CN109831312A - It can connection ring endorsement method, device, equipment and storage medium - Google Patents

It can connection ring endorsement method, device, equipment and storage medium Download PDF

Info

Publication number
CN109831312A
CN109831312A CN201910243182.8A CN201910243182A CN109831312A CN 109831312 A CN109831312 A CN 109831312A CN 201910243182 A CN201910243182 A CN 201910243182A CN 109831312 A CN109831312 A CN 109831312A
Authority
CN
China
Prior art keywords
private key
public
label
indicate
key pair
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910243182.8A
Other languages
Chinese (zh)
Other versions
CN109831312B (en
Inventor
张鹏
任浩
喻建平
申屠青春
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen University
Original Assignee
Shenzhen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen University filed Critical Shenzhen University
Priority to CN201910243182.8A priority Critical patent/CN109831312B/en
Publication of CN109831312A publication Critical patent/CN109831312A/en
Application granted granted Critical
Publication of CN109831312B publication Critical patent/CN109831312B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, method includes: to obtain security parameter and confidential information to be added;System parameter is generated according to security parameter, wherein system parameter includes: the first hash function, the second hash function, the first generation member and the second generation member;Public private key pair set is generated according to system parameter;Wherein, public private key pair set includes public private key pair, and public private key pair includes public key and the private key with public key match;The signature of preset structure is determined for compliance with according to confidential information to be added, system parameter and public private key pair set;Wherein, preset structure includes the first label, signature element, more powers and inner product demonstration;Inner product demonstration is that the inner product of primary vector is proved, and primary vector includes third label, more powers, challenge, the first random subvector and the second random subvector.The communication complexity of signature is reduced into O (log in no premise for reducing safety by this method2(n)) storage and communications cost, are reduced.

Description

It can connection ring endorsement method, device, equipment and storage medium
Technical field
The present invention relates to digital signature technology field more particularly to one kind can connection ring endorsement method, device, equipment and Storage medium.
Background technique
It is a kind of technology based on ring signatures that ring signatures, which can be connected, it can guarantee the case where user identity is not leaked Under sign to message, and increase connectivity, this is found the repetition Autograph Session of malicious user.Based on above-mentioned spy Property, can connect ring signatures be used to encrypt in currency, while realizing transaction anonymity, be also act against dual payment.
However, the existing communication complexity for connecting ring signatures is O (n) in the case where not using Bilinear map, Cause the length of signature can be linearly increasing with the increase of user, and then increases storage and communications cost.
Summary of the invention
The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, with solve due to existing Can connection ring signature length can be linearly increasing with the increase of user, cause storage and communications cost increase the technical issues of.
In a first aspect, the present invention one kind is provided can connection ring endorsement method, which comprises
Obtain security parameter and confidential information to be added;
System parameter is generated according to the security parameter, wherein the system parameter includes: the first hash function, second Hash function, first generate member and the second generation member;
Public private key pair set is generated according to the system parameter;Wherein, the public private key pair set includes public private key pair, institute Stating public private key pair includes public key and the private key with the public key match;
Preset structure is determined for compliance with according to confidential information, the system parameter and the public private key pair set to be added Signature;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;Inner product demonstration is the The inner product of one vector is proved, the primary vector include third label, more powers, challenge, the first random subvector and second with Loom vector.
System parameter can be generated according to security parameter in connection ring endorsement method in one kind provided by the invention, according to being Parameter of uniting generates public private key pair set, determines and signs further according to confidential information to be added, system parameter and public private key pair set, so that Signature includes the first label, signature element, more powers and inner product demonstration, in no premise for reducing safety, by signature Communication complexity is reduced into O (log2(n)) storage and communications cost, are reduced.
Optionally, first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function, pkjIndicate the corresponding public key of j-th of private key.
Optionally, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second Hash Function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1, pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively Indicate n-1 random number, m indicates input message.
Optionally, more powers specifically:
Wherein, P indicates more powers.
Optionally, the primary vector specifically:
W=(pki dhi, P, c ', C, E)
Wherein, W is primary vector, pki dhiIndicate that third label, C indicate the first random subvector, C=(c1, c2..., cj-1, cj, cj+1..., cn), E indicates the second random subvector, E=(1,1 ..., 1).
Below to can connection ring signature apparatus be introduced, implementing principle and technical effect and above method principle and skill Art effect is similar, and details are not described herein again.
Second aspect, the present invention provide one kind can connection ring signature apparatus, described device includes:
Module is obtained, for obtaining security parameter and confidential information to be added;
Generation module, for generating system parameter according to the security parameter, wherein the system parameter includes: first Hash function, the second hash function, first generate member and the second generation member;
The generation module is also used to generate public private key pair set according to the system parameter;Wherein, the public private key pair Set includes public private key pair, and the public private key pair includes public key and the private key with the public key match;
Determining module, for being determined to system parameter described in the use of information to be encrypted and the public private key pair set Meet the signature of preset structure;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;Institute It states the inner product that inner product demonstration is primary vector to prove, the primary vector includes third label, more powers, challenge, first with loom Vector and the second random subvector.
Optionally, first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function, pkjIndicate the corresponding public key of j-th of private key.
Optionally, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second Hash Function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1, pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively Indicate n-1 random number, m indicates input message.
The third aspect, the present invention provide a kind of electronic equipment, comprising: at least one processor and memory;
Wherein, the memory stores computer executed instructions;
At least one described processor executes the computer executed instructions of memory storage so that it is described at least one What processor execution first aspect and optinal plan were related to can connection ring endorsement method.
Fourth aspect, the present invention provide a kind of computer readable storage medium, deposit in the computer readable storage medium Computer executed instructions are contained, when processor executes the computer executed instructions, realize first aspect and optinal plan What is be related to can connection ring endorsement method.
The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, it is provided by the invention can It in connection ring endorsement method, is determined and is signed according to confidential information to be added, system parameter and public private key pair set, so that signature includes First label, signature element, more powers and inner product demonstration are complicated by the communication of signature in no premise for reducing safety Degree is reduced into O (log2(n)) storage and communications cost, are reduced.It is provided by the invention can connection ring endorsement method be applied to electricity The fields such as sub- ballot, digital cash, authentication, can be substantially reduced above-mentioned field communication data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with It obtains other drawings based on these drawings.
Fig. 1 be the present invention it is shown according to an exemplary embodiment can connection ring endorsement method flow diagram;
Fig. 2 be the present invention it is shown according to an exemplary embodiment can connection ring signature apparatus structural schematic diagram;
Fig. 3 is the structural schematic diagram of present invention electronic equipment shown according to an exemplary embodiment.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, with solve due to existing Can connection ring signature length can be linearly increasing with the increase of user, cause storage and communications cost increase the technical issues of.
Fig. 1 be the present invention it is shown according to an exemplary embodiment can connection ring endorsement method flow diagram.Such as Fig. 1 It is shown, it is provided in this embodiment can connection ring endorsement method include the following steps:
S101, security parameter and confidential information to be added are obtained.
More specifically, confidential information to be added and security parameter are user's input, user is according to the secrecy journey of confidential information to be added The factors such as degree, security requirements determine security parameter.Privacy degrees, the security requirements etc. of confidential information to be added are not limited in the present embodiment Factor, or the factor of other influences confidential information ciphering process to be added.
S102, system parameter is generated according to security parameter.
More specifically, generating system parameter according to security parameter, wherein system parameter includes: the first hash function, second Hash function, first generate member and the second generation member.The mode that security parameter generates system parameter is to commonly use in the prior art Mode.
Such as: user inputs security parameter λ, output system parameter pm.System parameter pm includes: the first hash function HG, Second hash function HZ, first, which generates member g and second, generates member h.
S103, public private key pair set is generated according to system parameter.
More specifically, generating public private key pair set according to system parameter, wherein public private key pair set is public and private including the more organizing Key pair, each public private key pair include public key and the private key with public key match.The mode of public private key pair is generated according to system parameter For mode commonly used in the prior art.
Such as: public key pk is generated according to system parameter pmiWith private key ski.Wherein, 1≤i≤n and open public key pki
S104, the signature that preset structure is determined for compliance with according to confidential information to be added, system parameter and public private key pair set.
More specifically, preset structure includes the first label, signature element, more powers and inner product demonstration;Inner product demonstration is the The inner product of one vector is proved, and primary vector includes third label, more powers, challenge, the first random subvector and second with loom Vector.
In the present embodiment, the signature for meeting preset structure is obtained according to following steps:
S201, n Hash public key is calculated by the first hash function of n times, obtains Hash public key with specific reference to formula (1).
hi=HG(pki) (1)
Wherein, hiIndicate i-th of Hash public key, HGIndicate the first hash function, pkiIndicate i-th of public key, skiIndicate the I public key pkiCorresponding private key.
S202, the first label t is calculated according to Hash public key and private key, obtains the first label with specific reference to formula (2).
Wherein, t indicates the first label, hjIndicate j-th of Hash public key, skjIndicate j-th of public key pkjCorresponding private key.
S203, the second label, tool are generated according to the second hash function, n public key, the first label t and message to be encrypted Body obtains the second label according to formula (3).
D=HZ(pk1, pk2, .., pkn, t, m) and (3)
Wherein, pkiIndicate that i-th of public key, t indicate that the first label, m indicate message to be encrypted, HZIndicate the second Hash letter Number, d indicate the second label.
S204, it is generated and is promised to undertake according to Hash public key, the first label, the second hash function, system parameter and public key, specifically It is promised to undertake according to formula (4).
Wherein, L indicates to promise to undertake, g indicates the first generation member in system parameter, and d indicates that the second label, t indicate the first label, α indicates random number, pkiIndicate i-th of public key, hiIndicate i-th of Hash public key, ciIndicate i-th of random number.
S205, challenge is generated according to the second label and promise, is challenged with specific reference to formula (5).
C '=HZ(L, d) (5)
Wherein, c ' expression challenge, L indicate promise, and d indicates the second label, HZIndicate the second hash function.
S206, the first random subvector is generated, obtains the first random subvector with specific reference to formula (6).
C=(c1, c2..., cj-1, cj, cj+1..., cn) (6)
Wherein, C indicates the first random subvector, To respectively indicate n-1 random number.
S207, calculate the signature element, with specific reference to formula (7) calculate the signature element.
R=α-cjskj (7)
Wherein, r indicates signature element, and α indicates random number,c1, c2..., cj-1, cj+1..., cnTo respectively indicate n-1 random number, skjIndicate j-th of private key.
S208, more powers are calculated, calculates more powers with specific reference to formula (8).
Wherein, P indicates that more powers, g indicate the first generation member in system parameter, and d indicates that the second label, t indicate the first label, R indicates signature element, and L indicates to promise to undertake.
S209, the second random subvector is generated, generates the second random subvector with specific reference to formula (9).
E=(1,1 ... 1) (9)
Wherein, E is n-dimensional vector.
S210, the inner product demonstration for calculating primary vector.
Wherein, specifically such as formula (10) are shown for primary vector:
W=(pki ahi, P, c ', C, E) and (10)
Wherein, W is primary vector, pki dhiIndicate that third label, C indicate that the first random subvector, E indicate that second is random Subvector, pkiIndicate that i-th of public key, d indicate the second label.
π is proved in the inner product for proving algorithm calculating primary vector using existing inner product,
S211, output signature sigma=(t, r, P, π).
Wherein, t indicates that the first label, r indicate signature element, and P indicates that more powers, π indicate the inner product demonstration of primary vector W.
Wherein, the size of demonstration is 2log2n+1.Correspondingly, the size of signature is 2log2n+4。
Junction reason is verified and carried out to receiving signature below, according to signature sigma, n public key pk1, pk2..., pknAnd message m to be encrypted, carry out following calculate:
S301, n Hash public key is calculated by the first hash function of n times, i.e., according to formula hi=HG(pki) calculate n Kazakhstan Uncommon public key.
S302, the second label is calculated by the second hash function, i.e., according to formula d=HZ(pk1, pk2..., pkn, t, m) Calculate the second label.
S303, it calculates and promises to undertake, i.e., according to formulaIt calculates and promises to undertake.
S304, challenge is calculated by the second hash function, i.e., according to formula c=HZ(L, d) calculates challenge.
S305, algorithm is proved using existing inner product, passes through (pki dhi, P, c) whether verifying inner product to prove π correct.If Correctly, receive signature;Otherwise refuse.
To two signature sigmas1, σ2It is attached processing, verifies two signature sigmas1, σ2In the first label t1, t2It is whether equal, If equal, two signatures are connected;Otherwise it is not connected to.
In method provided in this embodiment, is determined and signed according to confidential information to be added, system parameter and public private key pair set Name, so that signature includes the first label, signature element, more powers and inner product demonstration, it, will in no premise for reducing safety The communication complexity of signature is reduced into O (log2(n)) storage and communications cost, are reduced.
The present invention provides a kind of comparative example, in comparative example, treats encryption information and is carried out using following steps Encryption:
The step of S401, S401 in embodiment illustrated in fig. 1 the step of S101 it is identical.
The step of S402, S402 in embodiment illustrated in fig. 1 the step of S102 it is identical.
S403, signature is generated.
Specifically, input message m, n public key pk1, pk2..., pkn, a private key sk.Wherein, corresponding to private key sk Public key is pkj.Carry out following calculate:
S501, label t=H is calculatedG(g)sk
S502, a random number α is generated, as the first random number.
S503, n-1 random number c is generated1, c2..., cj-1, cj+1..., cn, as primary vector.
S504, it calculates and promises to undertake
S505, challenge is calculated by the second hash function
S506, calculatingBy cjIt is supplemented into primary vector.
S507, calculate the signature element r=α-cjsk。
S508, output signature sigma=(t, r, c1, c2..., cn)。
And signature is verified: according to signature sigma, n public key pk1, pk2..., pknAnd message m carries out following meter It calculates:
S601, it calculates and promises to undertake
S602, challenge is calculated by the second hash functionAnd it verifies Whether c is equal to.If equal, receive signature;Otherwise refuse.
To two signature sigmas1, σ2It is attached processing: two signature sigmas of verifying1, σ2In the first label t1, t2It is whether equal, If equal, two signatures are connected;Otherwise it is not connected to.
In comparative example, signature sigma=(t, r, c is exported1, c2..., cn) size be n+2.The size of signature with The increase of ring members and it is linearly increasing.However, it is provided by the invention can be in connection ring endorsement method, the size of signature is 2log2N+4, it is provided by the invention to connect in the case where ring members are enough as the quantity of ring ring members increases in logarithm It connects ring signatures method and greatly reduces the length of signature and without reducing safety.Opponent can not find in ring members and can connect The practical signer of ring signatures, can not puppet produce one and can effectively connect ring signatures, there is anonymity and unforgeable.
Fig. 2 be the present invention it is shown according to an exemplary embodiment can connection ring signature apparatus structural schematic diagram.Such as Fig. 2 It is shown, it is provided in this embodiment can connection ring signature apparatus 700 include:
Module 701 is obtained, for obtaining security parameter and confidential information to be added;
Generation module 702, for generating system parameter according to the security parameter, wherein the system parameter includes: the One hash function, the second hash function, first generate member and the second generation member;
The generation module 702 is also used to generate public private key pair set according to the system parameter;Wherein, the public and private key It include public private key pair to set, the public private key pair includes public key and the private key with the public key match;
Determining module 703, for system parameter described in the use of information to be encrypted and the public private key pair set It is determined for compliance with the signature of preset structure;Wherein, the preset structure includes the first label, signature element, more powers and inner product opinion Card;Inner product demonstration is that the inner product of primary vector is proved, the primary vector include third label, more powers, challenge, first with Loom vector and the second random subvector.
Optionally, first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function, pkjIndicate the corresponding public key of j-th of private key.
Optionally, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second Hash Function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1, pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively Indicate n-1 random number, m indicates input message.
In short, it is provided by the present application can connection ring signature apparatus can be used for executing it is above-mentioned can connection ring endorsement method, in Hold and effect can refer to method part, the application repeats no more this.
Fig. 3 is the structural schematic diagram of present invention electronic equipment shown according to an exemplary embodiment.As shown in figure 3, this The electronic equipment 800 of embodiment includes: processor 801 and memory 802, wherein
Memory 802, for storing computer executed instructions;
Processor 801 is set for executing the computer executed instructions of memory storage with realizing to receive in above-described embodiment Standby performed each step.It specifically may refer to the associated description in preceding method embodiment.
Optionally, memory 802 can also be integrated with processor 801 either independent.
When memory 802 is independently arranged, which further includes bus 803, for connecting 802 He of memory Processor 801.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored in computer readable storage medium Calculation machine executes instruction, and when processor executes the computer executed instructions, realization as described above can connection ring endorsement method.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. one kind can connection ring endorsement method, which is characterized in that the described method includes:
Obtain security parameter and confidential information to be added;
System parameter is generated according to the security parameter, wherein the system parameter includes: the first hash function, the second Hash Function, first generate member and the second generation member;
Public private key pair set is generated according to the system parameter;Wherein, the public private key pair set includes public private key pair, the public affairs Private key is to the private key including public key and with the public key match;
The label of preset structure are determined for compliance with according to confidential information, the system parameter and the public private key pair set to be added Name;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;The inner product demonstration is first The inner product of vector is proved, and the primary vector includes that third label, more powers, challenge, the first random subvector and second are random Subvector.
2. the method according to claim 1, wherein first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function, pkjTable Show the corresponding public key of j-th of private key.
3. according to the method described in claim 2, it is characterized in that, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second hash function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1, pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively indicate n-1 A random number, m indicate input message.
4. according to the method described in claim 3, it is characterized in that, more powers specifically:
Wherein, P indicates more powers.
5. method according to any one of claims 1 to 4, which is characterized in that the primary vector specifically:
W=(pki dhi, P, c ', C, E)
Wherein, W is primary vector, pki dhiIndicate that third label, C indicate the first random subvector, C=(c1, c2..., cj-1, cj, cj+1..., cn), E indicates the second random subvector, E=(1,1 ..., 1).
6. one kind can connection ring signature apparatus, which is characterized in that described device includes:
Module is obtained, for obtaining security parameter and confidential information to be added;
Generation module, for generating system parameter according to the security parameter, wherein the system parameter includes: the first Hash Function, the second hash function, first generate member and the second generation member;
The generation module is also used to generate public private key pair set according to the system parameter;Wherein, the public private key pair set Including public private key pair, the public private key pair includes public key and the private key with the public key match;
Determining module, for being determined for compliance with according to confidential information, the system parameter and the public private key pair set to be added The signature of preset structure;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;In described Product demonstration is that the inner product of primary vector is proved, and the primary vector includes third label, more powers, challenge, the first random subvector And the second random subvector.
7. device according to claim 6, which is characterized in that first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function, pkjTable Show the corresponding public key of j-th of private key.
8. device according to claim 7, which is characterized in that the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second hash function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1, pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively indicate n-1 A random number, m indicate input message.
9. a kind of electronic equipment characterized by comprising at least one processor and memory;
Wherein, the memory stores computer executed instructions;
At least one described processor executes the computer executed instructions of the memory storage, so that at least one described processing Device execution is such as described in any one of claim 1 to 5 can connection ring endorsement method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium It executes instruction, when processor executes the computer executed instructions, realizes and connect as described in any one of claim 1 to 5 Connect ring signatures method.
CN201910243182.8A 2019-03-28 2019-03-28 Connectable ring signature method, device, equipment and storage medium Active CN109831312B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910243182.8A CN109831312B (en) 2019-03-28 2019-03-28 Connectable ring signature method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910243182.8A CN109831312B (en) 2019-03-28 2019-03-28 Connectable ring signature method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109831312A true CN109831312A (en) 2019-05-31
CN109831312B CN109831312B (en) 2022-04-19

Family

ID=66873020

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910243182.8A Active CN109831312B (en) 2019-03-28 2019-03-28 Connectable ring signature method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109831312B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111400773A (en) * 2020-03-12 2020-07-10 深圳大学 Digital signature method, digital signature device, system and storage medium
CN111935163A (en) * 2020-08-14 2020-11-13 支付宝(杭州)信息技术有限公司 Data joint processing method and device for protecting privacy
CN114070556A (en) * 2021-11-15 2022-02-18 成都卫士通信息产业股份有限公司 Threshold ring signature method and device, electronic equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1521390A1 (en) * 2003-10-01 2005-04-06 Hewlett-Packard Development Company, L.P. Digital signature method and apparatus
US20080313465A1 (en) * 2002-04-15 2008-12-18 Ntt Docomo Inc. Signature schemes using bilinear mappings
CN102017510A (en) * 2007-10-23 2011-04-13 丁素芬 Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols
CN109257184A (en) * 2018-11-08 2019-01-22 西安电子科技大学 Linkable ring signature method based on anonymous broadcast enciphering

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080313465A1 (en) * 2002-04-15 2008-12-18 Ntt Docomo Inc. Signature schemes using bilinear mappings
EP1521390A1 (en) * 2003-10-01 2005-04-06 Hewlett-Packard Development Company, L.P. Digital signature method and apparatus
CN102017510A (en) * 2007-10-23 2011-04-13 丁素芬 Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols
CN109257184A (en) * 2018-11-08 2019-01-22 西安电子科技大学 Linkable ring signature method based on anonymous broadcast enciphering

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JOSEPH K. LIU; MAN HO AU; WILLY SUSILO; JIANYING ZHOU: ""Linkable Ring Signature with Unconditional Anonymity"", 《IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING》 *
REN, HAO; ZHANG, PENG; SHENTU, QINGCHUN: "" Compact Ring Signature in the Standard Model for Blockchain"", 《14TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC) 》 *
熊丹: ""关联环签名及其在电子投票中的应用研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111400773A (en) * 2020-03-12 2020-07-10 深圳大学 Digital signature method, digital signature device, system and storage medium
CN111400773B (en) * 2020-03-12 2022-09-09 深圳大学 Digital signature method, digital signature device, system and storage medium
CN111935163A (en) * 2020-08-14 2020-11-13 支付宝(杭州)信息技术有限公司 Data joint processing method and device for protecting privacy
CN111935163B (en) * 2020-08-14 2022-08-09 支付宝(杭州)信息技术有限公司 Data joint processing method and device for protecting privacy
CN114070556A (en) * 2021-11-15 2022-02-18 成都卫士通信息产业股份有限公司 Threshold ring signature method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN109831312B (en) 2022-04-19

Similar Documents

Publication Publication Date Title
CN110520884B (en) Out-of-chain intelligent contract service based on trusted execution environment
CN111566649B (en) Verifying integrity of data stored in a federated blockchain using public side chains
EP3364598B1 (en) Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys
CN110892434B (en) Transferring digital ticket based on blockchain network
RU2718229C1 (en) Establishing secure channel
US20230147842A1 (en) Computer-implemented systems and methods for performing computational tasks across a group operating in a trust-less or dealer-free manner
Yeh A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments
EP4236188A2 (en) Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions
Mughal et al. A lightweight digital signature based security scheme for human-centered Internet of Things
CN111801910A (en) System and method for authenticating off-chain data based on proof verification
TW201947445A (en) Blockchain data processing method, device, processing equipment and system
CN109274503A (en) Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system
CN109478223A (en) Method and system for realizing block chain
KR102599873B1 (en) Method and apparatus for providing transaction service of crypto currency based on different block chains
JP2020537362A (en) Preventing inaccurate notification of input data by participants in secure multi-party calculations
WO2021228239A1 (en) Asset type consistency evidence generation method and system, transaction method and system, and transaction verification method and system
CN109831312A (en) It can connection ring endorsement method, device, equipment and storage medium
JP7231630B2 (en) Blockchain-implemented security systems and methods for blinded consequent selection
Saranya et al. Efficient mobile security for E health care application in cloud for secure payment using key distribution
CN108259180B (en) Method for quantum specifying verifier signature
CN109660344A (en) Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pond route device
CN108900310A (en) Block chain signature processing method and block chain signature processing unit
CN114884714B (en) Task processing method, device, equipment and storage medium
Chen et al. SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures
WO2020191700A1 (en) Linkable ring signature method, device, apparatus, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant