CN108551435A - A kind of Verifiable Encryptosystem group signature method with anonymity - Google Patents
A kind of Verifiable Encryptosystem group signature method with anonymity Download PDFInfo
- Publication number
- CN108551435A CN108551435A CN201810198425.6A CN201810198425A CN108551435A CN 108551435 A CN108551435 A CN 108551435A CN 201810198425 A CN201810198425 A CN 201810198425A CN 108551435 A CN108551435 A CN 108551435A
- Authority
- CN
- China
- Prior art keywords
- group
- signature
- key
- user
- ranking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Theoretical Computer Science (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of Verifiable Encryptosystem group signature method with anonymity, the main anonymity using cryptological technique means protection user during electronic document is contracted.In the method, it when user's determination will carry out file signing, is registered in systems first, obtains signature key, signature key and arbitrator's public key is then utilized to generate Verifiable Encryptosystem group ranking.Verifier in the case of non-decrypting can verify signature validity.Group administrator can utilize tracking key recovery to go out signer identity, and arbitrator can recover former signature from Verifiable Encryptosystem group ranking.Verifiable Encryptosystem group ranking proposed by the present invention compares most of signature schemes, not only realizes the confidentiality of digital signature, also achieves the anonymity of signer.
Description
Technical field
The present invention relates to information security and technical field of cryptology, specifically a kind of Verifiable Encryptosystem group with anonymity
Endorsement method.
Background technology
With the rapid development of e-commerce, the novel electrons commercial affairs pattern layer such as electronic contract signature, electronic data interchange
Go out not poor.Since there is also many unsafe factors in internet, the events such as hacker attack, information leakage happen occasionally, right
Society, personal privacy and interests cause great harm, therefore safety is the premise realized in e-commerce.It can verify that and add
Close signature is used as a kind of unique cryptological technique means, is a kind of important way for realizing safe electronic Contract Signing.
Verifiable Encryptosystem signature is the ciphering signature for being encrypted to digital signature, while possessing digital signature property, is tested
Card person can verify the validity of original signature in the case of non-decrypting.It, can be with there are an arbitrator when controversial issue occurs
Original signature is recovered from encrypted signature, prevents user from cheating and denying.Verifiable Encryptosystem signature is avoided to be closed in electronics
With the leakage of digital signature in signature or electronic transaction process, therefore it ensure that the safety of digital signature to a certain extent.
However, most of Verifiable Encryptosystem signature schemes do not consider the privacy of identities of signer at present, although these schemes can ensure
The safety of digital signature, but cannot be guaranteed the privacy of identities safety of signer, once it is taken advantage of during electron contract
Swindleness behavior, subscriber identity information may be compromised, be caused great harm to privacy of user.
Therefore, for the defect and deficiency of the above common Verifiable Encryptosystem signature scheme, the present invention proposes that one kind has and hides
The Verifiable Encryptosystem group signature method of name property is ensureing digital signature using Verifiable Encryptosystem signature in conjunction with the technology of group ranking
Safety under the premise of realize the privacy of identities of signer protected, improve in electronic contract signature and electronic transaction process
Safety and privacy.
Invention content
The present invention proposes a kind of Verifiable Encryptosystem group signature method with anonymity, is signed and is tied using Verifiable Encryptosystem
The technological means of gregarious signature, it is intended to solve user identity privacy present in current electronic contract signature and electronic transaction process
The problems such as leakage.
A kind of Verifiable Encryptosystem group ranking with anonymity, includes the following steps:
S1:After user confirms the signature for carrying out file, is registered using identity information in signature system, receive note
After volume information, group master adds the user in the group where system user, then generates Identity escrow key and is sent to
Group administrator is given, while calculating the group ranking key of user using subscriber identity information, sends it to user;
S2:Arbitrator registers at CA (authentication center) center, obtains a key pair, including a public key and one
Private key, public key are used for cryptographic digital signature, and private key is for decrypting;
S3:User generates the group ranking about file first with the signature key of oneself, and utilizes the public key of arbitrator
Group ranking is encrypted, the Verifiable Encryptosystem group ranking with anonymity is obtained;
S4:Verifier can utilize public signature key and systematic parameter in the case of non-decrypting to Verifiable Encryptosystem group ranking
Validity is verified;
S5:If Verifiable Encryptosystem group ranking generates the dispute or controversial issue about user identity, as certain user denies producing
The signature, the then true identity that group administrator can utilize Identity escrow key recovery to go out signer are settled disputes;
S6:If controversial issue occurs for signature process, such as a certain user carries out that fraud, arbitrator occurs during contract signature
Original group ranking is decrypted with the fairness of contract of guarantee signing process using private key.
As the further supplement of the present invention, which includes group master, group administrator, user, verifier and arbitrator 5
Entity:
Main group is that group administrator distributes Identity escrow key, and signature key is distributed for user, and system is added when there is new user
When, group master is that new user distributes signature key, while updating the signature key of other members, and when there is user to leave, group master removes
Its permission is sold, destroys signature key, while updating the signature key of other members;
Group administrator is responsible for tracking user identity, and track key using group recovers use from Verifiable Encryptosystem group ranking
Family identity;
User generates group ranking using signature key, and group ranking is encrypted using arbitrator's public key, and generation has
The Verifiable Encryptosystem group ranking of anonymity;
Verifier can verify the validity of Verifiable Encryptosystem group ranking in the case of non-decrypting;
Arbitrator can be decrypted Verifiable Encryptosystem group ranking using private key, and original group ranking is recovered.
As the further supplement of the present invention, this method realizes the anonymity of signer by the way of group ranking, simultaneously
Group ranking is encrypted using public key cryptography, realizes the confidentiality of digital signature.
As the further supplement of the present invention, the user in system forms a group, and group master is that member distributes label in group
Name key, group administrator are responsible for tracking user identity, and the identity for the user that signs mainly by being hidden in legal group by anonymity
It is realized in body user identity, in the group, signature user can represent group and generate the group ranking of oneself, but cannot generate other
The group ranking of user.
As the further supplement of the present invention, Verifiable Encryptosystem group ranking and group ranking which generates are identity-baseds
Cipher system, i.e. the signature key of user is the identity information about user, and identity information includes user identity card number, hand
Machine number, mailbox, address and biological information (fingerprint, iris) etc..The signature key of user is used to generate group ranking and can
Verification encryption group ranking, and systematic parameter and public key are then used for the verification of group ranking and Verifiable Encryptosystem group ranking.
As the present invention further supplement, the centers CA include a key generator, arbitrator when the centers CA are registered,
The centers CA generate a pair of secret keys for it, and private key is sent to user by short message, mail or other secret channels, and public key is then matched
There are corresponding digital certificate, digital certificate to be used to prove the legitimacy of key.CA is responsible at center the public affairs of storage and maintenance arbitrator
Key and digital certificate, and the public key of arbitrator and corresponding digital certificate are updated within time limit certain time.And private key is by arbitrating
Person preserves, and when generation dispute or there are when fraud, arbitrator can be decrypted Verifiable Encryptosystem group ranking using private key,
Obtain original group ranking.
As the present invention further supplement, if verifier will verify the validity of former group ranking, verifier without
It needs to decrypt, Verifiable Encryptosystem group ranking need to only be verified, if Verifiable Encryptosystem group ranking is effective, former group ranking also has
Effect;Otherwise, former group ranking is invalid.The present invention just can verify that the validity of former group ranking without decryption, it is ensured that digital signature
Safety.
A kind of Verifiable Encryptosystem group signature method with anonymity proposed by the present invention, using the group ranking of identity-based
Technology and public key cryptography ensure the hidden of the safety of digital signature and user identity in electronic contract and electronic transaction process
Private.The present invention solves the problems, such as that lacking user anonymity present in most of Verifiable Encryptosystem signature schemes protects, both
It can protect the safety of digital signature that can take into account the anonymity of user again, greatly improve electronic contract signature and electronic transaction
Safety in the process plays a positive role to the development of e-commerce.
Description of the drawings
Attached drawing 1 is a kind of flow chart for Verifiable Encryptosystem group signature method with anonymity that present example provides.
Specific implementation mode
To keep the purpose, scheme and effect of the embodiment of the present invention clearer, clear, below with reference to attached drawing and illustrate to this
Invention is further described.
Attached drawing is a kind of Verifiable Encryptosystem group signature method flow chart with anonymity proposed by the present invention.Such as Fig. 1 institutes
Show, the present invention comprises the steps of:
S1:After user confirms the signature for carrying out file, is registered using identity information in signature system, receive note
After volume information, group master adds the user in the group where system user, and then system generates following parameter.If G and GTFor
Two exponent numbers are n=pq finite cyclic groups, and wherein p and q are two Big primes, Gp,GqFor p the and q ranks subgroup of G.e:G×G→GT
It is a bilinear map, the generation member that g is the cyclic group G randomly selected, h is the cyclic group G randomly selectedqGeneration member.
It is TK=q that user identity, which is arranged, to track key, and tracking key is sent to crowd administrator.User identity length is set as nu, body
Part information is denoted asWherein for 0 < i≤nu, haveRandomly choose nuDimensional vector U=(ui), nmDimension
Vector M=(mj) and element u ', m ' ∈ G, wherein ui,mjFor the random element in group G.If ZnFor n rank integer cyclic groups, with
Machine selects α1∈Zn, g2∈ G, settingRandomly choose ru∈Zn, then the signature key of user be
Wherein d1,d2,d3For three component parts of user's signature key.
S2:Arbitrator registers at CA (authentication center) center, and the centers CA include a key generator, for generating
The key pair of contract parties and third party (arbitrator).If ZnFor n rank integer cyclic groups, α is randomly choosedT∈Zn, then arbitrator
Key pair isWherein PKTFor public key, it is used for cryptographic digital signature, public key to be issued equipped with the centers CA
Digital certificate, CA is responsible at center the public key and digital certificate of storage and maintenance arbitrator, and is updated within time limit certain time
The public key of arbitrator and corresponding digital certificate, SKTFor private key, for decrypting digital signature, private key is preserved by arbitrator.
S3:When generating Verifiable Encryptosystem group ranking, user generates first with the signature key of oneself about electronics text
The group ranking of part.And when generating group ranking, n need to be generated first with digital digest algorithmmThe abstract of the electronic document of lengthWherein for 0 < j≤nm, there is mj∈{0,1}.Then system randomly choosesIt enablesCalculate the group ranking of user
It enablesHaveWherein σ1,σ2,σ3,σ4,σ5And For the component part of group ranking.Then user utilizes the public key PK of arbitratorTTo the group ranking of generation into
Row encryption, random selection s ∈ Zn, then calculate Verifiable Encryptosystem group ranking
Wherein ω1,ω2,ω3,ω4,ω5,ω6AndFor the composition of Verifiable Encryptosystem group ranking
Part.
S4:Verifier can in the case of non-decrypting test the validity of Verifiable Encryptosystem signature and former group ranking
Card.It is whether effective firstly the need of the identity of verification signer, if forHave:Then sign
Name person's identity information is effective, and otherwise signer identity information is invalid, and wherein e is bilinear map.If signer identity information has
Whether true effect, then verify following equation.
e(ω1, g) and=e (PKT,ω2)e(g2,g1)e(c,ω3)e(M,ω4), e (ω3,ω5)=e (ω6,h)
Wherein e is bilinear map,If above formula is all set up, signature has
Effect;Otherwise, signature is invalid.
S5:If Verifiable Encryptosystem group ranking generates the dispute or controversial issue about user identity, as certain user denies producing
The signature, the then true identity that group administrator can utilize Identity escrow cipher key T K=q to recover signer are settled disputes.For i
=1 ..., nuIf (ci)q=g0, then enableOtherwise it enablesIt finally obtainsWhereinFor identity
I-th of information, u are the identity information of finally obtained signer.Group administrator believes the identity of finally obtained signer
The identity information of all users compares in breath and group, you can tracks actual signature person.
S6:If controversial issue occurs for signature process, such as a certain user carries out that fraud, arbitrator occurs during contract signature
Using private key SKTOriginal group ranking is decrypted, arbitrator can be calculated by following equation
Finally obtain former group ranking σ, wherein σ1,σ2,σ3,σ4,σ5AndFor the composition of group ranking
Part.Terminal arbitration person sends it to request for arbitration side, ensures the fairness of electronic contract signature.
In the above embodiment, all calculate is completed by Verifiable Encryptosystem group ranking system, and user only need to be corresponding
It is operated accordingly on platform, therefore the present invention has good practicability.User in system forms a group, group master
Signature key is distributed for member in group, group administrator is responsible for tracking user identity, and anonymity mainly passes through the body for the user that will sign
Part is hidden in legal group of subscribers identity and realizes, in the group, signature user can represent group and generate the group of oneself
Signature, but the group ranking of other users cannot be generated.
During entirely generating Verifiable Encryptosystem group ranking and verification, the identity of signer is protected, only
Have when the user that signs attempts to carry out malicious act, group administrator can just disclose the true identity of hostile signature person, therefore this hair
It is bright to provide anonymity and safety for honest user.
The above content is combine further description of the specific implementation mode to the present invention, it is clear that described implementation
Example is a part of example of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, ordinary skill
The every other embodiment that personnel are obtained without making creative work, shall fall within the protection scope of the present invention.
Claims (6)
1. a kind of Verifiable Encryptosystem group signature method with anonymity, which is characterized in that including step:
S1:It after user confirms the signature for carrying out file, is registered using identity information in signature system, receives registration letter
After breath, group master adds the user in the group where system user, then generates Identity escrow key and sends it to group
Administrator, while using the group ranking key of subscriber identity information calculating user, sending it to user;
S2:Arbitrator registers at CA (authentication center) center, obtains a key pair, including a public key and a private
Key, public key are used for cryptographic digital signature, and private key is for decrypting;
S3:User generates the group ranking about file first with the signature key of oneself, and using the public key of arbitrator to group
Signature is encrypted, and obtains the Verifiable Encryptosystem group ranking with anonymity;
S4:Verifier can utilize public signature key and systematic parameter in the case of non-decrypting to the effective of Verifiable Encryptosystem group ranking
Property is verified;
S5:If Verifiable Encryptosystem group ranking generates the dispute or controversial issue about user identity, as certain user denies producing the label
Name, the then true identity that group administrator can utilize Identity escrow key recovery to go out signer are settled disputes;
S6:If controversial issue occurs for signature process, such as a certain user carries out that fraud occurs during contract signature, and arbitrator can profit
Original group ranking is decrypted with the fairness of contract of guarantee signing process with private key.
2. the method as described in claim 1, which is characterized in that the invention include group master, group administrator, user, verifier and
5 entities of arbitrator;
Main group is that group administrator distributes Identity escrow key, and signature key is distributed for user, when there is new user that system is added, group
Main is that new user distributes signature key, while updating the signature key of other members, when there is user to leave, its power of the main revocation of group
Limit destroys signature key, while updating the signature key of other members;
Group administrator is responsible for tracking user identity, and track key using group recovers user's body from Verifiable Encryptosystem group ranking
Part;
User generates group ranking using signature key, and group ranking is encrypted using arbitrator's public key, and generating has anonymity
The Verifiable Encryptosystem group ranking of property;
Verifier can verify the validity of Verifiable Encryptosystem group ranking in the case of non-decrypting;
Arbitrator can be decrypted Verifiable Encryptosystem group ranking using private key, and original group ranking is recovered.
3. the method as described in claim 1, which is characterized in that this method realizes the anonymity of signer by the way of group ranking
Property, while group ranking is encrypted using public key cryptography, realize the confidentiality of digital signature.
4. the method as described in claim 1, which is characterized in that user in system forms a group, group master be in group at
Member's distribution signature key, group administrator are responsible for tracking user identity, and anonymity is mainly by the way that the identity for the user that signs to be hidden in
It is realized in legal group of subscribers identity, in the group, signature user can represent group and generate the group ranking of oneself, but not
The group ranking of other users can be generated.
5. the method as described in claim 1, which is characterized in that the centers CA include a key generator, are distributed for arbitrator
A pair of secret keys, public key are disclosed, and member can be encrypted group ranking using public key in group, generate Verifiable Encryptosystem group label
Name, private key is preserved by arbitrator, to decrypt Verifiable Encryptosystem group ranking.
6. the method as described in claim 1, which is characterized in that the validity one of Verifiable Encryptosystem group ranking and former group ranking
It causes, even Verifiable Encryptosystem group ranking is effective, then former group ranking is also effective;If Verifiable Encryptosystem group ranking is invalid, former group's label
Name is also invalid.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810198425.6A CN108551435B (en) | 2018-03-12 | 2018-03-12 | Verifiable encryption group signature method with anonymity |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810198425.6A CN108551435B (en) | 2018-03-12 | 2018-03-12 | Verifiable encryption group signature method with anonymity |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108551435A true CN108551435A (en) | 2018-09-18 |
CN108551435B CN108551435B (en) | 2020-10-20 |
Family
ID=63516200
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810198425.6A Active CN108551435B (en) | 2018-03-12 | 2018-03-12 | Verifiable encryption group signature method with anonymity |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108551435B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109450645A (en) * | 2018-11-29 | 2019-03-08 | 中国电子科技集团公司第三十研究所 | It is a kind of that anonymous authentication method is supervised based on zero-knowledge proof |
CN111884816A (en) * | 2020-08-07 | 2020-11-03 | 中国人民解放军国防科技大学 | Routing method with metadata privacy protection and source responsibility tracing capability |
CN112559456A (en) * | 2020-12-28 | 2021-03-26 | 杭州趣链科技有限公司 | Data sharing method with privacy protection auditing and deleting functions |
WO2021120579A1 (en) * | 2019-12-18 | 2021-06-24 | 平安国际智慧城市科技股份有限公司 | Method for securely reporting data, and apparatus and computer-readable storage medium |
CN113329019A (en) * | 2021-05-28 | 2021-08-31 | 南京邮电大学 | Privacy-protecting infectious disease close contact person identity tracking method |
CN113837848A (en) * | 2021-11-25 | 2021-12-24 | 北京溪塔科技有限公司 | Transaction quotation obtaining method and device based on group signature |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2846492A1 (en) * | 2013-09-05 | 2015-03-11 | Thomson Licensing | Cryptographic group signature methods and devices |
-
2018
- 2018-03-12 CN CN201810198425.6A patent/CN108551435B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2846492A1 (en) * | 2013-09-05 | 2015-03-11 | Thomson Licensing | Cryptographic group signature methods and devices |
Non-Patent Citations (2)
Title |
---|
周由胜等: ""一种高效的基于身份的可验证加密签名方案"", 《计算机研究与发展》 * |
张跃宇等: ""一种强不可伪造的群签名方案"", 《中国电子学会第十五届信息论学术年会暨第一届全国网络编码学术年会》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109450645A (en) * | 2018-11-29 | 2019-03-08 | 中国电子科技集团公司第三十研究所 | It is a kind of that anonymous authentication method is supervised based on zero-knowledge proof |
WO2021120579A1 (en) * | 2019-12-18 | 2021-06-24 | 平安国际智慧城市科技股份有限公司 | Method for securely reporting data, and apparatus and computer-readable storage medium |
CN111884816A (en) * | 2020-08-07 | 2020-11-03 | 中国人民解放军国防科技大学 | Routing method with metadata privacy protection and source responsibility tracing capability |
CN111884816B (en) * | 2020-08-07 | 2022-05-17 | 中国人民解放军国防科技大学 | Routing method with metadata privacy protection and source responsibility tracing capability |
CN112559456A (en) * | 2020-12-28 | 2021-03-26 | 杭州趣链科技有限公司 | Data sharing method with privacy protection auditing and deleting functions |
CN112559456B (en) * | 2020-12-28 | 2022-07-05 | 杭州趣链科技有限公司 | Data sharing method with privacy protection auditing and deleting functions |
CN113329019A (en) * | 2021-05-28 | 2021-08-31 | 南京邮电大学 | Privacy-protecting infectious disease close contact person identity tracking method |
CN113837848A (en) * | 2021-11-25 | 2021-12-24 | 北京溪塔科技有限公司 | Transaction quotation obtaining method and device based on group signature |
Also Published As
Publication number | Publication date |
---|---|
CN108551435B (en) | 2020-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106548345B (en) | Method and system for realizing block chain private key protection based on key partitioning | |
CN108551435B (en) | Verifiable encryption group signature method with anonymity | |
EP2348446B1 (en) | A computer implemented method for authenticating a user | |
US7634085B1 (en) | Identity-based-encryption system with partial attribute matching | |
US6298153B1 (en) | Digital signature method and information communication system and apparatus using such method | |
CN111797427B (en) | Blockchain user identity supervision method and system giving consideration to privacy protection | |
CN111859444B (en) | Block chain data supervision method and system based on attribute encryption | |
Belguith et al. | Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds | |
CN107124268A (en) | A kind of privacy set common factor computational methods for resisting malicious attack | |
CN107947913A (en) | The anonymous authentication method and system of a kind of identity-based | |
CN113158143B (en) | Key management method and device based on block chain digital copyright protection system | |
CN107733648A (en) | The RSA digital signature generation method and system of a kind of identity-based | |
CN109450645A (en) | It is a kind of that anonymous authentication method is supervised based on zero-knowledge proof | |
CN109600233A (en) | Group ranking mark based on SM2 Digital Signature Algorithm signs and issues method | |
CN108494559B (en) | Electronic contract signing method based on semi-trusted third party | |
GB2385955A (en) | Key certification using certificate chains | |
CN110932865B (en) | Linkable ring signature generation method based on SM2 digital signature algorithm | |
CN108833373A (en) | The instant messaging and anonymous access method of facing relation secret protection social networks | |
Wang et al. | A regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption in bitcoin system | |
CN102769623A (en) | Two-factor authentication method based on digital certificate and biological identification information | |
CN114666032B (en) | Block chain transaction data privacy protection method based on homomorphic encryption | |
CN109687977A (en) | Anti- quantum calculation digital signature method and anti-quantum calculation digital signature system based on multiple pool of keys | |
CN109887150A (en) | The agency of approval voting system signs decryption method again | |
CN114095181A (en) | Threshold ring signature method and system based on state cryptographic algorithm | |
CN107690079A (en) | Privacy of user guard method in live platform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |