A Regulatory Anonymous Authentication Method Based on Zero-Knowledge Proof

A zero-knowledge proof and anonymous authentication technology, applied in the field of supervised anonymous authentication, can solve problems such as excessive exposure of user identity and attribute information, and achieve the effect of increasing mandatory supervision functions, ensuring anonymity, and protecting identity privacy.

Active Publication Date: 2021-04-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to overcome the above-mentioned shortcomings of the prior art, the present invention provides a supervised anonymous authentication method based on zero-knowledge proof. Aiming at the problem of excessive exposure of user identity and attribute information in the traditional authentication system, the technical means of anonymous authentication is used to protect the identity of the user. Identity privacy, while adopting a flexible authentication strategy, so that users can choose to present the attributes in the certificate to avoid excessive exposure of information; in view of the problem that cannot be supervised in anonymous authentication, combined with the technical means of group signature, CA can supervise the user's identity information , to avoid the occurrence of untrustworthy behavior

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Regulatory Anonymous Authentication Method Based on Zero-Knowledge Proof
  • A Regulatory Anonymous Authentication Method Based on Zero-Knowledge Proof
  • A Regulatory Anonymous Authentication Method Based on Zero-Knowledge Proof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] The present invention combines zero-knowledge proof, group signature scheme and other cryptography technologies to design an attribute-based supervised anonymous authentication method, which solves the problems of insufficient privacy protection and unsupervised user identity in the traditional authentication system.

[0012] 1. Program overview

[0013] The method includes three types of participants, CA (trusted center), user and verifier. After the system is established, the CA generates the issuing key pair, the tracking key and the group public key. Then the user registers, and the CA assigns a pair of private keys to it, and at the same time, the CA issues relevant certificates to the user according to the attribute information submitted by the user. When the user presents the certificate, the verifier can specify the attributes that need to be presented on the user certificate, and the user signs the certificate while hiding the attribute values ​​that do not ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a supervised anonymous authentication method based on zero-knowledge proof, including three types of participants: CA, user and verifier, wherein: the CA generates the issuer key pair and the group key, and when the user registers, the CA is It distributes a pair of private keys, and CA issues relevant certificates to users based on the attribute information submitted by the user; when the user presents the certificate, the verifier specifies the attributes that need to be presented on the user certificate, the user signs the certificate, and hides the information that does not need to be presented. Attribute value; the verifier verifies the signature. If the signature is verified, the certificate presented by the user is valid; otherwise, the certificate presented by the user is invalid. The present invention also ensures the anonymity of the user while increasing the compulsory supervision function, and greatly protects the privacy of the user's identity compared with the general identity supervision scheme. The present invention also adds supervisory functionality.

Description

technical field [0001] The invention relates to a supervised anonymous authentication method based on zero-knowledge proof. Background technique [0002] Traditional identity authentication technology is mainly used for users to prove to the verifier that they are legitimate users, and can be widely used in communication, finance, social networking and other fields. However, the existing authentication technology does not consider the issue of user identity privacy protection. During authentication, users may over-expose their own information, resulting in information leakage or theft. Therefore, it is necessary to use anonymous authentication technology to protect the identity privacy of users. [0003] Anonymous authentication technology mainly uses cryptography to ensure the privacy of users. For example, the Identity Mixer scheme proposed by IBM provides an anonymous authentication method, and users can choose to present attributes independently during authentication. A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L29/06
CPCH04L9/0861H04L9/3218H04L9/3255H04L9/3263H04L63/0421H04L2209/42
Inventor 王震范佳白健安红章
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products