Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A blockchain agent blind signature generation method

A proxy signature and blind signature technology, applied in the field of information security, to ensure blindness, untraceability, and legal anonymity.

Active Publication Date: 2022-05-06
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is still a lack of such methods in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain agent blind signature generation method
  • A blockchain agent blind signature generation method
  • A blockchain agent blind signature generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The technical solutions of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0041] Such as figure 1 As shown, a block chain proxy blind signature generation method, the method is jointly executed by the original signer OrignalSigner, the proxy signer ProxySigner and the user User, in the signing process, the original signer OrignalSigner first authorizes the proxy signer ProxySigner, After the authorization is successful, the user User blinds the message, the proxy signer ProxySigner signs the blinded message, then the user User outputs the signature, and finally the verifier can restore the original message while verifying whether the signature is correct. It includes the following steps:

[0042] system initialization:

[0043] This step is performed by the certificate authority CA, mainly to generate the system parameters of the entire proxy blind signature scheme. The specifi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain proxy blind signature generation method, which belongs to the technical field of information security. This method first generates the system parameters of the entire proxy blind signature scheme through the system initialization algorithm; then the user generates a public-private key pair by himself, and obtains the public-private key pair of the original signer and the public-private key pair of the proxy signer; After the authorization is successful, the user blinds the message through the blinding factor and sends it to the proxy signer. The proxy signer signs the blinded message through the signature private key and sends it to the user. The user The signature of the message is obtained by deblinding the blinded signature, and the verifier can recover the message and verify it when verifying the signature. The present invention uses a blind factor in the signature process to destroy the linear relationship between the final signature message and the intermediate value, thereby ensuring the blindness and untraceability of the blind signature scheme of the present invention.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a block chain proxy blind signature generation method. Background technique [0002] With the continuous development of network technology, digital signatures are widely used. Digital signatures can verify data sources, information integrity, authenticity, and signature non-repudiation, and can solve problems such as forgery, repudiation, impersonation, and tampering in the network. It is currently the most widely used, most mature technology, and most operable. An electronic signature technology. However, in some specific scenarios such as electronic elections, when the original signer cannot sign, he needs to authorize the agent to sign, and the owner of the message does not want the agent to know the specific content of the message, and the signer only wants to let the agent know the content of the message. Others knew he had signed the message. Under the impet...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L67/10H04L9/40
CPCH04L9/3247H04L9/3257H04L67/10H04L9/3263H04L63/083H04L63/0884H04L9/50
Inventor 文义红杨伊何德彪罗敏王士成李峰许建凯陈金勇徐小刚
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products