Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy blind signature-based anti-scalping sensitive data transaction method

A technology of sensitive data and transaction methods, applied in the field of cryptography, can solve problems such as harming the interests of data providers, and achieve the effects of avoiding data supervision risks, ensuring fairness, and preventing second-hand reselling

Inactive Publication Date: 2017-02-01
GUIZHOU UNIV
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] After completing the data transaction, the data buyer who owns the data may resell the data to more consumers to obtain additional profits, which damages the interests of the data provider

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy blind signature-based anti-scalping sensitive data transaction method
  • Proxy blind signature-based anti-scalping sensitive data transaction method
  • Proxy blind signature-based anti-scalping sensitive data transaction method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be described in further detail below in conjunction with accompanying drawing, but not as any restriction to the present invention

[0043] Embodiment of the present invention: anti-reselling sensitive data transaction method based on proxy blind signature, the system members in this embodiment include data provider A (original signer), data buyer set B, third party C (i.e. proxy signature or), the data to be traded is m, and the IDs of A and C are respectively recorded as ID A and ID C ; Let G 1 , G 2 respectively represent the q-order additive cyclic group and the q-factorial cyclic group, where q is a large prime number. Select the group G using a suitable public key procedure 1 generator P of , and assume that in the group G 1 , G 2 There is a bilinear map e:G between 1 ×G 1 →G 2 ; In addition, there is a hash function h 1 :{0,1} * →G 1 , The specific content of each step will be described in detail below:

[0044] It is div...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy blind signature-based anti-scalping sensitive data transaction method. An attribute-based encryption method is introduced to encrypt the data to enable a data purchaser meeting the attribute to be able to acquire the data, and thus, the phenomenon that after the data purchaser acquires the data and then performs secondhand scalping on the data to gain profits can be effectively prevented. According to the proxy blind signature-based anti-scalping sensitive data transaction method, a third party is introduced as an entrusted proxy signer to use bilinear mapping to perform blind signature on the data, the data purchaser verifies the signature accuracy, if the verification is passed, a public key is used for decrypting the data, and while fair and secure data transaction is ensured, the transaction efficiency is improved, and benefits of two transaction parties are ensured.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to an anti-reselling sensitive data transaction method based on proxy blind signature. Background technique [0002] With the increasing activity of big data, many big data trading platforms have emerged as the times require, and the problems of information security in the process of data trading have become increasingly prominent, and key technologies such as encryption and signature in information security have also been widely used. focus on. Proxy blind signature, as a combination of proxy signature and blind signature, plays a very important role in anti-reselling sensitive data transactions. [0003] Due to the development of computer networks, a large number of data transactions are carried out through the Internet. The data buyer transfers the purchase amount to a third party through online consumption, and the data provider entrusts the data to the third party, and th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3257
Inventor 田有亮彭巧陈功
Owner GUIZHOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products