Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Ring signature method applied to threat intelligence transaction alliance chain

A ring signature and transaction technology, applied in user identity/authority verification, digital transmission systems, secure communication devices, etc., can solve problems such as alliance chain conflicts, and achieve the effect of protecting identity privacy

Active Publication Date: 2020-09-22
HARBIN ENG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because there may be differences of opinion or interest disputes among endorsers, if the identity of the endorsement node is leaked, it may lead to conflicts in the alliance chain. The user identity privacy protection of both parties to the transaction is required, and the identity anonymization protection of the transaction endorsement user is also required
There has been a lot of research and application on the protection of user privacy for both parties in the alliance chain, but there is still a huge research gap in the anonymization of transaction endorsement users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Ring signature method applied to threat intelligence transaction alliance chain
  • Ring signature method applied to threat intelligence transaction alliance chain
  • Ring signature method applied to threat intelligence transaction alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described below in conjunction with the accompanying drawings.

[0030] The purpose of the present invention is to provide a ring signature method applied in the threat intelligence transaction alliance chain for the identity privacy protection of the transaction endorsement user in the threat intelligence transaction alliance chain, which is used for the endorsement user in the threat intelligence transaction alliance chain Identity privacy encryption.

[0031] (1) Processing method in the initialization stage: output the system security parameter λ, and initialize the parameters required in subsequent encryption and verification stages. The initialization phase is executed only once, and its initialization parameters remain unchanged in all transactions of the alliance chain.

[0032] (2) Processing method in the key generation stage: After the system initializes relevant parameters successfully, any node E in the endorsement nod...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of ring signature applied to a network threat intelligence transaction alliance chain, and particularly relates to a ring signature method applied to a threat intelligence transaction alliance chain. Aiming at the problem of identity privacy protection of a transaction endorsement user in a threat intelligence transaction alliance chain, the method is used for identity privacy encryption of the endorsement user in the threat intelligence transaction alliance chain. The method has anonymity, security and unforgeability, and can be used for threatening the identity anonymization of the transaction endorsement user in the intelligence transaction alliance chain to protect the identity privacy of the transaction endorsement user in the alliance chain.

Description

technical field [0001] The invention belongs to the technical field of ring signatures applied in network threat intelligence transaction alliance chains, and in particular relates to a ring signature method applied in threat intelligence transaction alliance chains. Background technique [0002] In recent years, with the continuous development and improvement of the Internet space, the network environment, especially the network security environment, has become increasingly complex. Network threat intelligence information is a standardized data information with a high degree of information relevance and accuracy, which is helpful for various security organizations to analyze threat intelligence information and provide strong data support for the detection and defense of network threats. Network threat intelligence information transactions are an important source of information for cyberspace security organizations to obtain information. Therefore, research on the network th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3255H04L63/0421H04L63/302
Inventor 玄世昌杨武王巍苘大鹏吕继光赵阳
Owner HARBIN ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products