CN113259094B - Universal hierarchical signature encryption system and construction method - Google Patents
Universal hierarchical signature encryption system and construction method Download PDFInfo
- Publication number
- CN113259094B CN113259094B CN202110431894.XA CN202110431894A CN113259094B CN 113259094 B CN113259094 B CN 113259094B CN 202110431894 A CN202110431894 A CN 202110431894A CN 113259094 B CN113259094 B CN 113259094B
- Authority
- CN
- China
- Prior art keywords
- signature
- key
- public key
- private key
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a universal hierarchical signature encryption system and a construction method, which operate a system parameter generation algorithm of public key encryption and non-interactive knowledge proof of zero knowledge to obtain corresponding parameters, select a one-way function F, and synthesize to obtain public parameters; generating a signature private key and a public key, calculating a one-way function value of the signature private key as a random number, operating a key generation algorithm encrypted by a bottom public key, and outputting the obtained decryption private key; the signature party orders the function G to take the random number as input, outputs a public key obtained by a key generation algorithm, constructs a one-way relation between a signature private key and the public key according to the function G and the one-way function F, and generates a knowledge certificate of the signature private key as a signature of a message; the verifier takes the public key, the message to be signed and the signature as input, analyzes the public key as an example, analyzes the message as auxiliary input, analyzes the signature as a certificate, and verifies the signature; the invention can add signature function to the public key encryption scheme deployed and applied, and upgrade the public key encryption scheme into a hierarchical signature encryption scheme.
Description
Technical Field
The invention belongs to the technical field of communication encryption, and particularly relates to a universal hierarchical signature encryption system and a construction method thereof.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
Public key encryption and digital signatures are the most common cryptographic algorithms. In most privacy preserving applications, both public key encryption and digital signatures are required to provide confidentiality protection and authentication protection of communications, respectively.
According to the inventor, the current common deployment method adopts a key separation strategy, namely, each user respectively runs a key generation algorithm of public key encryption and digital signature to generate two independent key pairs. The method has the advantages that the public key encryption and the digital signature have combined security, and has the disadvantages that the complexity of key management is multiplied, and a user needs to maintain two key pairs and corresponding digital certificates. Another deployment method is to adopt a key reuse strategy, i.e. a user uses an integrated signature encryption scheme to only use the same key pair to safely complete two functions of encryption and signature. The method has the advantages of low complexity of key management and the disadvantages of no support of hierarchical protection and no support of decryption private key escrow.
In summary, at present, there is no signature encryption system supporting private key hierarchy, and the subject is a blank in the field of applied cryptography. Existing related schemes either do not support public key reuse or private key layering.
Disclosure of Invention
The invention provides a universal hierarchical signature encryption system and a construction method thereof in order to solve the problems. The hierarchical signature encryption scheme has the advantages of key separation and key reuse, supports hierarchical protection of the private key and safe trusteeship of the decrypted private key on the premise of keeping the key management complexity unchanged, and has extremely wide application in a privacy protection scene. The obtained hierarchical signature encryption system can provide efficient confidentiality and authentication protection at the same time, also supports hierarchical storage of private keys and safe decryption private key escrow, can add signature function to a public key encryption scheme deployed and applied, upgrades the public key encryption scheme into a hierarchical signature encryption scheme, provides authenticatable confidential communication service and supports individual decryption private key escrow, and therefore outsourcing of the decryption service or compliance audit of confidential information is allowed.
According to some embodiments, the invention adopts the following technical scheme:
a construction method of a universal hierarchical signature encryption system comprises the following steps:
running a system parameter generation algorithm of public key encryption and knowledge proof of non-interactive zero knowledge to obtain corresponding parameters, selecting a one-way function F, and synthesizing to obtain public parameters;
generating a signature private key and a public key, calculating a one-way function value of the signature private key as a random number, operating a key generation algorithm encrypted by a bottom public key, and outputting the obtained decryption private key;
the signature party orders the function G to take the random number as input, outputs a public key obtained by a key generation algorithm, constructs a one-way relation between a signature private key and the public key according to the function G and the one-way function F, and generates a knowledge certificate of the signature private key as a signature of a message;
the verifier takes the public key, the message to be signed and the signature as input, analyzes the public key as an example, analyzes the message as auxiliary input, analyzes the signature as a certificate, and verifies the signature.
As an alternative implementation, a bit string is randomly selected as a signature private key, a one-way function value of the signature private key is calculated as a random number, a key generation algorithm encrypted by a bottom layer public key is operated to generate a public key and a decryption private key, and the signature private key and the public key are output.
As an alternative embodiment, the encryption algorithm in the construction method is an underlying public key encryption algorithm.
As an alternative embodiment, the decryption algorithm in the construction method is an underlying public key decryption algorithm.
As an alternative embodiment, the signature is verified by running a proof verification algorithm with underlying non-interactive zero knowledge.
As an alternative embodiment, the signer takes the public key as an example, takes the private signature key as evidence, takes the message as an auxiliary input, and generates the proof of knowledge of the private signature key as the signature of the message according to the proof generation algorithm of the proof of knowledge of the underlying non-interactive zero knowledge.
As an alternative embodiment, the one-way relationship between the private signature key and the public key is: r _ key { (pk, sk) | pk ═ G (f (sk)) }, where pk is the public key and sk is the signature private key.
A universal hierarchical signature encryption system is obtained by the construction method.
A computer readable storage medium having stored therein a plurality of instructions adapted to be loaded by a processor of a terminal device and to execute the steps of the above method of constructing a generic hierarchical signature encryption system.
A terminal device comprising a processor and a computer readable storage medium, the processor being configured to implement instructions; the computer readable storage medium is used for storing a plurality of instructions which are suitable for being loaded by a processor and executing the steps of the construction method of the universal hierarchical signature encryption system.
Compared with the prior art, the invention has the beneficial effects that:
compared with the existing hierarchical signature encryption system, the invention has the characteristic of the given structure that the signature function can be added on the premise of multiplexing a public key by taking any public key encryption scheme as a starting point, and the signature function is upgraded to the hierarchical signature encryption system. The characteristic is embodied as the advantages of agile development and rapid deployment in engineering practice, and the existing encryption and decryption algorithm and ciphertext format are kept unchanged by only performing incremental upgrading on the existing password system when the service requirement is met.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
FIG. 1 is a hierarchy of private keys and a binary one-way relationship of the present invention.
The specific implementation mode is as follows:
the invention is further described with reference to the following figures and examples.
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The invention provides a construction method of a hierarchical signature encryption system and a specific instantiation scheme by starting from a common public key encryption scheme (PKE) and combining non-interactive knowledge proof of zero knowledge (NIZKPoK).
The invention can be deployed on an internal cooperative office platform such as Slack or a block chain platform with privacy protection, which needs enterprise level, and supports individual decryption private key escrow while providing certifiable confidential communication service, thereby allowing decryption service outsourcing or supervision and audit of confidential information, and adding signature function to a public key encryption scheme deployed and applied, and upgrading the public key encryption scheme into a hierarchical signature encryption scheme.
Let the random number space of the key generation algorithm of the underlying PKE be {0,1 }. Lambda-m, and the general construction method of the hierarchical signature encryption system based on PKE and NIZKPoK is as follows:
1. system parameter generation Setup
The system builds a cube and runs a system parameter generation algorithm of PKE and NIZKPoK respectively to obtain pp _ PKE and pp _ nizkpoK, and a one-way function F is selected to be {0,1}n→{0,1}mAnd outputs the common parameter pp ═ (pp _ pke, pp _ nizkpok, F).
2. User key generation KeyGen
The user randomly selects a bit string with the length of n as a signature private key sk, calculates a one-way function value F (sk) of the sk as a random number r, runs a key generation algorithm of a bottom-layer PKE to generate a public key pk and a decryption private key dk, and outputs the signature private key sk and the public key pk.
3. Derivation of decryption private keys
The algorithm is part of the algorithm, a user calculates a one-way function value F (sk) of sk as a random number r, operates a key generation algorithm of a bottom-layer PKE, and outputs an obtained decryption private key dk.
4. Encrypting Encrypt
The algorithm is the same as the encryption algorithm of the underlying PKE.
5. Decrypt Decrypt
This algorithm is the same as the decryption algorithm of the underlying PKE.
6. Signature algorithm Sign
The algorithm is run by the signing party. And taking the random number r as an input of the function G, and outputting a public key pk obtained by a PKE key generation algorithm. A one-way relationship between the private and public keys of the signature is defined as R _ key { (pk, sk) | pk ═ G (f (sk)) }. And the signer takes pk as an example, sk as evidence and a message m as auxiliary input, and runs a certificate generation algorithm of the bottom NIZKPoK to generate a knowledge certificate pi of sk as a signature sigma of the message m. The hierarchy of private keys and the binary one-way relationship R _ key are shown in FIG. 1.
The embodiment takes the ElGamal public key encryption scheme and the current most efficient NIZKPoK scheme Spartan as starting points, and a specific hierarchical signature encryption scheme design is given by applying the above conversion. Let G be a circulant group of prime order p.
1. System parameter generation Setup
Randomly selecting the generation element of G as G, and selecting a hash function F: {0,1}256→ Z _ p, the system generation algorithm running NIZKPoK generates the public parameter pp _ NIZKPoK, and outputs the system public parameter pp ═ (g, F, pp _ NIZKPoK).
2. User key generation KeyGen
The user randomly selects a random string with the length of 256 bits as a signature private key sk, and the pk is calculated as gF(sk)E G as a public key, and outputs a key pair (pk, sk).
3. Derivation of decryption private keys
The user takes the signature private key sk as input and outputs a decryption private key dk ═ H (sk) epsilon Z _ p
4. Encrypting Encrypt
The ciphertext sender takes the public key pk of the receiver and the plaintext M to be encrypted as input, randomly selects a random element r in Z _ p, and calculates X-gr∈G,Y=pkr+ M ∈ G, and output ciphertext c ═ X, Y.
5. Decrypt Decrypt
The cipher text receiver takes the decryption private key dk and the cipher text c ═ X, Y as input, and outputs the plain text M ═ Y/Xdk。
6. Signature Sign
The signer takes a signature private key sk and a message m to be signed as input, and takes m as auxiliary input to run a proof algorithm pro (pk, sk, m) of the bottom NIZKPoK to generate a knowledge proof of sk as a signature sigma
7. Verifying Verify
And the verifier takes the public key pk, the message m and the signature sigma as input, runs a verification algorithm of the bottom NIZKPoK to detect whether the proof is correct or not, and outputs 1 if the proof passes the detection, otherwise outputs 0.
In the scheme, the signature party, the verification party, the ciphertext sending party and the ciphertext receiving party can use the signature private keys of the signature party, the verification party, the ciphertext sending party and the ciphertext receiving party to sign the message; other users can use the public key of the user to encrypt plaintext, and the user decrypts the ciphertext by using the decryption private key of the user. Therefore, each user can play multiple roles, for example, a party can be a signer and also can be a sender of ciphertext.
The above scheme is based on the deterministic Diffie-Hellman difficulty assumption in bilinear groups to satisfy the joint security of hierarchical signature encryption schemes.
The embodiment is tested by programming, the above specific scheme is realized, and the performance test data is shown in table 1 and table 2 under the security strength of 128 bits.
TABLE 1 calculation efficiency (unit: ms)
Scheme(s) | Key generation | Derivation of decryption private keys | Encryption | Decryption | Signature | Verification label |
The invention | 0.057 | 0.0004 | 0.115 | 0.056 | 3.5s | 250 |
TABLE 2 storage Bandwidth efficiency (Unit: bit)
Scheme(s) | Public key | Signature private key | Decryption private key | Cipher text | Signature |
The invention | 256 | 256 | 256 | 512 | 40k |
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Although the embodiments of the present invention have been described with reference to the accompanying drawings, it is not intended to limit the scope of the present invention, and it should be understood by those skilled in the art that various modifications and variations can be made without inventive efforts by those skilled in the art based on the technical solution of the present invention.
Claims (9)
1. A construction method of a universal hierarchical signature encryption system is characterized by comprising the following steps: the method comprises the following steps:
running a system parameter generation algorithm of public key encryption and knowledge proof of non-interactive zero knowledge to obtain corresponding parameters, selecting a one-way function F, and taking the obtained parameters and the one-way function as public parameters;
generating a signature private key sk and a public key pk, calculating a one-way function value of the signature private key sk as a random number F (sk), operating a key generation algorithm H encrypted by a bottom layer public key, and outputting an obtained decryption private key dk (H (sk));
in the process of generating the public key pk, the signing party orders the key generation algorithm G to take the random number F (sk) as input, and outputs the public key pk ═ G obtained by the key generation algorithmF(sk)E.g. G, G is a generator of G, a one-way relationship between the signature private key and the public key is constructed according to the function G and the one-way function F, and the knowledge proof of the signature private key is generated as a signature of the message;
the verifier inputs the public key, the message to be signed and the signature, runs a verification algorithm of the bottom NIZKPoK to detect whether the certificate is correct, and verifies the signature.
2. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: randomly selecting a bit string as a signature private key, calculating a one-way function value of the signature private key as a random number, running a key generation algorithm encrypted by a bottom public key to generate a public key and a decryption private key, and outputting the signature private key and the public key.
3. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the encryption algorithm in the construction method is a bottom public key encryption algorithm.
4. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the decryption algorithm in the construction method is a bottom public key decryption algorithm.
5. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: and running a proof verification algorithm of the bottom non-interactive zero knowledge to verify the signature.
6. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the signer takes the public key, the signature private key and the message as input, and generates the knowledge proof of the signature private key as the signature of the message according to the proof generation algorithm of the knowledge proof of the bottom non-interactive zero knowledge.
7. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the one-way relationship between the signature private key and the public key is as follows: r _ key { (pk, sk) | pk ═ G (f (sk)) }, where pk is the public key and sk is the signature private key.
8. A computer readable storage medium having stored therein a plurality of instructions adapted to be loaded by a processor of a terminal device and to perform the steps of a method of building a generic hierarchical signature encryption system according to any one of claims 1 to 7.
9. A terminal device comprising a processor and a computer readable storage medium, the processor being configured to implement instructions; the computer readable storage medium is used for storing a plurality of instructions which are suitable for being loaded by a processor and executing the steps of the method for constructing the universal hierarchical signature encryption system according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110431894.XA CN113259094B (en) | 2021-04-21 | 2021-04-21 | Universal hierarchical signature encryption system and construction method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110431894.XA CN113259094B (en) | 2021-04-21 | 2021-04-21 | Universal hierarchical signature encryption system and construction method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113259094A CN113259094A (en) | 2021-08-13 |
CN113259094B true CN113259094B (en) | 2022-03-25 |
Family
ID=77221163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110431894.XA Active CN113259094B (en) | 2021-04-21 | 2021-04-21 | Universal hierarchical signature encryption system and construction method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113259094B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102017510A (en) * | 2007-10-23 | 2011-04-13 | 丁素芬 | Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols |
CN103220146A (en) * | 2013-04-02 | 2013-07-24 | 西安理工大学 | Zero knowledge digital signature method based on multivariate public key cryptosystem |
CN104158661A (en) * | 2014-07-23 | 2014-11-19 | 中国人民武装警察部队工程大学 | Disposable public key encryption structuring method based on fuzzy identity |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547199B (en) * | 2018-11-19 | 2021-07-02 | 武汉大学 | Method for generating SM2 digital signature by combining multiple parties |
US11973884B2 (en) * | 2019-05-27 | 2024-04-30 | Nippon Telegraph And Telephone Corporation | Anonymous signature system, signature generation apparatus, anonymous signature generation apparatus, verification apparatus, anonymous signature method and program |
US11728991B2 (en) * | 2019-05-28 | 2023-08-15 | International Business Machines Corporation | Privacy-preserving leakage-deterring public-key encryption from attribute-based encryptions |
CN110555772B (en) * | 2019-09-06 | 2023-03-21 | 深圳前海微众银行股份有限公司 | Certificate verification method, device, equipment and readable storage medium |
-
2021
- 2021-04-21 CN CN202110431894.XA patent/CN113259094B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102017510A (en) * | 2007-10-23 | 2011-04-13 | 丁素芬 | Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols |
CN103220146A (en) * | 2013-04-02 | 2013-07-24 | 西安理工大学 | Zero knowledge digital signature method based on multivariate public key cryptosystem |
CN104158661A (en) * | 2014-07-23 | 2014-11-19 | 中国人民武装警察部队工程大学 | Disposable public key encryption structuring method based on fuzzy identity |
Non-Patent Citations (4)
Title |
---|
Delegated RingCT:faster anonymous transactions;Rui Morais;《arXiv》;20201209;正文第2-5节 * |
PGC:Decentralized Confidential Payment System with Auditability;Yu Chen etal.;《ESORICS 2020:Computer security》;20200912;全文 * |
Zether:Towards privacy in a smart contract world;Benedikt Bunz etal.;《FC2020:Financial cryptography and data security》;20200718;全文 * |
双重***加密研究_获得完全安全的IBE及其扩展;罗颂;《国防科技大学学报》;20120430;第34卷(第2期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113259094A (en) | 2021-08-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111106936B (en) | SM 9-based attribute encryption method and system | |
CN111740828B (en) | Key generation method, device and equipment and encryption and decryption method | |
CN108173639B (en) | Two-party cooperative signature method based on SM9 signature algorithm | |
US8429408B2 (en) | Masking the output of random number generators in key generation protocols | |
US7711113B2 (en) | ID-based signature, encryption system and encryption method | |
CN110830236B (en) | Identity-based encryption method based on global hash | |
US8107620B2 (en) | Simple and efficient one-pass authenticated encryption scheme | |
US9698984B2 (en) | Re-encrypted data verification program, re-encryption apparatus and re-encryption system | |
CN101166088A (en) | Encryption and decryption method based on user identity identifier | |
WO2013174554A1 (en) | Key sharing device and system for configuration thereof | |
CN112564907B (en) | Key generation method and device, encryption method and device, and decryption method and device | |
CN113779645B (en) | Quantum digital signature and quantum digital signature encryption method | |
CN113271209B (en) | Trustable public key encryption system and method based on non-interactive zero-knowledge proof | |
US11463235B2 (en) | Encryption device, encryption method, program, decryption device, and decryption method | |
CN109194474A (en) | A kind of data transmission method and device | |
CN106713349B (en) | Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text | |
CN111314050A (en) | Encryption and decryption method and device | |
US8005211B2 (en) | Shuffle-decrypting legitimacy certifying apparatus and method, shuffle-decrypting verifying apparatus and method, program, and recording medium | |
CN108055134B (en) | Collaborative computing method and system for elliptic curve point multiplication and pairing operation | |
JP5434925B2 (en) | Multi-party distributed multiplication apparatus, multi-party distributed multiplication system and method | |
CN113259094B (en) | Universal hierarchical signature encryption system and construction method | |
CN110798313A (en) | Secret dynamic sharing-based collaborative generation method and system for number containing secret | |
CN114697001B (en) | Information encryption transmission method, equipment and medium based on blockchain | |
CN112733176B (en) | Identification password encryption method based on global hash | |
CN112769539B (en) | Method and system for generating RSA key and cooperating with RSA signature and decryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |