Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based recoverable message blind signature generation method

A blind signature and message technology, applied in the field of information security, can solve problems such as message transmission overhead, dispute resolution, and adverse effects of behavior tracking, so as to avoid certificate management problems, reduce communication and storage overhead, and reduce system operation and maintenance costs. Effect

Active Publication Date: 2021-03-16
NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 2) Message transmission overhead problem
[0006] 3) Regulatory issues
Anonymity is a double-edged sword. On the one hand, the blinding nature of blind signatures protects user privacy well, but on the other hand, it has adverse effects on dispute resolution and behavior tracking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based recoverable message blind signature generation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to facilitate the understanding of the technical solutions of this patent, in order to make this patent, the technical solutions and beneficial effects are clearer, and the scope of the claims is fully supported, the following is in the form of a specific case. The patented technical solution makes further, more detailed descriptions.

[0032] An identity-based recoverable message blind sign name generation method involves four roles of key generation center KGC, signature, users, and verifiers. First, the system parameter setting and the generation of the system master key are completed by the KGC. Second, KGC issues a private key D corresponding to each signature. ID . After that, in the signature phase, the signature is challenged by the random point R, and the user uses blind factor α, β to the message M blindly Signer again uses private key D ID Correct Signature User Drafage to get the signature σ = (v, s). During the verification process, the validator di...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based recoverable message blind signature generation method, and belongs to the technical field of information security. The method comprises the following steps: asecret key generation center generates a secret key and issues a signature private key to each signer; then, the user blinds the message, the signer signs the blinded message to obtain a blinded signature, and finally, the user removes the blindness of the blinded signature to obtain a final signature; and finally, the verifier verifies the legality of the signature by using the public key of thesigner, and if the signature is legal, the message is extracted. In the signature process, the double-blinding technology is used for destroying linearity of messages and signatures, and therefore blindness, non-traceability and supervisibility needed by a blind signature scheme are achieved.

Description

Technical field [0001] The present invention relates to the field of information security, particularly refers to an identity-based recoverable message blind sign name generation method. Background technique [0002] With the emergence and development of digital currencies, the block chain technology is being subcompered as a subversive technology leader in the digital economic era, the world's scientific and technological revolution, the industry revolution and the digital revolution. Block chain transaction security is the basis of the running of the block chain system, and anonymous trading is an important means to protect user transaction privacy. Typically, digital signatures replaced traditional handwritten signatures in realizing unable tolerable features, and is widely used in block chain systems to achieve authentication of data, behavior. However, in traditional digital signatures, the signature must know the specific content of its signing information, making it diffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30H04L9/06
CPCH04L9/3247H04L9/3257H04L9/3073H04L9/0643
Inventor 文义红彭聪罗敏何德彪王士成于君娜陈金勇徐小刚
Owner NO 54 INST OF CHINA ELECTRONICS SCI & TECH GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products