Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe and efficient SM9 ring signature generation and verification method

A verification method and ring signature technology, applied in the field of information security, to achieve the effects of improving the efficiency of signature and verification operations, ensuring spontaneity, and reducing the number of bilinear pairings

Active Publication Date: 2020-03-13
WUHAN UNIV
View PDF11 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, many researchers have designed a variety of identity-based ring signature schemes based on the ring structure designed by Rivest et al., but this structure will cause computational overhead to grow linearly with the number of ring users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and efficient SM9 ring signature generation and verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0037] This patent designs a safe and efficient SM9 ring signature generation scheme. In this scheme, the key generation center (KGC) is responsible for key distribution, and the signer (Signer) is responsible for spontaneously forming a signature group and completing the message signature. The verifier (Verifier) ​​can verify the legitimacy of the message signature and judge whether the signer is ring users. In terms of computational overhead, the ring signature scheme designed in this patent only needs one bilinear pairing operation to complete the signature, and the verifier only needs to perform two bilinear pairing op...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe and efficient SM9 ring signature generation and verification method, which comprises a key generation center KGC, a signer Siger and a verifier Verifier, and is characterized in that the KGC is responsible for generating a user private key of a signed user in a system; wherein the number of users is set to be n and a signer is the pi user in a user group. Themethod comprises the following steps: 1) generating a ring signature for a message M; and 2) performing legality verification on the signature obtained in the step 1), and judging whether the signer is an in-loop user or not. According to the ring signature generation and verification scheme based on an SM9 digital signature algorithm, the unforgeability of signatures and the anonymity of signersare guaranteed, the spontaneity of rge user group generated by the signers is guaranteed, and other user cooperation is not needed. The ring signature is realized by adopting an accumulation structure, so that the bilinear pair frequency of signature generation and verification algorithm execution is greatly reduced, and the signature and verification operation efficiency is effectively improved.

Description

technical field [0001] The invention relates to information security technology, in particular to a safe and efficient SM9 ring signature generation and verification method. Background technique [0002] Ring signature is a typical digital signature mechanism to achieve anonymity. It can realize that a certain user completes the signing of a message on behalf of a user group, and hides the identity of the signer in the user group. The signer first selects a temporary user group, which includes the signer himself, and then uses his own private key and the public key of other people in the user group to independently generate a signature without the help of others. The group of users chosen by the signer is generally called a ring. [0003] The ring signature technology was proposed by Ron Rivest, Adi Shamir and Yael Tauman in 2001, and it got its name from the ring signature structure in the scheme proposed by the three of them. Compared with group signature, it does not re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0825H04L9/0833H04L9/3066H04L9/3255
Inventor 何德彪彭聪范青贾小英罗敏黄欣沂
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products