CN114915426A - Certificateless based message recoverable blind signature method - Google Patents
Certificateless based message recoverable blind signature method Download PDFInfo
- Publication number
- CN114915426A CN114915426A CN202210563294.3A CN202210563294A CN114915426A CN 114915426 A CN114915426 A CN 114915426A CN 202210563294 A CN202210563294 A CN 202210563294A CN 114915426 A CN114915426 A CN 114915426A
- Authority
- CN
- China
- Prior art keywords
- signature
- message
- user
- blind
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012795 verification Methods 0.000 claims abstract description 9
- 230000005540 biological transmission Effects 0.000 claims abstract description 7
- 238000004422 calculation algorithm Methods 0.000 claims description 12
- 125000004122 cyclic group Chemical group 0.000 claims description 6
- 201000004569 Blindness Diseases 0.000 claims description 4
- 241000188250 Idas Species 0.000 claims description 2
- 238000004364 calculation method Methods 0.000 claims description 2
- 230000002452 interceptive effect Effects 0.000 claims 1
- 230000007547 defect Effects 0.000 abstract description 4
- 238000004891 communication Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000002184 metal Substances 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3257—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using blind signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Algebra (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (3)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210563294.3A CN114915426B (en) | 2022-05-20 | 2022-05-20 | Certificate-free message recoverable blind signature method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210563294.3A CN114915426B (en) | 2022-05-20 | 2022-05-20 | Certificate-free message recoverable blind signature method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114915426A true CN114915426A (en) | 2022-08-16 |
CN114915426B CN114915426B (en) | 2023-12-15 |
Family
ID=82768856
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210563294.3A Active CN114915426B (en) | 2022-05-20 | 2022-05-20 | Certificate-free message recoverable blind signature method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114915426B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102387019A (en) * | 2011-10-19 | 2012-03-21 | 西安电子科技大学 | Certificateless partially blind signature method |
CN103117860A (en) * | 2013-01-21 | 2013-05-22 | 孙华 | Certificateless blind ring signature method |
CN104301327A (en) * | 2014-10-29 | 2015-01-21 | 东北大学 | Privacy protection system and method used for P2P social network and based on broadcast encryption |
CN105812141A (en) * | 2016-03-07 | 2016-07-27 | 东北大学 | Outsourcing encrypted data-orientated verifiable intersection operation method and system |
CN106656508A (en) * | 2016-12-27 | 2017-05-10 | 深圳大学 | Identity-based partial blind signature method and apparatus |
CN106789019A (en) * | 2016-12-27 | 2017-05-31 | 深圳大学 | A kind of Certificateless partially blind signature method and device |
CN108989050A (en) * | 2018-08-23 | 2018-12-11 | 电子科技大学 | A kind of certificateless digital signature method |
CN110492993A (en) * | 2019-07-24 | 2019-11-22 | 曲阜师范大学 | It is a kind of new based on no certificate group signature scheme |
CN112511314A (en) * | 2020-11-26 | 2021-03-16 | 中国电子科技集团公司第五十四研究所 | Recoverable message blind signature generation method based on identity |
CN112532394A (en) * | 2020-11-26 | 2021-03-19 | 中国电子科技集团公司第五十四研究所 | Block chain anti-signature traceable certificateless blind signature generation method |
CN113162773A (en) * | 2021-05-25 | 2021-07-23 | 辽宁工程技术大学 | Heterogeneous blind signcryption method capable of proving safety |
CN113468556A (en) * | 2021-06-07 | 2021-10-01 | 北京邮电大学 | Data access control method with complete strategy hiding and related equipment thereof |
-
2022
- 2022-05-20 CN CN202210563294.3A patent/CN114915426B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102387019A (en) * | 2011-10-19 | 2012-03-21 | 西安电子科技大学 | Certificateless partially blind signature method |
CN103117860A (en) * | 2013-01-21 | 2013-05-22 | 孙华 | Certificateless blind ring signature method |
CN104301327A (en) * | 2014-10-29 | 2015-01-21 | 东北大学 | Privacy protection system and method used for P2P social network and based on broadcast encryption |
CN105812141A (en) * | 2016-03-07 | 2016-07-27 | 东北大学 | Outsourcing encrypted data-orientated verifiable intersection operation method and system |
CN106656508A (en) * | 2016-12-27 | 2017-05-10 | 深圳大学 | Identity-based partial blind signature method and apparatus |
CN106789019A (en) * | 2016-12-27 | 2017-05-31 | 深圳大学 | A kind of Certificateless partially blind signature method and device |
CN108989050A (en) * | 2018-08-23 | 2018-12-11 | 电子科技大学 | A kind of certificateless digital signature method |
CN110492993A (en) * | 2019-07-24 | 2019-11-22 | 曲阜师范大学 | It is a kind of new based on no certificate group signature scheme |
CN112511314A (en) * | 2020-11-26 | 2021-03-16 | 中国电子科技集团公司第五十四研究所 | Recoverable message blind signature generation method based on identity |
CN112532394A (en) * | 2020-11-26 | 2021-03-19 | 中国电子科技集团公司第五十四研究所 | Block chain anti-signature traceable certificateless blind signature generation method |
CN113162773A (en) * | 2021-05-25 | 2021-07-23 | 辽宁工程技术大学 | Heterogeneous blind signcryption method capable of proving safety |
CN113468556A (en) * | 2021-06-07 | 2021-10-01 | 北京邮电大学 | Data access control method with complete strategy hiding and related equipment thereof |
Also Published As
Publication number | Publication date |
---|---|
CN114915426B (en) | 2023-12-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110011802B (en) | Efficient method and system for cooperatively generating digital signature by two parties of SM9 | |
CN108989050B (en) | Certificateless digital signature method | |
CN108551392B (en) | Blind signature generation method and system based on SM9 digital signature | |
CN111342973B (en) | Safe bidirectional heterogeneous digital signature method between PKI and IBC | |
JP3522447B2 (en) | Authentication exchange method and additional public electronic signature method | |
US9800418B2 (en) | Signature protocol | |
KR100581440B1 (en) | Apparatus and method for generating and verifying id-based proxy signature by using bilinear parings | |
CN110113150B (en) | Encryption method and system based on non-certificate environment and capable of repudiation authentication | |
JP2013539295A (en) | Authenticated encryption of digital signatures with message recovery | |
JP2002534701A (en) | Auto-recoverable, auto-encryptable cryptosystem using escrowed signature-only keys | |
CN113300856B (en) | Heterogeneous mixed signcryption method capable of proving safety | |
CN106936584B (en) | Method for constructing certificateless public key cryptosystem | |
EP2686978B1 (en) | Keyed pv signatures | |
KR20030062401A (en) | Apparatus and method for generating and verifying id-based blind signature by using bilinear parings | |
CN111654366A (en) | Secure bidirectional heterogeneous strong-designation verifier signature method between PKI and IBC | |
US20150006900A1 (en) | Signature protocol | |
Islam et al. | Certificateless strong designated verifier multisignature scheme using bilinear pairings | |
CN113179153B (en) | User authentication and key agreement method based on certificateless | |
CN110278073B (en) | Group digital signature and verification method, and equipment and device thereof | |
WO2016187689A1 (en) | Signature protocol | |
Tanwar et al. | Extended identity based multi-signcryption scheme with public verifiability | |
CN115580408A (en) | SM 9-based certificateless signature generation method and system | |
CN114915426B (en) | Certificate-free message recoverable blind signature method | |
CN115174056A (en) | Chameleon signature generation method and device based on SM9 signature | |
CN114978488A (en) | SM2 algorithm-based collaborative signature method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Li Fengyin Inventor after: Li Guangshun Inventor after: Wang Yilei Inventor after: Li Xiao Inventor after: Shang Mengxue Inventor after: Liu Tingting Inventor after: Li Ting Inventor before: Li Fengyin Inventor before: Li Xiao Inventor before: Wang Yilei Inventor before: Shang Mengxue |