CN113536378B - Traceable attribute-based purifiable signature method and system - Google Patents
Traceable attribute-based purifiable signature method and system Download PDFInfo
- Publication number
- CN113536378B CN113536378B CN202110820317.XA CN202110820317A CN113536378B CN 113536378 B CN113536378 B CN 113536378B CN 202110820317 A CN202110820317 A CN 202110820317A CN 113536378 B CN113536378 B CN 113536378B
- Authority
- CN
- China
- Prior art keywords
- signature
- attribute
- message
- outputs
- purification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 23
- 238000013475 authorization Methods 0.000 claims abstract description 57
- 238000000746 purification Methods 0.000 claims abstract description 44
- 238000012795 verification Methods 0.000 claims abstract description 17
- 238000004364 calculation method Methods 0.000 claims description 3
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 201000009032 substance abuse Diseases 0.000 description 2
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 1
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
Description
技术领域Technical Field
本发明属于互联网安全技术领域,具体涉及一种可追踪属性基可净化签名方法与系统。The present invention belongs to the field of Internet security technology, and in particular relates to a traceable attribute-based purifiable signature method and system.
背景技术Background Art
互联网技术已经渗透各行各业,在电子医疗,电子政务,电子金融方面有广泛的应用。在这些应用场景中,物理设备不可避免地收集和分析用户的数据,包括用户的真实身份,病患医疗健康状况以及个人金融转账细节等一些敏感数据信息,不可避免地涉及到用户隐私泄露的问题。属性基签名(ABS)是解决上述问题的重要方法,它在隐私保护、访问控制和数据身份验证方面发挥了重要作用。但在ABS方案中,一方面,属性授权端无法在签名滥用时恢复签名端身份,揭露签名滥用恶意行为,即无法提供可追踪性。另一方面,当需要对签名中的敏感信息进行修改从而隐藏签名中的敏感信息时,传统的ABS方案无法提供可净化性。Internet technology has penetrated all walks of life and has been widely used in e-health, e-government, and e-finance. In these application scenarios, physical devices inevitably collect and analyze user data, including the user's real identity, the patient's medical health status, and some sensitive data information such as personal financial transfer details, which inevitably involves the problem of user privacy leakage. Attribute-based signature (ABS) is an important method to solve the above problems. It plays an important role in privacy protection, access control, and data authentication. However, in the ABS scheme, on the one hand, the attribute authorization end cannot restore the identity of the signing end when the signature is abused, and reveal the malicious behavior of signature abuse, that is, it cannot provide traceability. On the other hand, when it is necessary to modify the sensitive information in the signature to hide the sensitive information in the signature, the traditional ABS scheme cannot provide purifiability.
发明内容Summary of the invention
本发明的目的在于提供一种可追踪属性基可净化签名方法与系统,该方法及系统可以恢复签名端身份,并对签名中的敏感信息进行修改生成净化签名。The purpose of the present invention is to provide a traceable attribute-based purifiable signature method and system, which can restore the identity of the signing end and modify the sensitive information in the signature to generate a purified signature.
为实现上述目的,本发明采用的技术方案是:一种可追踪属性基可净化签名方法,包括以下步骤:To achieve the above object, the technical solution adopted by the present invention is: a traceable attribute-based purifiable signature method, comprising the following steps:
步骤S1:属性授权端输入安全参数λ,输出主密钥msk、追踪密钥TK和公开参数params;Step S1: The attribute authorization end inputs the security parameter λ and outputs the master key msk, the tracking key TK and the public parameter params;
步骤S2:属性授权端输入主密钥msk、公开参数params、签名端属性集合ωa和签名端身份u,输出签名端私钥 Step S2: The attribute authorization end inputs the master key msk, the public parameter params, the signature end attribute set ωa and the signature end identity u, and outputs the signature end private key
步骤S3:签名端输入签名端属性集合ωa、签名端私钥签名策略(ω,d,γ)、净化端属性集合ωb、公开参数params和消息m,输出签名σ和秘密值集合SI;Step S3: The signing end inputs the signing end attribute set ω a and the signing end private key Signature strategy (ω, d, γ), purification end attribute set ω b , public parameters params and message m, output signature σ and secret value set SI;
步骤S4:净化端输入可净化消息索引集合IS、消息m、公共参数params、签名σ、签名端属性集合ωa、净化端属性集合ωb和签名端发送的秘密值集合SI,输出净化消息m'和净化签名σ';Step S4: the purification end inputs the purifiable message index set IS , message m, public parameter params, signature σ, signature end attribute set ωa , purification end attribute set ωb and secret value set SI sent by the signature end, and outputs the purified message m' and purified signature σ';
步骤S5:验证端输入净化消息签名对(m',σ')、公开参数params、签名端属性集合ωa和净化端属性集合ωb,验证签名的有效性,如果签名有效则输出accept,否则输出reject;Step S5: The verification end inputs the purified message signature pair (m', σ'), public parameter params, signature end attribute set ω a and purification end attribute set ω b , verifies the validity of the signature, and outputs accept if the signature is valid, otherwise outputs reject;
步骤S6:属性授权端输入净化消息签名对(m',σ')和追踪密钥TK,输出签名端身份u。Step S6: The attribute authorization end inputs the purified message signature pair (m', σ') and the tracking key TK, and outputs the signing end identity u.
进一步地,所述步骤S1具体包括以下步骤:Furthermore, the step S1 specifically includes the following steps:
步骤S11:属性授权端输入安全参数λ,随机选择大素数p、q,令q为追踪密钥,即TK=q;计算n=pq,使得|n|=λ;G和GT是两个阶为n的乘法循环群;e:G×G→GT是双线性映射,Gp,Gq分别为G的阶为p,q的子群;定义门限值为d;设且i∈S,定义拉格朗日系数其中Zn={0,1,2,3,…,n-1};Step S11: The attribute authorization terminal inputs the security parameter λ, randomly selects large prime numbers p and q, and sets q as the tracking key, that is, TK = q; calculates n = pq, so that |n| = λ; G and GT are two multiplicative cyclic groups of order n; e:G×G→ GT is a bilinear mapping, Gp , Gq are subgroups of G of order p and q respectively; defines the threshold value as d; set And i∈S, define the Lagrange coefficient Where Z n ={0,1,2,3,…,n-1};
步骤S12:属性授权端随机选取计算g1=gα,其中g是G的生成元, Step S12: Random selection of attribute authorization end Compute g 1 =g α , where g is a generator of G,
步骤S13:属性授权端随机选取G中的元素g2、Gq的生成元h、G的生成元u′和一个v个元素的向量其中ui是G的生成元,i∈{1,…,v};签名端身份u用长为v的二进制字符串表示,令u[i]表示u的第i个比特,定义为满足u[i]=1的序号的集合,定义W(u)=u'Πi∈Uui;Step S13: The attribute authorization terminal randomly selects an element g 2 in G, a generator h of G q , a generator u′ of G, and a vector of v elements Where u i is a generator of G, i∈{1,…,v}; the signature end identity u is represented by a binary string of length v, let u[i] represent the i-th bit of u, and define For the set of serial numbers satisfying u[i]=1, define W(u)=u'Π i∈U u i ;
步骤S14:属性授权端随机选取ti∈G,定义其中i∈K,K={1,2,…,k,k+1},其中选取 Step S14: The attribute authorization end randomly selects t i ∈ G and defines where i∈K, K={1,2,…,k,k+1}, and select
步骤S15:属性授权端随机选取y'∈Zn以及yi,其中计算w'=gy', Step S15: The attribute authorization terminal randomly selects y'∈Z n and yi , where Calculate w'= gy' ,
步骤S16:属性授权端输出主密钥msk=α和公开参数 Step S16: The attribute authorization terminal outputs the master key msk=α and public parameters
进一步地,所述步骤S2具体包括以下步骤:Furthermore, the step S2 specifically includes the following steps:
步骤S21:属性授权端输入主密钥msk=α、公开参数 签名端属性集合ωa和签名端身份u,其中 Step S21: The attribute authorization terminal inputs the master key msk=α and the public parameter The signature end attribute set ω a and the signature end identity u, where
步骤S22:属性授权端为每个用户u随机选取s∈Zn,计算Du,0=gs,Du,1=hs Step S22: The attribute authorization terminal randomly selects s∈Z n for each user u and calculates Du,0 = g s , Du,1 = h s
步骤S23:属性授权端选取一个d-1次多项式q(x),满足q(0)=α;对于i∈ωa,属性授权端随机选择ri∈Zn,计算 Step S23: The attribute authorization end selects a d-1 degree polynomial q(x) that satisfies q(0) = α; for i∈ω a , the attribute authorization end randomly selects ri∈Z n and calculates
步骤S24:属性授权端输出签名端私钥 Step S24: The attribute authorization end outputs the signature end private key
进一步地,所述步骤S3具体包括以下步骤:Furthermore, the step S3 specifically includes the following steps:
步骤S31:签名端输入签名端属性集合ωa、签名端私钥签名策略(ω,d,Υ)、净化端属性集合ωb、公开参数params和消息m;Step S31: The signing end inputs the signing end attribute set ω a and the signing end private key Signature strategy (ω, d, Υ), purification end attribute set ω b , public parameters params and message m;
步骤S32:签名端随机选择再随机选择默认子集令其中|ω'a|≥d,|ω'b|≥d,ω'a∩Ω'a=φ,ω'b∩Ω'b=φ;其中Ω={ω1,…,ωd-1},其中ωi∈Zn;Step S32: Signature end random selection Then randomly select the default subset make Where |ω' a |≥d, |ω' b |≥d, ω' a ∩Ω' a =φ, ω' b ∩Ω' b =φ; where Ω={ω 1 ,…,ω d-1 }, where ω i ∈Z n ;
步骤S33:对身份u的每一个比特u[i](i=1,…,v),签名端随机选取θi∈Zn,计算 签名端计算:Step S33: For each bit u[i] (i=1,…,v) of identity u, the signature end randomly selects θ i ∈ Z n and calculates Signature end calculation:
步骤S34:签名端随机选取s'1∈Zn,令s1=s+s'1;计算秘密值其中i∈Is,表示签名端允许净化端净化的消息索引集合;令表示秘密值集合,|Is|表示集合Is中元素的个数;Step S34: The signature end randomly selects s' 1 ∈Z n , sets s 1 =s+s'1; calculates the secret value where i∈I s , Represents the message index set that the signing end allows the purifying end to purify; represents a set of secret values, |I s | represents the number of elements in the set I s ;
步骤S35:对所有签名端随机选取r'i∈Zn;对所有签名端随机选取r”i∈Zn,签名端计算:Step S35: For all The signature end randomly selects r' i ∈ Z n ; for all The signature end randomly selects r” i ∈Z n and calculates:
步骤S36:签名端输出签名:σ=(σ0,σ1,σai,σbi,c,c1,..,cv,π1,…,πv)。Step S36: the signature end outputs a signature: σ = (σ 0 , σ 1 , σ ai , σ bi , c, c 1 , .. , c v , π 1 , … , π v ).
进一步地,所述步骤S4具体包括以下步骤:Furthermore, the step S4 specifically includes the following steps:
步骤S41:净化端输入可净化消息索引集合IS、消息m、公共参数params、签名σ、签名端属性集合ωa、净化端属性集合ωb和签名端发送的秘密值集合SI;Step S41: the purification end inputs the purifiable message index set IS , the message m, the public parameter params, the signature σ, the signature end attribute set ωa , the purification end attribute set ωb and the secret value set SI sent by the signature end;
步骤S42:净化端定义需要净化的消息索引集合令集合I1={i∈I:mi=0,m’i=1},I2={i∈I:mi=1,m’i=0};Step S42: The purification end defines the message index set that needs to be purified Let the set I 1 ={i∈I:m i =0,m' i =1}, I 2 ={i∈I:m i =1,m' i =0};
步骤S43:净化端选择随机数计算:Step S43: The purification end selects a random number calculate:
步骤S44:净化端输出净化签名:σ'=(σ'0,σ'ai,σ'bi,σ'1,c,c1,…,cv,π1,…,πv)。Step S44: the purification end outputs a purified signature: σ' = (σ' 0 , σ' ai , σ' bi , σ' 1 , c, c 1 , ..., c v , π 1 , ..., π v ).
进一步地,所述步骤S5具体包括以下步骤:Furthermore, the step S5 specifically includes the following steps:
步骤S51:验证端输入净化消息签名对(m',σ')、公开参数params、签名端属性集合ωa和净化端属性集合ωb;Step S51: The verification end inputs the purified message signature pair (m', σ'), public parameter params, signature end attribute set ω a and purification end attribute set ω b ;
步骤S52:验证端计算: Step S52: The verification end calculates:
步骤S53:验证端判断等式:是否成立,若成立输出accept,否则输出reject。Step S53: The verification end determines the equation: Is it true? If so, output accept, otherwise output reject.
进一步地,所述步骤S6具体包括以下步骤:Furthermore, the step S6 specifically includes the following steps:
步骤S61:属性授权端输入净化消息签名对(m',σ')和追踪密钥q;Step S61: the attribute authorization terminal inputs the purified message signature pair (m', σ') and the tracking key q;
步骤S62:属性授权端对每一个ci计算(ci)q;若(ci)q=g0,则u[i]=0;若(ci)q=(ui)q,则u[i]=1;Step S62: the attribute authorization terminal calculates ( ci ) q for each ci ; if ( ci ) q = g0 , then u[i] = 0; if (ci ) q = (u i ) q , then u[i] = 1;
步骤S63:属性授权端输出签名端身份u。Step S63: The attribute authorization end outputs the signature end identity u.
本发明还提供了一种用于实现上述方法的可追踪属性基可净化签名系统,包括:The present invention also provides a traceable attribute-based purifiable signature system for implementing the above method, comprising:
属性授权端,用于产生主私钥msk、追踪密钥TK和公开参数params;用于根据主私钥msk、公开参数params、签名端属性集合ωa和签名端身份u,产生签名端私钥还用于根据签名σ和追踪密钥TK,确定签名端身份u;The attribute authorization end is used to generate the master private key msk, the tracking key TK and the public parameter params; it is used to generate the signature end private key according to the master private key msk, the public parameter params, the signature end attribute set ω a and the signature end identity u It is also used to determine the identity u of the signing end based on the signature σ and the tracking key TK;
签名端,用于根据消息m、签名策略(ω,d,Υ)、签名端属性集合ωa、签名端私钥净化端属性集合ωb和公共参数params,产生签名σ和秘密值集合SI;The signature end is used to generate a signature based on the message m, signature strategy (ω, d, Υ), signature end attribute set ω a , and signature end private key Purify the end attribute set ω b and public parameters params, generate the signature σ and the secret value set SI;
净化端,用于根据可净化消息索引集合IS、消息m、公共参数params、签名σ、签名端属性集合ωa、净化端属性集合ωb和签名端发送的秘密值集合SI,产生净化消息m'和净化签名σ';以及A purification end, used to generate a purified message m' and a purified signature σ' according to the purgeable message index set I S , the message m, the public parameter params, the signature σ, the signature end attribute set ω a , the purification end attribute set ω b and the secret value set SI sent by the signature end; and
验证端,用于根据净化消息签名对(m',σ')、公开参数params、签名端属性集合ωa和净化端属性集合ωb,验证签名的有效性。The verification end is used to verify the validity of the signature according to the purified message signature pair (m', σ'), the public parameter params, the signature end attribute set ω a and the purification end attribute set ω b .
与现有技术相比,本发明具有以下有益效果:本发明基于属性基签名设计,签名端的私钥与签名端属性和身份相关联,签名中嵌入了访问策略,如果属性满足访问策略,则用户可以生成有效的签名;净化端可以对签名中的敏感信息进行修改重新生成签名从而实现敏感信息的隐藏。此外,当签名端滥用签名时,属性授权端可以通过追踪签名者身份揭露恶意行为。验证端确信由一组可能的用户创建特定的签名,这些用户的属性与访问策略相匹配,从而不泄露签名者的身份信息。因此,提出的方法及系统在数据认证和隐私保护访问控制中具有很强的实用性和广阔的应用前景。Compared with the prior art, the present invention has the following beneficial effects: the present invention is based on the attribute-based signature design, the private key of the signing end is associated with the signing end attributes and identity, the access policy is embedded in the signature, and if the attributes meet the access policy, the user can generate a valid signature; the purification end can modify the sensitive information in the signature and regenerate the signature to achieve the hiding of sensitive information. In addition, when the signing end abuses the signature, the attribute authorization end can reveal malicious behavior by tracking the identity of the signer. The verification end is sure that a specific signature is created by a group of possible users, and the attributes of these users match the access policy, so as not to disclose the identity information of the signer. Therefore, the proposed method and system have strong practicality and broad application prospects in data authentication and privacy protection access control.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
图1是本发明一实施例中的系统架构图。FIG. 1 is a system architecture diagram according to an embodiment of the present invention.
具体实施方式DETAILED DESCRIPTION
下面结合附图及实施例对本发明做进一步说明。The present invention will be further described below in conjunction with the accompanying drawings and embodiments.
应该指出,以下详细说明都是示例性的,旨在对本申请提供进一步的说明。除非另有指明,本文使用的所有技术和科学术语具有与本申请所属技术领域的普通技术人员通常理解的相同含义。It should be noted that the following detailed descriptions are exemplary and are intended to provide further explanation of the present application. Unless otherwise specified, all technical and scientific terms used herein have the same meanings as those commonly understood by those skilled in the art to which the present application belongs.
需要注意的是,这里所使用的术语仅是为了描述具体实施方式,而非意图限制根据本申请的示例性实施方式。如在这里所使用的,除非上下文另外明确指出,否则单数形式也意图包括复数形式,此外,还应当理解的是,当在本说明书中使用术语“包含”和/或“包括”时,其指明存在特征、步骤、操作、器件、组件和/或它们的组合。It should be noted that the terms used herein are only for describing specific embodiments and are not intended to limit the exemplary embodiments according to the present application. As used herein, unless the context clearly indicates otherwise, the singular form is also intended to include the plural form. In addition, it should be understood that when the terms "comprise" and/or "include" are used in this specification, it indicates the presence of features, steps, operations, devices, components and/or combinations thereof.
本实施例提供了一种可追踪属性基可净化签名方法,包括以下步骤:This embodiment provides a traceable attribute-based purifiable signature method, including the following steps:
步骤S1:属性授权端输入安全参数λ,输出主密钥msk、追踪密钥TK和公开参数params。Step S1: The attribute authorization end inputs the security parameter λ and outputs the master key msk, the tracking key TK and the public parameter params.
在本实施例中,所述步骤S1具体包括以下步骤:In this embodiment, step S1 specifically includes the following steps:
步骤S11:属性授权端输入安全参数λ,随机选择大素数p、q,令q为追踪密钥,即TK=q;计算n=pq,使得|n|=λ;G和GT是两个阶为n的乘法循环群;e:G×G→GT是双线性映射,Gp,Gq分别为G的阶为p,q的子群;定义门限值为d;设且i∈S,定义拉格朗日系数其中Zn={0,1,2,3,…,n-1}。Step S11: The attribute authorization terminal inputs the security parameter λ, randomly selects large prime numbers p and q, and sets q as the tracking key, that is, TK = q; calculates n = pq, so that |n| = λ; G and GT are two multiplicative cyclic groups of order n; e:G×G→ GT is a bilinear mapping, Gp , Gq are subgroups of G of order p and q respectively; defines the threshold value as d; set And i∈S, define the Lagrange coefficient Where Zn = {0, 1, 2, 3, ..., n-1}.
步骤S12:属性授权端随机选取计算g1=gα,其中g是G的生成元, Step S12: Random selection of attribute authorization end Calculate g 1 = g α , where g is the generator of G,
步骤S13:属性授权端随机选取G中的元素g2、Gq的生成元h、G的生成元u'和一个v个元素的向量其中ui是G的生成元,i∈{1,…,v};签名端身份u用长为v的二进制字符串表示,令u[i]表示u的第i个比特,定义为满足u[i]=1的序号的集合,定义W(u)=u'∏i∈Uui。Step S13: The attribute authorization terminal randomly selects an element g 2 in G, a generator h of G q , a generator u' of G, and a vector of v elements Where u i is a generator of G, i∈{1,…,v}; the identity u of the signer is represented by a binary string of length v, let u[i] represent the i-th bit of u, and define For the set of serial numbers satisfying u[i]=1, define W(u)=u'∏ i∈U u i .
步骤S14:属性授权端随机选取ti∈G,定义其中i∈K,K={1,2,…,k,k+1},其中选取 Step S14: The attribute authorization end randomly selects t i ∈ G and defines Where i∈K, K={1,2,…,k,k+1}, among which select
步骤S15:属性授权端随机选取y'∈Zn以及yi,其中计算w'=gy’, Step S15: The attribute authorization terminal randomly selects y'∈Z n and yi , where Calculate w'= gy' ,
步骤S16:属性授权端输出主密钥msk=α和公开参数 Step S16: The attribute authorization terminal outputs the master key msk=α and public parameters
步骤S2:属性授权端输入主密钥msk、公开参数params、签名端属性集合ωa和签名端身份u,输出签名端私钥 Step S2: The attribute authorization end inputs the master key msk, the public parameter params, the signature end attribute set ωa and the signature end identity u, and outputs the signature end private key
在本实施例中,所述步骤S2具体包括以下步骤:In this embodiment, step S2 specifically includes the following steps:
步骤S21:属性授权端输入主密钥msk=α、公开参数 签名端属性集合ωa和签名端身份u,其中 Step S21: The attribute authorization terminal inputs the master key msk=α and the public parameter The signature end attribute set ω a and the signature end identity u, where
步骤S22:属性授权端为每个用户u随机选取s∈Zn,计算Du,0=gs,Du,1=hs。Step S22: The attribute authorization end randomly selects s∈Z n for each user u and calculates Du,0 = g s , Du,1 = h s .
步骤S23:属性授权端选取一个d-1次多项式q(x),满足q(0)=α;对于i∈ωa,属性授权端随机选择ri∈Zn,计算 Step S23: The attribute authorization end selects a d-1 degree polynomial q(x) that satisfies q(0) = α; for i∈ω a , the attribute authorization end randomly selects ri∈Z n and calculates
步骤S24:属性授权端输出签名端私钥 Step S24: The attribute authorization end outputs the signature end private key
步骤S3:签名端输入签名端属性集合ωa、签名端私钥签名策略(ω,d,γ)、净化端属性集合ωb、公开参数params和消息m,输出签名σ和秘密值集合SI。Step S3: The signing end inputs the signing end attribute set ω a and the signing end private key Signature strategy (ω, d, γ), purification end attribute set ω b , public parameters params and message m, output signature σ and secret value set SI.
在本实施例中,所述步骤S3具体包括以下步骤:In this embodiment, step S3 specifically includes the following steps:
步骤S31:签名端输入签名端属性集合ωa、签名端私钥签名策略(ω,d,Υ)、净化端属性集合ωb、公开参数params和消息m。Step S31: The signing end inputs the signing end attribute set ω a and the signing end private key Signature strategy (ω, d, Υ), purification end attribute set ω b , public parameters params and message m.
步骤S32:签名端随机选择再随机选择默认子集令其中|ω'a|≥d,|ω'b|≥d,ω'a∩Ω'a=φ,ω'b∩Ω'b=φ;其中Ω={ω1,…,ωd-1},其中ωi∈Zn。Step S32: Signature end random selection Then randomly select the default subset make Where |ω' a |≥d, |ω' b |≥d, ω' a ∩Ω' a =φ, ω' b ∩Ω' b =φ; where Ω={ω 1 ,…,ω d-1 }, where ω i ∈Z n .
步骤S33:对身份u的每一个比特u[i](i=1,…,v),签名端随机选取θi∈Zn,计算 签名端计算:Step S33: For each bit u[i] (i=1,…,v) of identity u, the signature end randomly selects θ i ∈ Z n and calculates Signature end calculation:
步骤S34:签名端随机选取s′1∈Zn,令s1=s+s′1;计算秘密值其中i∈Is,表示签名端允许净化端净化的消息索引集合。令表示秘密值集合,|Is|表示集合Is中元素的个数。Step S34: The signature end randomly selects s′ 1 ∈Z n , sets s 1 =s+s′ 1 ; calculates the secret value where i∈I s , Represents the message index set that the signing end allows the purifying end to purify. represents a set of secret values, and |I s | represents the number of elements in the set I s .
步骤S35:对所有签名端随机选取r′i∈Zn;对所有签名端随机选取r″i∈Zn,签名端计算:Step S35: For all The signature end randomly selects r′ i ∈Z n ; for all The signature end randomly selects r″ i ∈Z n and calculates:
步骤S36:签名端输出签名:σ=(σ0,σ1,σai,σbi,c,c1,..,cv,π1,…,πv)。Step S36: the signature end outputs a signature: σ = (σ 0 , σ 1 , σ ai , σ bi , c, c 1 , .. , c v , π 1 , … , π v ).
步骤S4:净化端输入可净化消息索引集合IS、消息m、公共参数params、签名σ、签名端属性集合ωa、净化端属性集合ωb和签名端发送的秘密值集合SI,输出净化消息m′和净化签名σ′。Step S4: The purification end inputs the purifiable message index set IS , message m, public parameter params, signature σ, signature end attribute set ωa , purification end attribute set ωb and secret value set SI sent by the signature end, and outputs the purified message m′ and purified signature σ′.
在本实施例中,所述步骤S4具体包括以下步骤:In this embodiment, step S4 specifically includes the following steps:
步骤S41:净化端输入可净化消息索引集合IS、消息m、公共参数params、签名σ、签名端属性集合ωa、净化端属性集合ωb和签名端发送的秘密值集合SI。Step S41: the purification end inputs the purifiable message index set IS , the message m, the public parameter params, the signature σ, the signature end attribute set ωa , the purification end attribute set ωb and the secret value set SI sent by the signature end.
步骤S42:净化端定义需要净化的消息索引集合令集合I1={i∈I:mi=0,m’i=1},I2={i∈I:mi=1,m’i=0}。Step S42: The purification end defines the message index set that needs to be purified Let the set I 1 ={i∈I:m i =0, m' i =1}, I 2 ={i∈I:m i =1, m' i =0}.
步骤S43:净化端选择随机数计算:Step S43: The purification end selects a random number calculate:
步骤S44:净化端输出净化签名:σ'=(σ'0,σ'ai,σ'bi,σ'1,c,c1,…,cv,π1,…,πv)。Step S44: the purification end outputs a purified signature: σ' = (σ' 0 , σ' ai , σ' bi , σ' 1 , c, c 1 , ..., c v , π 1 , ..., π v ).
步骤S5:验证端输入净化消息签名对(m',σ')、公开参数params、签名端属性集合ωa和净化端属性集合ωb,验证签名的有效性,如果签名有效则输出accept,否则输出reject。Step S5: The verification end inputs the purified message signature pair (m', σ'), public parameters params, the signing end attribute set ω a and the purification end attribute set ω b , verifies the validity of the signature, and outputs accept if the signature is valid, otherwise outputs reject.
在本实施例中,所述步骤S5具体包括以下步骤:In this embodiment, step S5 specifically includes the following steps:
步骤S51:验证端输入净化消息签名对(m',σ')、公开参数params、签名端属性集合ωa和净化端属性集合ωb。Step S51: the verification end inputs the purified message signature pair (m', σ'), public parameters params, the signature end attribute set ω a and the purification end attribute set ω b .
步骤S52:验证端计算: Step S52: The verification end calculates:
步骤S53:验证端判断等式:是否成立,若成立输出accept,否则输出reject。Step S53: The verification end determines the equation: Is it true? If so, output accept, otherwise output reject.
步骤S6:属性授权端输入净化消息签名对(m′,σ')和追踪密钥TK,输出签名端身份u。Step S6: The attribute authorization end inputs the purified message signature pair (m′, σ′) and the tracking key TK, and outputs the signing end identity u.
在本实施例中,所述步骤S6具体包括以下步骤:In this embodiment, step S6 specifically includes the following steps:
步骤S61:属性授权端输入净化消息签名对(m',σ′)和追踪密钥q。Step S61: The attribute authority inputs the purified message signature pair (m', σ') and the tracking key q.
步骤S62:属性授权端对每一个ci计算(ci)q;若(ci)q=g0,则u[i]=0;若(ci)q=(ui)q,则u[i]=1。Step S62: The attribute authorization end calculates ( ci ) q for each ci ; if ( ci ) q = g0 , then u[i] = 0; if (ci ) q = (u i ) q , then u[i] = 1.
步骤S63:属性授权端输出签名端身份u。Step S63: The attribute authorization end outputs the signature end identity u.
如图1所示,本实施例还提供了一种用于上述方法的可追踪属性基可净化签名系统,包括:As shown in FIG1 , this embodiment further provides a traceable attribute-based purifiable signature system for the above method, including:
属性授权端,用于产生主私钥msk、追踪密钥TK和公开参数params;用于根据主私钥msk、公开参数params、签名端属性集合ωa和签名端身份u,产生签名端私钥还用于根据签名σ和追踪密钥TK,确定签名端身份u;The attribute authorization end is used to generate the master private key msk, the tracking key TK and the public parameter params; it is used to generate the signature end private key according to the master private key msk, the public parameter params, the signature end attribute set ω a and the signature end identity u It is also used to determine the identity u of the signing end based on the signature σ and the tracking key TK;
签名端,用于根据消息m、签名策略(ω,d,Υ)、签名端属性集合ωa、签名端私钥净化端属性集合ωb和公共参数params,产生签名σ和秘密值集合SI;The signature end is used to generate a signature based on the message m, signature strategy (ω, d, Υ), signature end attribute set ω a , and signature end private key Purify the end attribute set ω b and public parameters params, generate the signature σ and the secret value set SI;
净化端,用于根据可净化消息索引集合IS、消息m、公共参数params、签名σ、签名端属性集合ωa、净化端属性集合ωb和签名端发送的秘密值集合SI,产生净化消息m′和净化签名σ′;以及A purification end, used to generate a purified message m′ and a purified signature σ′ according to a set of purifiable message indexes I S , a message m, public parameters params, a signature σ, a set of signature end attributes ω a , a set of purification end attributes ω b and a set of secret values SI sent by the signature end; and
验证端,用于根据净化消息签名对(m′,σ′)、公开参数params、签名端属性集合ωa和净化端属性集合ωb,验证签名的有效性。The verification end is used to verify the validity of the signature according to the purified message signature pair (m′, σ′), the public parameter params, the signature end attribute set ω a and the purification end attribute set ω b .
本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that the embodiments of the present application may be provided as methods, systems, or computer program products. Therefore, the present application may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment in combination with software and hardware. Moreover, the present application may adopt the form of a computer program product implemented in one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) that contain computer-usable program code.
本申请是参照根据本申请实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to the flowchart and/or block diagram of the method, device (system) and computer program product according to the embodiment of the present application. It should be understood that each process and/or box in the flowchart and/or block diagram, and the combination of the process and/or box in the flowchart and/or block diagram can be realized by computer program instructions. These computer program instructions can be provided to a processor of a general-purpose computer, a special-purpose computer, an embedded processor or other programmable data processing device to produce a machine, so that the instructions executed by the processor of the computer or other programmable data processing device produce a device for realizing the function specified in one process or multiple processes in the flowchart and/or one box or multiple boxes in the block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer-readable memory produce a manufactured product including an instruction device that implements the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions may also be loaded onto a computer or other programmable data processing device so that a series of operational steps are executed on the computer or other programmable device to produce a computer-implemented process, whereby the instructions executed on the computer or other programmable device provide steps for implementing the functions specified in one or more processes in the flowchart and/or one or more boxes in the block diagram.
以上所述,仅是本发明的较佳实施例而已,并非是对本发明作其它形式的限制,任何熟悉本专业的技术人员可能利用上述揭示的技术内容加以变更或改型为等同变化的等效实施例。但是凡是未脱离本发明技术方案内容,依据本发明的技术实质对以上实施例所作的任何简单修改、等同变化与改型,仍属于本发明技术方案的保护范围。The above is only a preferred embodiment of the present invention, and does not limit the present invention in other forms. Any technician familiar with the profession may use the above disclosed technical content to change or modify it into an equivalent embodiment with equivalent changes. However, any simple modification, equivalent change and modification made to the above embodiment according to the technical essence of the present invention without departing from the technical solution of the present invention still belongs to the protection scope of the technical solution of the present invention.
Claims (2)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110820317.XA CN113536378B (en) | 2021-07-20 | 2021-07-20 | Traceable attribute-based purifiable signature method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110820317.XA CN113536378B (en) | 2021-07-20 | 2021-07-20 | Traceable attribute-based purifiable signature method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113536378A CN113536378A (en) | 2021-10-22 |
CN113536378B true CN113536378B (en) | 2023-05-09 |
Family
ID=78100477
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110820317.XA Active CN113536378B (en) | 2021-07-20 | 2021-07-20 | Traceable attribute-based purifiable signature method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113536378B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113919008B (en) * | 2021-10-28 | 2024-10-25 | 福建师范大学 | Traceable attribute-based signature method and system with fixed signature length |
CN114760069B (en) * | 2022-04-12 | 2023-06-09 | 福建师范大学 | Forward secure high-efficiency attribute-based cleanable signature system and method |
CN115174105B (en) * | 2022-06-29 | 2024-11-26 | 福建师范大学 | Attribute-based purifiable signature method and system with server-assisted verification |
CN115174239B (en) * | 2022-07-14 | 2023-05-05 | 福建师范大学 | Traceable and forward secure attribute-based signature system and method with fixed length |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113156A (en) * | 2019-04-30 | 2019-08-09 | 福建师范大学 | A kind of traceable layering authorizes ciphertext policy ABE base authentication method more |
WO2019214942A1 (en) * | 2018-05-10 | 2019-11-14 | Telecom Italia S.P.A. | Protecting signaling messages in hop-by-hop network communication link |
CN111447209A (en) * | 2020-03-24 | 2020-07-24 | 西南交通大学 | Black box traceable ciphertext policy attribute-based encryption method |
CN112765650A (en) * | 2021-01-05 | 2021-05-07 | 西安电子科技大学 | Attribute-based searchable encryption block chain medical data sharing method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11030317B2 (en) * | 2018-12-11 | 2021-06-08 | Intel Corporation | Independently recoverable security for processor and peripheral communication |
-
2021
- 2021-07-20 CN CN202110820317.XA patent/CN113536378B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019214942A1 (en) * | 2018-05-10 | 2019-11-14 | Telecom Italia S.P.A. | Protecting signaling messages in hop-by-hop network communication link |
CN110113156A (en) * | 2019-04-30 | 2019-08-09 | 福建师范大学 | A kind of traceable layering authorizes ciphertext policy ABE base authentication method more |
CN111447209A (en) * | 2020-03-24 | 2020-07-24 | 西南交通大学 | Black box traceable ciphertext policy attribute-based encryption method |
CN112765650A (en) * | 2021-01-05 | 2021-05-07 | 西安电子科技大学 | Attribute-based searchable encryption block chain medical data sharing method |
Non-Patent Citations (2)
Title |
---|
Traceable attribute-based signature;Ke Gu 等;《Journal of Information Security and Applications》;全文 * |
一个可追踪身份的基于属性签名方案;张秋璞;徐震;叶顶锋;;软件学报(第09期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113536378A (en) | 2021-10-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113536378B (en) | Traceable attribute-based purifiable signature method and system | |
Zhou et al. | PassBio: Privacy-preserving user-centric biometric authentication | |
US11425171B2 (en) | Method and system for cryptographic attribute-based access control supporting dynamic rules | |
CN104168108B (en) | It is a kind of to reveal the traceable attribute base mixed encryption method of key | |
CN108737115B (en) | A privacy-preserving method for solving intersection of private attribute sets | |
CN110113156B (en) | Traceable hierarchical multi-authorization ciphertext policy attribute-based authentication method | |
CN111913981A (en) | Online and offline attribute-based boolean keyword searchable encryption method and system | |
CN113438085B (en) | Efficient attribute-based server-assisted signature verification method and system | |
CN106789082A (en) | Cloud storage medical data based on wireless body area network is in batches from auditing method | |
CN101753304A (en) | Method for binding biological specificity and key | |
CN106059765A (en) | Digital virtual asset access control method based on attribute password under cloud environment | |
CN113794556B (en) | PCH revocable method and system for collectable blockchain protocol | |
CN106453393B (en) | Verifiable privacy-preserving data type matching method in participatory sensing | |
CN102710417A (en) | Fuzzy vault method based on fingerprint features and Internet key exchange protocol | |
CN114219479B (en) | Blockchain editable system and method for distributed environment | |
CN113708927B (en) | General assignment verifier signature proving system based on SM2 digital signature | |
US11856095B2 (en) | Apparatus and methods for validating user data by using cryptography | |
CN113158253A (en) | Privacy union method and device | |
CN115865330B (en) | Method and medium for supervising modification of information on chain based on block chain | |
CN105978696B (en) | Reversible fast data outsourcing encapsulation method and device | |
CN114760069B (en) | Forward secure high-efficiency attribute-based cleanable signature system and method | |
CN116599706A (en) | Block chain-based data sharing fine granularity access control method for Internet of things | |
CN113630254B (en) | ECDSA-based generalized assignment verifier signature proving method and system | |
CN107294705A (en) | A kind of method, equipment and the system of key generation and checking | |
CN113792282B (en) | Identity data verification method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |