group, group master Signature key is distributed for member in group, group administrator is responsible for tracking user identity, and anonymity mainly passes through the body for the user that will sign Part is hidden in legal group of subscribers identity and realizes, in the group, signature user can represent group and generate the group of oneself Signature, but the group ranking of other users cannot be generated.
During entirely generating Verifiable Encryptosystem group ranking and verification, the identity of signer is protected, only Have when the user that signs attempts to carry out malicious act, group administrator can just disclose the true identity of hostile signature person, therefore this hair It is bright to provide anonymity and safety for honest user.
The above content is combine further description of the specific implementation mode to the present invention, it is clear that described implementation Example is a part of example of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill The every other embodiment that personnel are obtained without making creative work, shall fall within the protection scope of the present invention.

Claims (6)

1. a kind of Verifiable Encryptosystem group signature method with anonymity, which is characterized in that including step:
S1:It after user confirms the signature for carrying out file, is registered using identity information in signature system, receives registration letter After breath, group master adds the user in the group where system user, then generates Identity escrow key and sends it to group Administrator, while using the group ranking key of subscriber identity information calculating user, sending it to user;
S2:Arbitrator registers at CA (authentication center) center, obtains a key pair, including a public key and a private Key, public key are used for cryptographic digital signature, and private key is for decrypting;
S3:User generates the group ranking about file first with the signature key of oneself, and using the public key of arbitrator to group Signature is encrypted, and obtains the Verifiable Encryptosystem group ranking with anonymity;
S4:Verifier can utilize public signature key and systematic parameter in the case of non-decrypting to the effective of Verifiable Encryptosystem group ranking Property is verified;
S5:If Verifiable Encryptosystem group ranking generates the dispute or controversial issue about user identity, as certain user denies producing the label Name, the then true identity that group administrator can utilize Identity escrow key recovery to go out signer are settled disputes;
S6:If controversial issue occurs for signature process, such as a certain user carries out that fraud occurs during contract signature, and arbitrator can profit Original group ranking is decrypted with the fairness of contract of guarantee signing process with private key.
2. the method as described in claim 1, which is characterized in that the invention include group master, group administrator, user, verifier and 5 entities of arbitrator;
Main group is that group administrator distributes Identity escrow key, and signature key is distributed for user, when there is new user that system is added, group Main is that new user distributes signature key, while updating the signature key of other members, when there is user to leave, its power of the main revocation of group Limit destroys signature key, while updating the signature key of other members;
Group administrator is responsible for tracking user identity, and track key using group recovers user's body from Verifiable Encryptosystem group ranking Part;
User generates group ranking using signature key, and group ranking is encrypted using arbitrator's public key, and generating has anonymity The Verifiable Encryptosystem group ranking of property;
Verifier can verify the validity of Verifiable Encryptosystem group ranking in the case of non-decrypting;
Arbitrator can be decrypted Verifiable Encryptosystem group ranking using private key, and original group ranking is recovered.
3. the method as described in claim 1, which is characterized in that this method realizes the anonymity of signer by the way of group ranking Property, while group ranking is encrypted using public key cryptography, realize the confidentiality of digital signature.
4. the method as described in claim 1, which is characterized in that user in system forms a group, group master be in group at Member's distribution signature key, group administrator are responsible for tracking user identity, and anonymity is mainly by the way that the identity for the user that signs to be hidden in It is realized in legal group of subscribers identity, in the group, signature user can represent group and generate the group ranking of oneself, but not The group ranking of other users can be generated.
5. the method as described in claim 1, which is characterized in that the centers CA include a key generator, are distributed for arbitrator A pair of secret keys, public key are disclosed, and member can be encrypted group ranking using public key in group, generate Verifiable Encryptosystem group label Name, private key is preserved by arbitrator, to decrypt Verifiable Encryptosystem group ranking.
6. the method as described in claim 1, which is characterized in that the validity one of Verifiable Encryptosystem group ranking and former group ranking It causes, even Verifiable Encryptosystem group ranking is effective, then former group ranking is also effective;If Verifiable Encryptosystem group ranking is invalid, former group's label Name is also invalid.
CN201810198425.6A 2018-03-12 2018-03-12 Verifiable encryption group signature method with anonymity Active CN108551435B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810198425.6A CN108551435B (en) 2018-03-12 2018-03-12 Verifiable encryption group signature method with anonymity

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810198425.6A CN108551435B (en) 2018-03-12 2018-03-12 Verifiable encryption group signature method with anonymity

Publications (2)

Publication Number Publication Date
CN108551435A true CN108551435A (en) 2018-09-18
CN108551435B CN108551435B (en) 2020-10-20

Family

ID=63516200

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810198425.6A Active CN108551435B (en) 2018-03-12 2018-03-12 Verifiable encryption group signature method with anonymity

Country Status (1)

Country Link
CN (1) CN108551435B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450645A (en) * 2018-11-29 2019-03-08 中国电子科技集团公司第三十研究所 It is a kind of that anonymous authentication method is supervised based on zero-knowledge proof
CN111884816A (en) * 2020-08-07 2020-11-03 中国人民解放军国防科技大学 Routing method with metadata privacy protection and source responsibility tracing capability
CN112559456A (en) * 2020-12-28 2021-03-26 杭州趣链科技有限公司 Data sharing method with privacy protection auditing and deleting functions
WO2021120579A1 (en) * 2019-12-18 2021-06-24 平安国际智慧城市科技股份有限公司 Method for securely reporting data, and apparatus and computer-readable storage medium
CN113329019A (en) * 2021-05-28 2021-08-31 南京邮电大学 Privacy-protecting infectious disease close contact person identity tracking method
CN113837848A (en) * 2021-11-25 2021-12-24 北京溪塔科技有限公司 Transaction quotation obtaining method and device based on group signature

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2846492A1 (en) * 2013-09-05 2015-03-11 Thomson Licensing Cryptographic group signature methods and devices

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2846492A1 (en) * 2013-09-05 2015-03-11 Thomson Licensing Cryptographic group signature methods and devices

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
周由胜等: ""一种高效的基于身份的可验证加密签名方案"", 《计算机研究与发展》 *
张跃宇等: ""一种强不可伪造的群签名方案"", 《中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109450645A (en) * 2018-11-29 2019-03-08 中国电子科技集团公司第三十研究所 It is a kind of that anonymous authentication method is supervised based on zero-knowledge proof
WO2021120579A1 (en) * 2019-12-18 2021-06-24 平安国际智慧城市科技股份有限公司 Method for securely reporting data, and apparatus and computer-readable storage medium
CN111884816A (en) * 2020-08-07 2020-11-03 中国人民解放军国防科技大学 Routing method with metadata privacy protection and source responsibility tracing capability
CN111884816B (en) * 2020-08-07 2022-05-17 中国人民解放军国防科技大学 Routing method with metadata privacy protection and source responsibility tracing capability
CN112559456A (en) * 2020-12-28 2021-03-26 杭州趣链科技有限公司 Data sharing method with privacy protection auditing and deleting functions
CN112559456B (en) * 2020-12-28 2022-07-05 杭州趣链科技有限公司 Data sharing method with privacy protection auditing and deleting functions
CN113329019A (en) * 2021-05-28 2021-08-31 南京邮电大学 Privacy-protecting infectious disease close contact person identity tracking method
CN113837848A (en) * 2021-11-25 2021-12-24 北京溪塔科技有限公司 Transaction quotation obtaining method and device based on group signature

Also Published As

Publication number Publication date
CN108551435B (en) 2020-10-20

Similar Documents

Publication Publication Date Title
CN106548345B (en) Method and system for realizing block chain private key protection based on key partitioning
CN108551435B (en) Verifiable encryption group signature method with anonymity
EP2348446B1 (en) A computer implemented method for authenticating a user
US7634085B1 (en) Identity-based-encryption system with partial attribute matching
US6298153B1 (en) Digital signature method and information communication system and apparatus using such method
CN111797427B (en) Blockchain user identity supervision method and system giving consideration to privacy protection
CN111859444B (en) Block chain data supervision method and system based on attribute encryption
Belguith et al. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds
CN107124268A (en) A kind of privacy set common factor computational methods for resisting malicious attack
CN107947913A (en) The anonymous authentication method and system of a kind of identity-based
CN113158143B (en) Key management method and device based on block chain digital copyright protection system
CN107733648A (en) The RSA digital signature generation method and system of a kind of identity-based
CN109450645A (en) It is a kind of that anonymous authentication method is supervised based on zero-knowledge proof
CN109600233A (en) Group ranking mark based on SM2 Digital Signature Algorithm signs and issues method
CN108494559B (en) Electronic contract signing method based on semi-trusted third party
GB2385955A (en) Key certification using certificate chains
CN110932865B (en) Linkable ring signature generation method based on SM2 digital signature algorithm
CN108833373A (en) The instant messaging and anonymous access method of facing relation secret protection social networks
Wang et al. A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system
CN102769623A (en) Two-factor authentication method based on digital certificate and biological identification information
CN114666032B (en) Block chain transaction data privacy protection method based on homomorphic encryption
CN109687977A (en) Anti- quantum calculation digital signature method and anti-quantum calculation digital signature system based on multiple pool of keys
CN109887150A (en) The agency of approval voting system signs decryption method again
CN114095181A (en) Threshold ring signature method and system based on state cryptographic algorithm
CN107690079A (en) Privacy of user guard method in live platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant