Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blind signcryption method under lattice public key cryptosystem

A technology of public key cryptography and blind signature, applied in the field of lattice public key cryptography or blind sign cryptography, and cryptography, can solve problems such as excessive bilinear pairing operations, abnormal scheme signatures, and low computational efficiency

Active Publication Date: 2019-08-16
XIAN UNIV OF POSTS & TELECOMM
View PDF2 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2005, Yuan first proposed a provably secure identity-based blind signcryption using bilinear pairings, but this scheme uses too many bilinear pairing operations and has low computational efficiency.
In 2016, Tian et al. proposed the first identity-based partial blind signature scheme against quantum attacks on the lattice, but the scheme has a signature anomaly problem; even the signature generated by the interaction between the honest signer and the requester in the scheme may be unqualified signature
Currently there is no blind signcryption method under lattice public key cryptography

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blind signcryption method under lattice public key cryptosystem
  • Blind signcryption method under lattice public key cryptosystem
  • Blind signcryption method under lattice public key cryptosystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076] In this embodiment, the large prime number q is 2 128 For example, in figure 1 Among them, the blind signcryption method under the lattice public key system of this embodiment consists of the following steps:

[0077] A. System initialization

[0078] (A1) Trusted party defines modulo q residual class ring Z q The n-row nk-column matrix G, modulo q, is:

[0079] q=p v

[0080] Where p is a large prime number, v is a finite positive integer; in this embodiment, p is 2, and v is 128.

[0081] (A2) The trusted party defines three integers m 0 ,m,m 1 Dimensions to use as matrix-vectors.

[0082] (A3) The trusted party defines the error rate α∈(0,1) with error learning, and selects Gaussian parameters

[0083]

[0084] (A4) The trusted party defines the ring R:

[0085] R=Z q [x] / f(x)

[0086] where f(x) is a polynomial. f (x) of the present embodiment is:

[0087] f(x)=x n +a n x n-1 +…+a 2 x+a 1

[0088] The irreducible polynomial whose leading coeff...

Embodiment 2

[0144] In this embodiment, the large prime number q is 2 256 As an example, the blind signcryption method under the lattice public key system consists of the following steps:

[0145] A. System initialization

[0146] (A1) Trusted party defines modulo q residual class ring Z q The n-row nk-column matrix G, modulo q, is:

[0147] q=p v

[0148] Where p is a large prime number, v is a finite positive integer; in this embodiment, p is 2, and v is 256.

[0149] The other steps of this step are the same as in Example 1.

[0150] Other steps are identical with example 1.

Embodiment 3

[0152] In this embodiment, the large prime number q is 2 512 As an example, the blind signcryption method under the lattice public key system consists of the following steps:

[0153] A. System initialization

[0154] (A1) Trusted party defines modulo q residual class ring Z q The n-row nk-column matrix G on q is:

[0155] q=p v

[0156] Where p is a large prime number, v is a finite positive integer; in this embodiment, p is 2, and v is 512.

[0157] The other steps of this step are the same as in Example 1.

[0158] Other steps are identical with example 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blind signcryption method under a lattice public key cryptosystem. The blind signcryption method is characterized by comprising the steps of system initialization, user key generation, message owner blinding message, user signature, encryption and verification. According to the invention, by referencing a blind signcryption and lattice password method under a traditionalpassword system, a lattice-based post-quantum blind signcryption method is constructed, so that the blind signcryption efficiency is higher than the efficiency of blind signature before encryption, compared with a lattice-based blind signature method, an encryption function is added, and relative to a blind signcryption method under the assumption of finite field discrete logarithm and elliptic curve discrete logarithm, due to the fact that the blind determination message Mu is added in the signcryption scheme, the blind function is added, the signcryption has anonymity, the privacy of a message owner is effectively protected, the quantum attack can be resisted, the calculation efficiency is higher, and the method can be used for the technical field of electronic signcryption.

Description

technical field [0001] The invention belongs to the technical field of network information security, and specifically relates to cryptography, a lattice public key cryptosystem or a blind sign encryption method. Background technique [0002] Signcryption can complete both encryption and signature operations in one logical step at a much lower computational and communication cost than signing first and then encrypting. However, signcryption, as a very important cryptographic primitive, develops relatively slowly on lattice construction. [0003] In 1996, Ajtai found a connection between the worst-case complexity and the average-case complexity of some well-known lattice problems. Later, Ajtai and Dwork proposed a public key cryptosystem based on lattice theory, which has opened up a new field for public key cryptosystem since then. GGH public key cryptosystem, NTRU public key cryptosystem, Regev public key cryptosystem and other public key cryptosystems based on lattice the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/32
CPCH04L9/0643H04L9/3247H04L9/0863H04L9/0869H04L9/0861
Inventor 俞惠芳白璐
Owner XIAN UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products