CN109831312A - It can connection ring endorsement method, device, equipment and storage medium - Google Patents
It can connection ring endorsement method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN109831312A CN109831312A CN201910243182.8A CN201910243182A CN109831312A CN 109831312 A CN109831312 A CN 109831312A CN 201910243182 A CN201910243182 A CN 201910243182A CN 109831312 A CN109831312 A CN 109831312A
- Authority
- CN
- China
- Prior art keywords
- private key
- public
- label
- indicate
- key pair
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, method includes: to obtain security parameter and confidential information to be added;System parameter is generated according to security parameter, wherein system parameter includes: the first hash function, the second hash function, the first generation member and the second generation member;Public private key pair set is generated according to system parameter;Wherein, public private key pair set includes public private key pair, and public private key pair includes public key and the private key with public key match;The signature of preset structure is determined for compliance with according to confidential information to be added, system parameter and public private key pair set;Wherein, preset structure includes the first label, signature element, more powers and inner product demonstration;Inner product demonstration is that the inner product of primary vector is proved, and primary vector includes third label, more powers, challenge, the first random subvector and the second random subvector.The communication complexity of signature is reduced into O (log in no premise for reducing safety by this method2(n)) storage and communications cost, are reduced.
Description
Technical field
The present invention relates to digital signature technology field more particularly to one kind can connection ring endorsement method, device, equipment and
Storage medium.
Background technique
It is a kind of technology based on ring signatures that ring signatures, which can be connected, it can guarantee the case where user identity is not leaked
Under sign to message, and increase connectivity, this is found the repetition Autograph Session of malicious user.Based on above-mentioned spy
Property, can connect ring signatures be used to encrypt in currency, while realizing transaction anonymity, be also act against dual payment.
However, the existing communication complexity for connecting ring signatures is O (n) in the case where not using Bilinear map,
Cause the length of signature can be linearly increasing with the increase of user, and then increases storage and communications cost.
Summary of the invention
The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, with solve due to existing
Can connection ring signature length can be linearly increasing with the increase of user, cause storage and communications cost increase the technical issues of.
In a first aspect, the present invention one kind is provided can connection ring endorsement method, which comprises
Obtain security parameter and confidential information to be added;
System parameter is generated according to the security parameter, wherein the system parameter includes: the first hash function, second
Hash function, first generate member and the second generation member;
Public private key pair set is generated according to the system parameter;Wherein, the public private key pair set includes public private key pair, institute
Stating public private key pair includes public key and the private key with the public key match;
Preset structure is determined for compliance with according to confidential information, the system parameter and the public private key pair set to be added
Signature;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;Inner product demonstration is the
The inner product of one vector is proved, the primary vector include third label, more powers, challenge, the first random subvector and second with
Loom vector.
System parameter can be generated according to security parameter in connection ring endorsement method in one kind provided by the invention, according to being
Parameter of uniting generates public private key pair set, determines and signs further according to confidential information to be added, system parameter and public private key pair set, so that
Signature includes the first label, signature element, more powers and inner product demonstration, in no premise for reducing safety, by signature
Communication complexity is reduced into O (log2(n)) storage and communications cost, are reduced.
Optionally, first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function,
pkjIndicate the corresponding public key of j-th of private key.
Optionally, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second Hash
Function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1,
pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively
Indicate n-1 random number, m indicates input message.
Optionally, more powers specifically:
Wherein, P indicates more powers.
Optionally, the primary vector specifically:
W=(pki dhi, P, c ', C, E)
Wherein, W is primary vector, pki dhiIndicate that third label, C indicate the first random subvector, C=(c1, c2...,
cj-1, cj, cj+1..., cn), E indicates the second random subvector, E=(1,1 ..., 1).
Below to can connection ring signature apparatus be introduced, implementing principle and technical effect and above method principle and skill
Art effect is similar, and details are not described herein again.
Second aspect, the present invention provide one kind can connection ring signature apparatus, described device includes:
Module is obtained, for obtaining security parameter and confidential information to be added;
Generation module, for generating system parameter according to the security parameter, wherein the system parameter includes: first
Hash function, the second hash function, first generate member and the second generation member;
The generation module is also used to generate public private key pair set according to the system parameter;Wherein, the public private key pair
Set includes public private key pair, and the public private key pair includes public key and the private key with the public key match;
Determining module, for being determined to system parameter described in the use of information to be encrypted and the public private key pair set
Meet the signature of preset structure;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;Institute
It states the inner product that inner product demonstration is primary vector to prove, the primary vector includes third label, more powers, challenge, first with loom
Vector and the second random subvector.
Optionally, first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function,
pkjIndicate the corresponding public key of j-th of private key.
Optionally, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second Hash
Function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1,
pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively
Indicate n-1 random number, m indicates input message.
The third aspect, the present invention provide a kind of electronic equipment, comprising: at least one processor and memory;
Wherein, the memory stores computer executed instructions;
At least one described processor executes the computer executed instructions of memory storage so that it is described at least one
What processor execution first aspect and optinal plan were related to can connection ring endorsement method.
Fourth aspect, the present invention provide a kind of computer readable storage medium, deposit in the computer readable storage medium
Computer executed instructions are contained, when processor executes the computer executed instructions, realize first aspect and optinal plan
What is be related to can connection ring endorsement method.
The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, it is provided by the invention can
It in connection ring endorsement method, is determined and is signed according to confidential information to be added, system parameter and public private key pair set, so that signature includes
First label, signature element, more powers and inner product demonstration are complicated by the communication of signature in no premise for reducing safety
Degree is reduced into O (log2(n)) storage and communications cost, are reduced.It is provided by the invention can connection ring endorsement method be applied to electricity
The fields such as sub- ballot, digital cash, authentication, can be substantially reduced above-mentioned field communication data.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Bright some embodiments for those of ordinary skill in the art without any creative labor, can be with
It obtains other drawings based on these drawings.
Fig. 1 be the present invention it is shown according to an exemplary embodiment can connection ring endorsement method flow diagram;
Fig. 2 be the present invention it is shown according to an exemplary embodiment can connection ring signature apparatus structural schematic diagram;
Fig. 3 is the structural schematic diagram of present invention electronic equipment shown according to an exemplary embodiment.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The present invention provide one kind can connection ring endorsement method, device, equipment and storage medium, with solve due to existing
Can connection ring signature length can be linearly increasing with the increase of user, cause storage and communications cost increase the technical issues of.
Fig. 1 be the present invention it is shown according to an exemplary embodiment can connection ring endorsement method flow diagram.Such as Fig. 1
It is shown, it is provided in this embodiment can connection ring endorsement method include the following steps:
S101, security parameter and confidential information to be added are obtained.
More specifically, confidential information to be added and security parameter are user's input, user is according to the secrecy journey of confidential information to be added
The factors such as degree, security requirements determine security parameter.Privacy degrees, the security requirements etc. of confidential information to be added are not limited in the present embodiment
Factor, or the factor of other influences confidential information ciphering process to be added.
S102, system parameter is generated according to security parameter.
More specifically, generating system parameter according to security parameter, wherein system parameter includes: the first hash function, second
Hash function, first generate member and the second generation member.The mode that security parameter generates system parameter is to commonly use in the prior art
Mode.
Such as: user inputs security parameter λ, output system parameter pm.System parameter pm includes: the first hash function HG,
Second hash function HZ, first, which generates member g and second, generates member h.
S103, public private key pair set is generated according to system parameter.
More specifically, generating public private key pair set according to system parameter, wherein public private key pair set is public and private including the more organizing
Key pair, each public private key pair include public key and the private key with public key match.The mode of public private key pair is generated according to system parameter
For mode commonly used in the prior art.
Such as: public key pk is generated according to system parameter pmiWith private key ski.Wherein, 1≤i≤n and open public key pki。
S104, the signature that preset structure is determined for compliance with according to confidential information to be added, system parameter and public private key pair set.
More specifically, preset structure includes the first label, signature element, more powers and inner product demonstration;Inner product demonstration is the
The inner product of one vector is proved, and primary vector includes third label, more powers, challenge, the first random subvector and second with loom
Vector.
In the present embodiment, the signature for meeting preset structure is obtained according to following steps:
S201, n Hash public key is calculated by the first hash function of n times, obtains Hash public key with specific reference to formula (1).
hi=HG(pki) (1)
Wherein, hiIndicate i-th of Hash public key, HGIndicate the first hash function, pkiIndicate i-th of public key, skiIndicate the
I public key pkiCorresponding private key.
S202, the first label t is calculated according to Hash public key and private key, obtains the first label with specific reference to formula (2).
Wherein, t indicates the first label, hjIndicate j-th of Hash public key, skjIndicate j-th of public key pkjCorresponding private key.
S203, the second label, tool are generated according to the second hash function, n public key, the first label t and message to be encrypted
Body obtains the second label according to formula (3).
D=HZ(pk1, pk2, .., pkn, t, m) and (3)
Wherein, pkiIndicate that i-th of public key, t indicate that the first label, m indicate message to be encrypted, HZIndicate the second Hash letter
Number, d indicate the second label.
S204, it is generated and is promised to undertake according to Hash public key, the first label, the second hash function, system parameter and public key, specifically
It is promised to undertake according to formula (4).
Wherein, L indicates to promise to undertake, g indicates the first generation member in system parameter, and d indicates that the second label, t indicate the first label,
α indicates random number, pkiIndicate i-th of public key, hiIndicate i-th of Hash public key, ciIndicate i-th of random number.
S205, challenge is generated according to the second label and promise, is challenged with specific reference to formula (5).
C '=HZ(L, d) (5)
Wherein, c ' expression challenge, L indicate promise, and d indicates the second label, HZIndicate the second hash function.
S206, the first random subvector is generated, obtains the first random subvector with specific reference to formula (6).
C=(c1, c2..., cj-1, cj, cj+1..., cn) (6)
Wherein, C indicates the first random subvector,
To respectively indicate n-1 random number.
S207, calculate the signature element, with specific reference to formula (7) calculate the signature element.
R=α-cjskj (7)
Wherein, r indicates signature element, and α indicates random number,c1, c2..., cj-1,
cj+1..., cnTo respectively indicate n-1 random number, skjIndicate j-th of private key.
S208, more powers are calculated, calculates more powers with specific reference to formula (8).
Wherein, P indicates that more powers, g indicate the first generation member in system parameter, and d indicates that the second label, t indicate the first label,
R indicates signature element, and L indicates to promise to undertake.
S209, the second random subvector is generated, generates the second random subvector with specific reference to formula (9).
E=(1,1 ... 1) (9)
Wherein, E is n-dimensional vector.
S210, the inner product demonstration for calculating primary vector.
Wherein, specifically such as formula (10) are shown for primary vector:
W=(pki ahi, P, c ', C, E) and (10)
Wherein, W is primary vector, pki dhiIndicate that third label, C indicate that the first random subvector, E indicate that second is random
Subvector, pkiIndicate that i-th of public key, d indicate the second label.
π is proved in the inner product for proving algorithm calculating primary vector using existing inner product,
S211, output signature sigma=(t, r, P, π).
Wherein, t indicates that the first label, r indicate signature element, and P indicates that more powers, π indicate the inner product demonstration of primary vector W.
Wherein, the size of demonstration is 2log2n+1.Correspondingly, the size of signature is 2log2n+4。
Junction reason is verified and carried out to receiving signature below, according to signature sigma, n public key pk1, pk2...,
pknAnd message m to be encrypted, carry out following calculate:
S301, n Hash public key is calculated by the first hash function of n times, i.e., according to formula hi=HG(pki) calculate n Kazakhstan
Uncommon public key.
S302, the second label is calculated by the second hash function, i.e., according to formula d=HZ(pk1, pk2..., pkn, t, m)
Calculate the second label.
S303, it calculates and promises to undertake, i.e., according to formulaIt calculates and promises to undertake.
S304, challenge is calculated by the second hash function, i.e., according to formula c=HZ(L, d) calculates challenge.
S305, algorithm is proved using existing inner product, passes through (pki dhi, P, c) whether verifying inner product to prove π correct.If
Correctly, receive signature;Otherwise refuse.
To two signature sigmas1, σ2It is attached processing, verifies two signature sigmas1, σ2In the first label t1, t2It is whether equal,
If equal, two signatures are connected;Otherwise it is not connected to.
In method provided in this embodiment, is determined and signed according to confidential information to be added, system parameter and public private key pair set
Name, so that signature includes the first label, signature element, more powers and inner product demonstration, it, will in no premise for reducing safety
The communication complexity of signature is reduced into O (log2(n)) storage and communications cost, are reduced.
The present invention provides a kind of comparative example, in comparative example, treats encryption information and is carried out using following steps
Encryption:
The step of S401, S401 in embodiment illustrated in fig. 1 the step of S101 it is identical.
The step of S402, S402 in embodiment illustrated in fig. 1 the step of S102 it is identical.
S403, signature is generated.
Specifically, input message m, n public key pk1, pk2..., pkn, a private key sk.Wherein, corresponding to private key sk
Public key is pkj.Carry out following calculate:
S501, label t=H is calculatedG(g)sk。
S502, a random number α is generated, as the first random number.
S503, n-1 random number c is generated1, c2..., cj-1, cj+1..., cn, as primary vector.
S504, it calculates and promises to undertake
S505, challenge is calculated by the second hash function
S506, calculatingBy cjIt is supplemented into primary vector.
S507, calculate the signature element r=α-cjsk。
S508, output signature sigma=(t, r, c1, c2..., cn)。
And signature is verified: according to signature sigma, n public key pk1, pk2..., pknAnd message m carries out following meter
It calculates:
S601, it calculates and promises to undertake
S602, challenge is calculated by the second hash functionAnd it verifies
Whether c is equal to.If equal, receive signature;Otherwise refuse.
To two signature sigmas1, σ2It is attached processing: two signature sigmas of verifying1, σ2In the first label t1, t2It is whether equal,
If equal, two signatures are connected;Otherwise it is not connected to.
In comparative example, signature sigma=(t, r, c is exported1, c2..., cn) size be n+2.The size of signature with
The increase of ring members and it is linearly increasing.However, it is provided by the invention can be in connection ring endorsement method, the size of signature is
2log2N+4, it is provided by the invention to connect in the case where ring members are enough as the quantity of ring ring members increases in logarithm
It connects ring signatures method and greatly reduces the length of signature and without reducing safety.Opponent can not find in ring members and can connect
The practical signer of ring signatures, can not puppet produce one and can effectively connect ring signatures, there is anonymity and unforgeable.
Fig. 2 be the present invention it is shown according to an exemplary embodiment can connection ring signature apparatus structural schematic diagram.Such as Fig. 2
It is shown, it is provided in this embodiment can connection ring signature apparatus 700 include:
Module 701 is obtained, for obtaining security parameter and confidential information to be added;
Generation module 702, for generating system parameter according to the security parameter, wherein the system parameter includes: the
One hash function, the second hash function, first generate member and the second generation member;
The generation module 702 is also used to generate public private key pair set according to the system parameter;Wherein, the public and private key
It include public private key pair to set, the public private key pair includes public key and the private key with the public key match;
Determining module 703, for system parameter described in the use of information to be encrypted and the public private key pair set
It is determined for compliance with the signature of preset structure;Wherein, the preset structure includes the first label, signature element, more powers and inner product opinion
Card;Inner product demonstration is that the inner product of primary vector is proved, the primary vector include third label, more powers, challenge, first with
Loom vector and the second random subvector.
Optionally, first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function,
pkjIndicate the corresponding public key of j-th of private key.
Optionally, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second Hash
Function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1,
pk2..., pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively
Indicate n-1 random number, m indicates input message.
In short, it is provided by the present application can connection ring signature apparatus can be used for executing it is above-mentioned can connection ring endorsement method, in
Hold and effect can refer to method part, the application repeats no more this.
Fig. 3 is the structural schematic diagram of present invention electronic equipment shown according to an exemplary embodiment.As shown in figure 3, this
The electronic equipment 800 of embodiment includes: processor 801 and memory 802, wherein
Memory 802, for storing computer executed instructions;
Processor 801 is set for executing the computer executed instructions of memory storage with realizing to receive in above-described embodiment
Standby performed each step.It specifically may refer to the associated description in preceding method embodiment.
Optionally, memory 802 can also be integrated with processor 801 either independent.
When memory 802 is independently arranged, which further includes bus 803, for connecting 802 He of memory
Processor 801.
The embodiment of the present invention also provides a kind of computer readable storage medium, and meter is stored in computer readable storage medium
Calculation machine executes instruction, and when processor executes the computer executed instructions, realization as described above can connection ring endorsement method.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. one kind can connection ring endorsement method, which is characterized in that the described method includes:
Obtain security parameter and confidential information to be added;
System parameter is generated according to the security parameter, wherein the system parameter includes: the first hash function, the second Hash
Function, first generate member and the second generation member;
Public private key pair set is generated according to the system parameter;Wherein, the public private key pair set includes public private key pair, the public affairs
Private key is to the private key including public key and with the public key match;
The label of preset structure are determined for compliance with according to confidential information, the system parameter and the public private key pair set to be added
Name;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;The inner product demonstration is first
The inner product of vector is proved, and the primary vector includes that third label, more powers, challenge, the first random subvector and second are random
Subvector.
2. the method according to claim 1, wherein first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function, pkjTable
Show the corresponding public key of j-th of private key.
3. according to the method described in claim 2, it is characterized in that, the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second hash function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1, pk2...,
pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively indicate n-1
A random number, m indicate input message.
4. according to the method described in claim 3, it is characterized in that, more powers specifically:
Wherein, P indicates more powers.
5. method according to any one of claims 1 to 4, which is characterized in that the primary vector specifically:
W=(pki dhi, P, c ', C, E)
Wherein, W is primary vector, pki dhiIndicate that third label, C indicate the first random subvector, C=(c1, c2..., cj-1,
cj, cj+1..., cn), E indicates the second random subvector, E=(1,1 ..., 1).
6. one kind can connection ring signature apparatus, which is characterized in that described device includes:
Module is obtained, for obtaining security parameter and confidential information to be added;
Generation module, for generating system parameter according to the security parameter, wherein the system parameter includes: the first Hash
Function, the second hash function, first generate member and the second generation member;
The generation module is also used to generate public private key pair set according to the system parameter;Wherein, the public private key pair set
Including public private key pair, the public private key pair includes public key and the private key with the public key match;
Determining module, for being determined for compliance with according to confidential information, the system parameter and the public private key pair set to be added
The signature of preset structure;Wherein, the preset structure includes the first label, signature element, more powers and inner product demonstration;In described
Product demonstration is that the inner product of primary vector is proved, and the primary vector includes third label, more powers, challenge, the first random subvector
And the second random subvector.
7. device according to claim 6, which is characterized in that first label specifically:
Wherein, hjFor j-th of Hash public key, hj=HG(pkj), skjIndicate j-th of private key, HGIndicate the first hash function, pkjTable
Show the corresponding public key of j-th of private key.
8. device according to claim 7, which is characterized in that the signature element specifically:
R=α-cjskj
Wherein, α is random number,C ' expression challenge, c '=HZ(L, d), HZIndicate the second hash function,G indicates that first generates member, and d indicates the second label, d=HZ(pk1, pk2...,
pkn, t, m), n indicates the quantity of public private key pair in public private key pair set, c1, c2..., cj-1, cj+1..., cnRespectively indicate n-1
A random number, m indicate input message.
9. a kind of electronic equipment characterized by comprising at least one processor and memory;
Wherein, the memory stores computer executed instructions;
At least one described processor executes the computer executed instructions of the memory storage, so that at least one described processing
Device execution is such as described in any one of claim 1 to 5 can connection ring endorsement method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer in the computer readable storage medium
It executes instruction, when processor executes the computer executed instructions, realizes and connect as described in any one of claim 1 to 5
Connect ring signatures method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910243182.8A CN109831312B (en) | 2019-03-28 | 2019-03-28 | Connectable ring signature method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910243182.8A CN109831312B (en) | 2019-03-28 | 2019-03-28 | Connectable ring signature method, device, equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109831312A true CN109831312A (en) | 2019-05-31 |
CN109831312B CN109831312B (en) | 2022-04-19 |
Family
ID=66873020
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910243182.8A Active CN109831312B (en) | 2019-03-28 | 2019-03-28 | Connectable ring signature method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109831312B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111400773A (en) * | 2020-03-12 | 2020-07-10 | 深圳大学 | Digital signature method, digital signature device, system and storage medium |
CN111935163A (en) * | 2020-08-14 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Data joint processing method and device for protecting privacy |
CN114070556A (en) * | 2021-11-15 | 2022-02-18 | 成都卫士通信息产业股份有限公司 | Threshold ring signature method and device, electronic equipment and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1521390A1 (en) * | 2003-10-01 | 2005-04-06 | Hewlett-Packard Development Company, L.P. | Digital signature method and apparatus |
US20080313465A1 (en) * | 2002-04-15 | 2008-12-18 | Ntt Docomo Inc. | Signature schemes using bilinear mappings |
CN102017510A (en) * | 2007-10-23 | 2011-04-13 | 丁素芬 | Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols |
CN109257184A (en) * | 2018-11-08 | 2019-01-22 | 西安电子科技大学 | Linkable ring signature method based on anonymous broadcast enciphering |
-
2019
- 2019-03-28 CN CN201910243182.8A patent/CN109831312B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080313465A1 (en) * | 2002-04-15 | 2008-12-18 | Ntt Docomo Inc. | Signature schemes using bilinear mappings |
EP1521390A1 (en) * | 2003-10-01 | 2005-04-06 | Hewlett-Packard Development Company, L.P. | Digital signature method and apparatus |
CN102017510A (en) * | 2007-10-23 | 2011-04-13 | 丁素芬 | Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols |
CN109257184A (en) * | 2018-11-08 | 2019-01-22 | 西安电子科技大学 | Linkable ring signature method based on anonymous broadcast enciphering |
Non-Patent Citations (3)
Title |
---|
JOSEPH K. LIU; MAN HO AU; WILLY SUSILO; JIANYING ZHOU: ""Linkable Ring Signature with Unconditional Anonymity"", 《IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING》 * |
REN, HAO; ZHANG, PENG; SHENTU, QINGCHUN: "" Compact Ring Signature in the Standard Model for Blockchain"", 《14TH INTERNATIONAL CONFERENCE ON INFORMATION SECURITY PRACTICE AND EXPERIENCE (ISPEC) 》 * |
熊丹: ""关联环签名及其在电子投票中的应用研究"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111400773A (en) * | 2020-03-12 | 2020-07-10 | 深圳大学 | Digital signature method, digital signature device, system and storage medium |
CN111400773B (en) * | 2020-03-12 | 2022-09-09 | 深圳大学 | Digital signature method, digital signature device, system and storage medium |
CN111935163A (en) * | 2020-08-14 | 2020-11-13 | 支付宝(杭州)信息技术有限公司 | Data joint processing method and device for protecting privacy |
CN111935163B (en) * | 2020-08-14 | 2022-08-09 | 支付宝(杭州)信息技术有限公司 | Data joint processing method and device for protecting privacy |
CN114070556A (en) * | 2021-11-15 | 2022-02-18 | 成都卫士通信息产业股份有限公司 | Threshold ring signature method and device, electronic equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109831312B (en) | 2022-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110520884B (en) | Out-of-chain intelligent contract service based on trusted execution environment | |
CN111566649B (en) | Verifying integrity of data stored in a federated blockchain using public side chains | |
EP3364598B1 (en) | Determining a common secret for the secure exchange of information and hierarchical, deterministic cryptographic keys | |
CN110892434B (en) | Transferring digital ticket based on blockchain network | |
RU2718229C1 (en) | Establishing secure channel | |
US20230147842A1 (en) | Computer-implemented systems and methods for performing computational tasks across a group operating in a trust-less or dealer-free manner | |
Yeh | A secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments | |
EP4236188A2 (en) | Computer-implemented system and method suitable for increasing the security of instant off-line blockchain transactions | |
Mughal et al. | A lightweight digital signature based security scheme for human-centered Internet of Things | |
CN111801910A (en) | System and method for authenticating off-chain data based on proof verification | |
TW201947445A (en) | Blockchain data processing method, device, processing equipment and system | |
CN109274503A (en) | Distributed collaboration endorsement method and distributed collaboration signature apparatus, soft shield system | |
CN109478223A (en) | Method and system for realizing block chain | |
KR102599873B1 (en) | Method and apparatus for providing transaction service of crypto currency based on different block chains | |
JP2020537362A (en) | Preventing inaccurate notification of input data by participants in secure multi-party calculations | |
WO2021228239A1 (en) | Asset type consistency evidence generation method and system, transaction method and system, and transaction verification method and system | |
CN109831312A (en) | It can connection ring endorsement method, device, equipment and storage medium | |
JP7231630B2 (en) | Blockchain-implemented security systems and methods for blinded consequent selection | |
Saranya et al. | Efficient mobile security for E health care application in cloud for secure payment using key distribution | |
CN108259180B (en) | Method for quantum specifying verifier signature | |
CN109660344A (en) | Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pond route device | |
CN108900310A (en) | Block chain signature processing method and block chain signature processing unit | |
CN114884714B (en) | Task processing method, device, equipment and storage medium | |
Chen et al. | SeCrowd: Efficient secure interactive crowdsourcing via permission-based signatures | |
WO2020191700A1 (en) | Linkable ring signature method, device, apparatus, and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |