CN109462481B - 一种基于非对称双线性对的匿签密方法 - Google Patents

一种基于非对称双线性对的匿签密方法 Download PDF

Info

Publication number
CN109462481B
CN109462481B CN201811403997.XA CN201811403997A CN109462481B CN 109462481 B CN109462481 B CN 109462481B CN 201811403997 A CN201811403997 A CN 201811403997A CN 109462481 B CN109462481 B CN 109462481B
Authority
CN
China
Prior art keywords
secret
signcryption
aux
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811403997.XA
Other languages
English (en)
Other versions
CN109462481A (zh
Inventor
赵运磊
王红兵
黄兴忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Humin Blockchain Technology Co ltd
Original Assignee
Shanghai Humin Blockchain Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Humin Blockchain Technology Co ltd filed Critical Shanghai Humin Blockchain Technology Co ltd
Priority to CN201811403997.XA priority Critical patent/CN109462481B/zh
Publication of CN109462481A publication Critical patent/CN109462481A/zh
Priority to PCT/CN2019/112508 priority patent/WO2020103631A1/zh
Application granted granted Critical
Publication of CN109462481B publication Critical patent/CN109462481B/zh
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • H04L9/3073Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Algebra (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

本发明提供了一种非对称环境下基于身份的匿签密方法,包括:生成系统主私钥
Figure DDA0003315176390000011
在非对称双线性对类型‑1和类型‑2下,身份为
Figure DDA0003315176390000012
的匿签密发送方的私钥为
Figure DDA0003315176390000013
身份为
Figure DDA0003315176390000014
的匿签密验证方的私钥为
Figure DDA0003315176390000015
Figure DDA0003315176390000016
Figure DDA0003315176390000017
选取
Figure DDA0003315176390000018
计算
Figure DDA0003315176390000019
Figure DDA00033151763900000110
并将{X,C}发送给
Figure DDA00033151763900000111
其中
Figure DDA00033151763900000112
是双线性映射。在非对称双线性对类型‑3下,身份为
Figure DDA00033151763900000113
的匿签密发送方的私钥为
Figure DDA00033151763900000114
身份为
Figure DDA00033151763900000115
的匿签密验证方的私钥为
Figure DDA00033151763900000116
Figure DDA00033151763900000117
选取
Figure DDA00033151763900000118
计算
Figure DDA00033151763900000119
Figure DDA00033151763900000120
并将{X,C}发送给
Figure DDA00033151763900000121

Description

一种基于非对称双线性对的匿签密方法
技术领域
本发明涉及密码技术领域,具体地说,涉及一种基于非对称双线性对的身份基匿签密方法。
背景技术
数字签名和公钥加密是密码理论及应用的核心内容。签密是将数字签名和公钥加密的功能合二为一,既保证了加密内容的完整性和可验证性,又保证了加密消息的私密性,并且比简单地结合签名和加密的效率大为提升。与传统的公钥密码体制下相比,基于身份的签密将用户的身份作为公钥,可以简化公钥证书管理和发放的问题。但是,原有的基于身份签密方案均需公开传输用户的身份和公钥信息,并且效率较差。而在移动互联时代,设备的计算和存储能力受限,并且在很多应用中用户的身份信息往往属于敏感信息,需要保护。因此,发展高效的基于身份的身份匿藏签密方法(简记为“匿签密”)具有重要的理论及应用意义。
令G1、G2和GT是三个q阶循环群(q可以是素数,也可以是合数,如RSA模数)。为了描述方便起见,我们记G1、G2和GT为乘法群(所有本发明中描述的方案均在G1、G2和GT记为加法群时同样工作)。一般而言,一个双线性对
Figure GDA0003462521140000016
就是一个从G1×G2到GT的双线性映射,并满足下面性质:
(1)双线性:设g1∈G1,g2∈G2,x,y∈Zq,有
Figure GDA0003462521140000011
(2)非退化性:对于每一个
Figure GDA0003462521140000012
总存在一个g2∈G2,使得
Figure GDA0003462521140000013
其中,
Figure GDA0003462521140000014
是G1的单位元,
Figure GDA0003462521140000015
是GT的单位元;
(3)双线性映射可以有效计算。
双线性对有下面三种类型:
Type-1(类型1):G1→G2有一个可有效计算的同构,这时一般记为G1=G2(通常用G表示)。这类双线性对一般可以用超奇异椭圆曲线或超椭圆曲线来实现。
Type 2(类型2):有一个有效计算群同态G2→G1,但无从G1到G2的有效同态。这类双线性对一般用素数域上的一般椭圆曲线实现,G1是基域上椭圆曲线群,G2是扩域上椭圆曲线子群,G2→G1的同态一般取迹映射。
Type 3(类型3):没有任何G2→G1或G1→G2的有效可计算的同态(同态甚至同构一定是存在的,这里是指没有有效计算的同构)。这类双线性对也是用素域上的一般曲线来构造,G2一般取迹映射的核。
本发明所描述的方法可以在上述三种类型双线性对任一类型上都可以工作,区别在于:对于类型1双线性对,G1=G2;对于类型2双线性对,系统公开参数中需要有一个可有效计算的同构ψ:G1→G2,即ψ为将G1中元素映射到G2的可有效计算的同构;对于类型3双线性对,系统公开参数中不需要有一个可有效计算的同构ψ:G1→G2,但每个用户的私钥由一个增加到两个,分别用于签密和验证签密。在下述的发明方案描述中,基于类型-2和类型-3来描述,当应用到类型-1双线性对时则有G1=G2
发明内容
为解决上述问题,本发明提供了一种非对称环境下高效的基于身份的匿签密方法,包括:私钥生成器生成系统主私钥
Figure GDA0003462521140000021
在非对称双线性对类型-1和类型-2下,身份为
Figure GDA0003462521140000022
的匿签密发送方的私钥为
Figure GDA0003462521140000023
身份为
Figure GDA0003462521140000024
的匿签密验证方的私钥为
Figure GDA0003462521140000025
选取
Figure GDA0003462521140000026
计算
Figure GDA0003462521140000027
Figure GDA0003462521140000028
并将{X,C}发送给
Figure GDA0003462521140000029
其中
Figure GDA00034625211400000210
是双线性映射。
Figure GDA00034625211400000211
计算
Figure GDA00034625211400000212
Figure GDA00034625211400000213
Figure GDA00034625211400000214
则接受匿签密信息M。在非对称双线性对类型-3下,身份为
Figure GDA00034625211400000215
的匿签密发送方的私钥为
Figure GDA00034625211400000216
Figure GDA00034625211400000217
身份为
Figure GDA00034625211400000218
的匿签密验证方的私钥为
Figure GDA00034625211400000219
Figure GDA00034625211400000220
选取
Figure GDA00034625211400000221
计算
Figure GDA00034625211400000222
Figure GDA00034625211400000223
并将{X,C}发送给
Figure GDA00034625211400000224
其中
Figure GDA00034625211400000225
是双线性映射。
Figure GDA00034625211400000226
计算
Figure GDA00034625211400000227
Figure GDA00034625211400000228
Figure GDA00034625211400000229
则接受匿签密信息M。
附图说明
图1是发明方法一个实例(非对称双线性配对类型-2)实现的流程图。
图2是发明方法一个实例(非对称双线性配对类型-3)实现的流程图。
具体实施方式
图1是发明方法一个实例(非对称双线性配对类型-2)实现的流程图;其中,令G1≠G2,
Figure GDA0003462521140000031
auxM为空,
Figure GDA0003462521140000032
为群GT的单位元,H:{0,1}*→G1是哈希函数,D是与加密函数E对应的解密函数,
Figure GDA0003462521140000033
指的是利用密钥K对密文C进行解密得到
Figure GDA0003462521140000034
表示的是x从
Figure GDA0003462521140000035
中随机选取。
图2是发明方法一个实例(非对称双线性配对类型-3)实现的流程图;其中,令G1≠G2,
Figure GDA0003462521140000036
auxM为空,
Figure GDA0003462521140000037
为群GT的单位元,H1:{0,1}*→G1,H2:{0,1}*→G2是两个哈希函数,D是与加密函数E对应的解密函数,
Figure GDA0003462521140000038
指的是利用密钥K对密文C进行解密得到
Figure GDA0003462521140000039
表示的是x从
Figure GDA00034625211400000310
中随机选取。
本发明提供了一种基于非对称双线性对的匿签密方法,现举例给出具体实施方式:
系统建立:生成系统公开参数,一个安全参数n取128,双线性对
Figure GDA00034625211400000311
G1×G2→GT,其中G1、G2和GT是三个q阶循环群,整数q取3594707740912722592580264824659245374581620005772120566140827390747490618210732713776201829166921179104690985316170865403357128018053115705235365035756944666781840271151398486024508905819032066430042870294016997308232041571009239026199854058373227102211040396565230117801219598111998342507534997235192001889,q的二进制长度(记为|q|)为n的多项式;两个哈希函数:H1:{0,1}*→G1,H2:{0,1}*→G2,分别采用MD5和SHA-1函数;密钥导出函数KDF:{0,1}*→{0,1}n采用Openssl的AES算法内置KDF;g1为G1的生成元,取值72026754027934651490995918212523766243371000525971101339334699885320636543746077563483364060839557244370694227487917252409638191550569389028359389164974323853180025346237445763293422583856014029352597479177910324941936807527651378495009235344516904490274731975063077229612562360754643102255089897348148780690,g2∈G2为G2的生成元,取值77706302561608440010618368313478656108503343589089519700566055587018553414302968551516717115506698339473642981470868826042443741805044287846666289451133627751364843226483789350336451089265057408624982566636736744757835440696623220350219622426665921578454579853475107616688094007335536946549349101096432348567,
Figure GDA0003462521140000041
为群GT的单位元;E采用对称加密函数AES;系统公开参数包括:
Figure GDA0003462521140000042
系统公开参数可以由系统内的用户协商决定,或由可信第三方给定;PKG生成系统主密钥
Figure GDA0003462521140000043
msk取315541380177942662356417812076875991665600114430;
用户私钥提取:具有身份ID∈{0,1}*的用户在PKG注册,PKG为其生成私钥:
Figure GDA0003462521140000044
为了描述方便起见,下述的方法描述中签密的生成方的身份记为
Figure GDA0003462521140000045
Figure GDA0003462521140000046
计算签密和验证签密私钥分别
Figure GDA0003462521140000047
Figure GDA0003462521140000048
Figure GDA0003462521140000049
签密验证方记为
Figure GDA00034625211400000410
Figure GDA00034625211400000411
签密和验证签密私钥分别为
Figure GDA00034625211400000412
Figure GDA00034625211400000413
Figure GDA0003462521140000051
匿签密生成:令M∈{0,1}*为匿签密的信息,M取值2MMMMMMMMMMMMMMMMmmmmmmMMMMMMMMMMMMMMMMMMMMM;用户
Figure GDA0003462521140000052
选取x=272228183584204209780836865847286436217086609891,计算
Figure GDA0003462521140000053
Figure GDA0003462521140000054
Figure GDA0003462521140000055
若采用类型-3双线性对,计算
Figure GDA0003462521140000056
Figure GDA0003462521140000057
Figure GDA0003462521140000058
(若采用类型-2双线性对,计算
Figure GDA0003462521140000059
)若
Figure GDA00034625211400000510
(否则重新选取x,重新计算PS),计算K=KDF(PS,auxK)=KDF(PS,auxK)={rounds=10;rd_key=4216471528 24692937404275299365 3296311078 2466021090 3720210055 17518228831838784427 10530547351329698917}iv=a45978c5a2726072,
Figure GDA00034625211400000511
计算
Figure GDA00034625211400000512
Figure GDA00034625211400000513
得667afc15fc776f81b5f74e9028723c7236f804cf40491f86cbcc70a1ef3b5976e1343fe5cdedd30ad1da70fbfd61cf53a1a7ab57d004c56799351dd3afa32cdf13506dc5e10af7cd39fc3ca426cb7b7fd091c5d70454517841a01412e48d2b43;最后,用户
Figure GDA00034625211400000514
将{X,C}发送给用户
Figure GDA00034625211400000515
匿签密验证:用户
Figure GDA00034625211400000516
接收到{X,C}后,若采用类型-3双线性对,计算
Figure GDA00034625211400000517
Figure GDA00034625211400000518
Figure GDA00034625211400000519
(若采用类型-1双线性对,计算
Figure GDA00034625211400000520
若采用类型-2双线性对,计算
Figure GDA00034625211400000521
Figure GDA00034625211400000522
);若
Figure GDA00034625211400000523
计算K=KDF(PS,auxK)={rounds=10;rd_key=4216471528 24692937404275299365 3296311078 2466021090 3720210055 17518228831838784427 10530547351329698917}iv=a45978c5a2726072,
Figure GDA0003462521140000061
利用K对C解密得到
Figure GDA0003462521140000067
Figure GDA0003462521140000064
Figure GDA0003462521140000065
Figure GDA0003462521140000066
与传输密文相等,验证成功,接受匿签密信息M。
本发明的其它特征和优点将在随后的说明书中阐述,并且,部分地从说明书中变得显而易见,或者通过实施本发明而了解。本发明的目的和其他优点可通过在说明书、权利要求书以及附图中所特别指出的结构来实现和获得。
应该理解的是,本发明所公开的实施例不限于这里所公开的特定处理步骤,而应当延伸到相关领域的普通技术人员所理解的这些特征的等同替代。还应当理解的是,在此使用的术语仅用于描述特定实施例的目的,而并不意味着限制。
说明书中提到的“两个实施例”或“实施例”意指结合实施例描述的特定特征、结构或特性包括在本发明的至少两个实施例中。因此,说明书通篇各个地方出现的短语“两个实施例”或“实施例”并不一定均指同一实施例。
虽然上述示例用于说明本发明在一个或多个应用中的原理,但对于本领域的技术人员来说,在不背离本发明的原理和思想的情况下,明显可以在形式上、用法及实施的细节上作各种修改而不用付出创造性劳动。因此,本发明由所附的权利要求书来限定。

Claims (1)

1.一种基于非对称双线性对的身份基匿签密方法,所述方法包括:
系统建立:生成系统公开参数,包括:一个安全参数n,双线性对
Figure FDA00034625211300000132
Figure FDA00034625211300000133
整数q,其中G1、G2和GT是三个q阶循环群,q的二进制长度记为|q|,其为n的多项式;两个哈希函数:H1:{0,1}*→G1,H2:{0,1}*→G2,一个可有效计算的同构ψ:G1→G2,一个密钥导出函数KDF:{0,1}*→{0,1}n;令g1∈G1为G1的生成元,g2∈G2为G2的生成元,1GT为群GT的单位元;E为一个对称加密函数;系统公开参数记为:
Figure FDA0003462521130000011
系统公开参数可以由系统内的用户协商决定,或由可信第三方给定;私钥生成器PKG,生成用户主密钥msk,且
Figure FDA0003462521130000012
即msk从
Figure FDA0003462521130000013
中随机选取,其中
Figure FDA0003462521130000014
的取值范围为1到q-1中的整数,且q为一个大素数;公开发布SysPar,保密保存msk;
用户私钥生成:具有身份ID∈{0,1}*的用户在PKG注册,PKG根据主密钥msk和用户身份生成用户私钥:
Figure FDA0003462521130000015
其中
Figure FDA0003462521130000016
用来签密,
Figure FDA0003462521130000017
用来验证签密;签密生成方记为
Figure FDA0003462521130000018
签密和验证签密私钥分别为
Figure FDA0003462521130000019
签密验证方记为
Figure FDA00034625211300000110
签密和验证签密私钥分别为
Figure FDA00034625211300000111
匿签密生成:令M∈{0,1}*为匿签密的信息;
构造方法一,基于Type 1双线性对:用户
Figure FDA00034625211300000112
选取
Figure FDA00034625211300000113
计算
Figure FDA00034625211300000114
Figure FDA00034625211300000115
计算
Figure FDA00034625211300000116
Figure FDA00034625211300000117
计算K=KDF(PS,auxK);计算
Figure FDA00034625211300000118
即:将K作为对称加密函数E的密钥对
Figure FDA00034625211300000119
按照规定或约定编码方式进行加密,其中auxM是可为空或包含一个时间戳信息的集合;群G1和G2可以相等,其记为G,即基于Type1的双线性配对的构造如构造方法一;q为素数或合数;从
Figure FDA00034625211300000120
中随机选取,或在ZQ∩{0,1}l中随机选取,其中,1≤l≤|q|;
Figure FDA00034625211300000121
Figure FDA00034625211300000122
Figure FDA00034625211300000123
E是一个认证加密函数或者带有辅助输入的认证加密函数;最后,用户
Figure FDA00034625211300000124
将{X,C}发送给用户
Figure FDA00034625211300000125
构造方法二,基于Type 2双线性对:用户
Figure FDA00034625211300000126
选取
Figure FDA00034625211300000127
计算
Figure FDA00034625211300000128
Figure FDA00034625211300000129
计算
Figure FDA00034625211300000130
Figure FDA00034625211300000131
计算K=KDF(PS,auxK),auxK或为空,或为
Figure FDA0003462521130000021
的一个子集;计算
Figure FDA0003462521130000022
即:将K作为对称加密函数E的密钥对
Figure FDA0003462521130000023
按照规定或约定编码方式进行加密,其中auxM是可为空或包含一个时间戳信息的集合;G1≠G2;H1=H2:{0,1}*→G1,记为H:{0,1}*→G1,此时有
Figure FDA0003462521130000024
对于Type 2双线性对,且其构造方法不需要哈希函数H2:{0,1}*→G2;最后,用户
Figure FDA0003462521130000025
将{X,C}发送给用户
Figure FDA0003462521130000026
构造方法三,基于Type 3双线性对:用户
Figure FDA0003462521130000027
选取
Figure FDA0003462521130000028
计算
Figure FDA0003462521130000029
Figure FDA00034625211300000210
计算
Figure FDA00034625211300000211
Figure FDA00034625211300000212
计算K=KDF(PS,auxK),auxK或为空,或为
Figure FDA00034625211300000213
的一个子集,这里,哈希函数H1
Figure FDA00034625211300000214
的身份映射到群G1,哈希函数H2
Figure FDA00034625211300000215
的身份映射到群G2,且
Figure FDA00034625211300000216
计算
Figure FDA00034625211300000217
Figure FDA00034625211300000218
即:将K作为对称加密函数E的密钥对
Figure FDA00034625211300000219
按照规定或约定编码方式进行加密,其中auxM是可为空或包含一个时间戳信息的集合;G1≠G2;且其构造方法不需要一个可有效计算的同构ψ:G1→G2;最后,用户
Figure FDA00034625211300000220
将{X,C}发送给用户
Figure FDA00034625211300000221
匿签密验证:用户
Figure FDA00034625211300000222
接收到{X,C}后,针对如上的三种匿签密算法分别做如下解密及验证:
验证方法一,基于Type 1双线性对:计算
Figure FDA00034625211300000223
Figure FDA00034625211300000224
返回无效字符,表明匿签密无效;否则,计算K=KDF(PS,auxK),利用K对C解密得到
Figure FDA00034625211300000225
Figure FDA00034625211300000226
Figure FDA00034625211300000227
且auxM有效,则接受匿签密信息M,否则拒绝接受;
验证方法二,基于Type 2双线性对:计算
Figure FDA00034625211300000228
Figure FDA00034625211300000229
Figure FDA00034625211300000230
返回无效字符,表明匿签密无效;否则,计算K=KDF(PS,auxK),利用K对C解密得到
Figure FDA00034625211300000231
Figure FDA00034625211300000232
Figure FDA00034625211300000233
且auxM有效,则接受匿签密信息M,否则拒绝接受;
验证方法三,基于Type 3双线性对:计算
Figure FDA00034625211300000234
Figure FDA00034625211300000235
返回无效字符,表明匿签密无效;否则,计算K=KDF(PS,auxK),利用K对C解密得到
Figure FDA00034625211300000236
Figure FDA00034625211300000237
Figure FDA00034625211300000238
且auxM有效,则接受匿签密信息M,否则拒绝接受。
CN201811403997.XA 2018-11-23 2018-11-23 一种基于非对称双线性对的匿签密方法 Active CN109462481B (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201811403997.XA CN109462481B (zh) 2018-11-23 2018-11-23 一种基于非对称双线性对的匿签密方法
PCT/CN2019/112508 WO2020103631A1 (zh) 2018-11-23 2019-10-22 一种基于非对称双线性对的匿签密方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811403997.XA CN109462481B (zh) 2018-11-23 2018-11-23 一种基于非对称双线性对的匿签密方法

Publications (2)

Publication Number Publication Date
CN109462481A CN109462481A (zh) 2019-03-12
CN109462481B true CN109462481B (zh) 2022-04-26

Family

ID=65611372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811403997.XA Active CN109462481B (zh) 2018-11-23 2018-11-23 一种基于非对称双线性对的匿签密方法

Country Status (2)

Country Link
CN (1) CN109462481B (zh)
WO (1) WO2020103631A1 (zh)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109462481B (zh) * 2018-11-23 2022-04-26 上海扈民区块链科技有限公司 一种基于非对称双线性对的匿签密方法
CN110086620A (zh) * 2019-03-25 2019-08-02 电子科技大学 基于OpenSSL库的R-ate双线性对实现方法
CN111310210B (zh) * 2020-02-17 2022-06-17 复旦大学 基于口令和匿签密的双重认证对称可搜索加密方法
CN111786774B (zh) * 2020-06-28 2023-04-07 南京信息工程大学 基于线性反馈移位寄存器的密钥协商协议的实现方法
CN114257366B (zh) * 2021-12-20 2024-04-12 成都卫士通信息产业股份有限公司 信息同态处理方法、装置、设备及计算机可读存储介质
CN114362917B (zh) * 2021-12-28 2024-04-30 安徽师范大学 移动群智感知中安全可验证的数据真值发现方法
CN114844625B (zh) * 2022-03-08 2024-04-16 武汉大学 基于异构签密和激励机制的换电预约服务方法及设备
CN114978658B (zh) * 2022-05-17 2023-10-27 支付宝(杭州)信息技术有限公司 数据处理方法及装置
CN115225357B (zh) * 2022-07-12 2023-09-01 浙江工商大学 一种可验证的隐私保护多子集数据聚合方法
CN117478329B (zh) * 2023-10-16 2024-04-26 武汉大学 基于身份密钥封装的多用户抗合谋密文检索方法及设备

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7590236B1 (en) * 2004-06-04 2009-09-15 Voltage Security, Inc. Identity-based-encryption system
US7822200B2 (en) * 2005-03-07 2010-10-26 Microsoft Corporation Method and system for asymmetric key security
US7921294B2 (en) * 2006-09-07 2011-04-05 International Business Machines Corporation Verification of encryption key
WO2008112048A1 (en) * 2007-02-02 2008-09-18 Tecordia Technologies, Inc. Method and system to authorize and assign digital certificates without loss of privacy
CN101626364A (zh) * 2008-07-08 2010-01-13 赵运磊 一类可基于口令、抗秘密数据泄露的认证和密钥交换方法
CN103746811B (zh) * 2013-12-27 2017-01-25 西安邮电大学 从身份公钥系统到证书公钥系统的匿名签密方法
CN105306212B (zh) * 2015-08-31 2019-09-10 上海扈民区块链科技有限公司 一种身份隐藏且强安全的签密方法
CN105743646B (zh) * 2016-02-03 2019-05-10 四川长虹电器股份有限公司 一种基于身份的加密方法及系统
US10951423B2 (en) * 2016-03-29 2021-03-16 Koninklijke Philips N.V. System and method for distribution of identity based key material and certificate
CN106850195B (zh) * 2016-04-18 2020-05-19 中国科学院信息工程研究所 一种即时通信中群组密钥协商与通信方法
CN106453253B (zh) * 2016-09-06 2019-10-25 上海扈民区块链科技有限公司 一种高效的基于身份的匿签密方法
WO2018070932A1 (en) * 2016-10-14 2018-04-19 Huawei International Pte. Ltd. System and method for querying an encrypted database for documents satisfying an expressive keyword access structure
CN107566121B (zh) * 2016-11-18 2020-03-10 上海扈民区块链科技有限公司 一类高效的秘密共识方法
CN108173639B (zh) * 2018-01-22 2020-10-27 中国科学院数据与通信保护研究教育中心 一种基于sm9签名算法的两方合作签名方法
CN108650097B (zh) * 2018-04-28 2021-03-09 上海扈民区块链科技有限公司 一种高效的聚合数字签名方法
CN108667616B (zh) * 2018-05-03 2021-05-04 西安电子科技大学 基于标识的跨云安全认证系统和方法
CN109462481B (zh) * 2018-11-23 2022-04-26 上海扈民区块链科技有限公司 一种基于非对称双线性对的匿签密方法

Also Published As

Publication number Publication date
CN109462481A (zh) 2019-03-12
WO2020103631A1 (zh) 2020-05-28

Similar Documents

Publication Publication Date Title
CN109462481B (zh) 一种基于非对称双线性对的匿签密方法
CN108173639B (zh) 一种基于sm9签名算法的两方合作签名方法
CN111314089B (zh) 一种基于sm2的两方协同签名方法及解密方法
CN104270249B (zh) 一种从无证书环境到基于身份环境的签密方法
JP4809598B2 (ja) 暗号システムの設計におけるアイソジャニの使用
CN104767612B (zh) 一种从无证书环境到公钥基础设施环境的签密方法
CN104301108B (zh) 一种从基于身份环境到无证书环境的签密方法
CN110120939B (zh) 一种基于异构系统的可否认认证的加密方法和系统
CN110113150B (zh) 基于无证书环境的可否认认证的加密方法和系统
CN107425971B (zh) 无证书的数据加/解密方法和装置、终端
CN104767611B (zh) 一种从公钥基础设施环境到无证书环境的签密方法
CN109698747B (zh) 一种基于双线性对的身份基身份匿藏密钥协商方法
CN101471776A (zh) 基于用户身份标识防止pkg伪造签名的方法
WO2016112734A1 (zh) 一种具有选择和排除功能的群组加解密方法及系统
WO2007076659A1 (fr) Procede et systeme de chiffrement a base d'id
JP2004208262A (ja) バイリニアペアリングを用いたidに基づくリング署名装置及び方法
CN110519226B (zh) 基于非对称密钥池和隐式证书的量子通信服务端保密通信方法和系统
CN106713349B (zh) 一种能抵抗选择密文攻击的群组间代理重加密方法
CN107086912B (zh) 一种异构存储系统中的密文转换方法、解密方法及系统
Yao et al. A light-weight certificate-less public key cryptography scheme based on ECC
CN110784314A (zh) 无证书的加密信息处理方法
CN109831305B (zh) 基于非对称密钥池的抗量子计算签密方法和系统
Kumar et al. An efficient implementation of digital signature algorithm with SRNN public key cryptography
JP2006208967A (ja) Idベース暗号通信方法および装置
CN112511310B (zh) 一种加密身份盲签名的混淆方法

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant