Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blockchain proxy blind signature generation method

A technology of proxy signature and blind signature, which is applied in the field of information security to achieve the effect of ensuring legal anonymity

Active Publication Date: 2021-03-12
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is still a lack of such methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blockchain proxy blind signature generation method
  • Blockchain proxy blind signature generation method
  • Blockchain proxy blind signature generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0042] Such as figure 1 As shown, a block chain proxy blind signature generation method, the method is jointly executed by the original signer OrignalSigner, the proxy signer ProxySigner and the user User, in the signing process, the original signer OrignalSigner first authorizes the proxy signer ProxySigner, After the authorization is successful, the user User blinds the message, the proxy signer ProxySigner signs the blinded message, then the user User outputs the signature, and finally the verifier can restore the original message while verifying whether the signature is correct. It includes the following steps:

[0043] system initialization:

[0044] This step is performed by the certificate authority CA, mainly to generate the system parameters of the entire proxy blind signature scheme. The specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blockchain proxy blind signature generation method, and belongs to the technical field of information security. The method comprises the following steps: firstly, generatingsystem parameters of a whole proxy blind signature scheme through a system initialization algorithm; then enabling the user to generate a public and private key pair by himself / herself and obtain thepublic and private key pair of the original signer and the public and private key pair of the proxy signer; enabling the original signer to authorize the proxy signer, after authorization succeeds, enabling the user to blind the message through the blinding factor and send the message to the proxy signer, enabling the proxy signer to sign the blinded message through the signature private key and send the signed message to the user, and enabling the user to remove the blinding of the blinded signature to obtain the signature of the message; and enabling the verifier to recover the message and perform verification when verifying the signature. The blind factor is used in the signature process to destroy the linear relationship between the final signature message and the intermediate value, so that the blindness and non-traceability of the blind signature scheme are ensured.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a block chain proxy blind signature generation method. Background technique [0002] With the continuous development of network technology, digital signatures are widely used. Digital signatures can verify data sources, information integrity, authenticity, and signature non-repudiation, and can solve problems such as forgery, repudiation, impersonation, and tampering in the network. It is currently the most widely used, most mature technology, and most operable. An electronic signature technology. However, in some specific scenarios such as electronic elections, when the original signer cannot sign, he needs to authorize the agent to sign, and the owner of the message does not want the agent to know the specific content of the message, and the signer only wants to let the agent know the content of the message. Others knew he had signed the message. Under the impet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L29/08
CPCH04L9/3247H04L9/3257H04L67/10H04L9/3263H04L63/083H04L63/0884H04L9/50
Inventor 文义红杨伊何德彪罗敏王士成李峰许建凯陈金勇徐小刚
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products