Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A threshold proxy signature method without trusted pkg based on smart grid identity security

A proxy signature and smart grid technology, applied in the field of smart grid security data communication, can solve problems such as system disasters, threshold proxy signature key custody, etc.

Active Publication Date: 2018-01-02
GANSU ELECTRIC POWER DESIGN INST
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the identity-based cryptographic system, the user's public key is directly obtained from its identity information, while the private key is generated by a trusted party called a private key generation center (PKG, private key generator). The identity-based threshold agent There is a key escrow problem in the signature, and PKG will bring disaster to the system if it is compromised

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A threshold proxy signature method without trusted pkg based on smart grid identity security
  • A threshold proxy signature method without trusted pkg based on smart grid identity security
  • A threshold proxy signature method without trusted pkg based on smart grid identity security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The threshold proxy signature method based on smart grid identity without trusted PKG provided by the present invention assumes that there are private key generation center PKG and original signer P in the system. 0 , proxy signer L={P 1 ,P 2 ,...,P n} and a verifier C, C is a member of the set L, C is responsible for verifying the validity of the personal proxy signatures of the members of the proxy group, and combining these effective personal proxy signatures into proxy signatures, set G 1 By PThe resulting cyclic additive group has order prime q ; G 2 are of the same order q The multiplicative cyclic group of ; bilinear maps e : G 1 x G 1 → G 2 ; The specific steps are as follows;

[0038] Step 1. System initialization: PKG randomly selects an integer s PKG ∈ , calculate the system public key Q PKG =s PKG P , and choose the following strong collision-free hash function H 1 :{0,1} * →G 1 , H 2 :{0,1} * → ; then the PKG will s PKG ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided is a trusted PKG-free threshold proxy signature method based on the identity safety of a smart power grid. According to the signature method, a signer interacts with a PKG and then obtains a private key pair (xid, yid) and a public key pair (Xid, Yid) of the PKG; proxy signers are authorized according to a verifiable secret sharing scheme, and it is supposed that P1, P2, ... , Pt are the t proxy signers, the t proxy signers will cooperate to generate a proxy signature of a message m; each proxy signer Pi generates a proxy signature part and sends the proxy signature part to a verifier C, and if all the proxy signature parts pass verification, the C combines the proxy signature parts into a valid threshold proxy signature. The method has higher execution efficiency due to many steps of precomputation and guarantees the security features of privacy, proxy protection, unforgeability, non-repudiation, strong identifiability and the like of the valid threshold proxy signature.

Description

technical field [0001] The invention relates to the technical field of smart grid security data communication, in particular to a trusted PKG threshold proxy signature method based on smart grid identity security. Background technique [0002] With the development of communication technology and information technology, various information systems such as dispatching automation system, distribution network automation system, substation automation system and power market technical support system have been widely used in the field of power systems. With the development of smart cities, the smart grid will be organically integrated with traditional telecommunication networks, radio and television networks, and the Internet. The grid is not only a carrier and platform for power transmission, but also an important public service infrastructure. Relying on abundant power grid network resources, an open public network service platform is built to promote the continuous integration o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 彭伟郑海涛史振鄞吴兴全白霞程明向剑锋何科峰
Owner GANSU ELECTRIC POWER DESIGN INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products