CN113259094B - Universal hierarchical signature encryption system and construction method - Google Patents

Universal hierarchical signature encryption system and construction method Download PDF

Info

Publication number
CN113259094B
CN113259094B CN202110431894.XA CN202110431894A CN113259094B CN 113259094 B CN113259094 B CN 113259094B CN 202110431894 A CN202110431894 A CN 202110431894A CN 113259094 B CN113259094 B CN 113259094B
Authority
CN
China
Prior art keywords
signature
key
public key
private key
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110431894.XA
Other languages
Chinese (zh)
Other versions
CN113259094A (en
Inventor
陈宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong University
Original Assignee
Shandong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong University filed Critical Shandong University
Priority to CN202110431894.XA priority Critical patent/CN113259094B/en
Publication of CN113259094A publication Critical patent/CN113259094A/en
Application granted granted Critical
Publication of CN113259094B publication Critical patent/CN113259094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3218Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a universal hierarchical signature encryption system and a construction method, which operate a system parameter generation algorithm of public key encryption and non-interactive knowledge proof of zero knowledge to obtain corresponding parameters, select a one-way function F, and synthesize to obtain public parameters; generating a signature private key and a public key, calculating a one-way function value of the signature private key as a random number, operating a key generation algorithm encrypted by a bottom public key, and outputting the obtained decryption private key; the signature party orders the function G to take the random number as input, outputs a public key obtained by a key generation algorithm, constructs a one-way relation between a signature private key and the public key according to the function G and the one-way function F, and generates a knowledge certificate of the signature private key as a signature of a message; the verifier takes the public key, the message to be signed and the signature as input, analyzes the public key as an example, analyzes the message as auxiliary input, analyzes the signature as a certificate, and verifies the signature; the invention can add signature function to the public key encryption scheme deployed and applied, and upgrade the public key encryption scheme into a hierarchical signature encryption scheme.

Description

Universal hierarchical signature encryption system and construction method
Technical Field
The invention belongs to the technical field of communication encryption, and particularly relates to a universal hierarchical signature encryption system and a construction method thereof.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
Public key encryption and digital signatures are the most common cryptographic algorithms. In most privacy preserving applications, both public key encryption and digital signatures are required to provide confidentiality protection and authentication protection of communications, respectively.
According to the inventor, the current common deployment method adopts a key separation strategy, namely, each user respectively runs a key generation algorithm of public key encryption and digital signature to generate two independent key pairs. The method has the advantages that the public key encryption and the digital signature have combined security, and has the disadvantages that the complexity of key management is multiplied, and a user needs to maintain two key pairs and corresponding digital certificates. Another deployment method is to adopt a key reuse strategy, i.e. a user uses an integrated signature encryption scheme to only use the same key pair to safely complete two functions of encryption and signature. The method has the advantages of low complexity of key management and the disadvantages of no support of hierarchical protection and no support of decryption private key escrow.
In summary, at present, there is no signature encryption system supporting private key hierarchy, and the subject is a blank in the field of applied cryptography. Existing related schemes either do not support public key reuse or private key layering.
Disclosure of Invention
The invention provides a universal hierarchical signature encryption system and a construction method thereof in order to solve the problems. The hierarchical signature encryption scheme has the advantages of key separation and key reuse, supports hierarchical protection of the private key and safe trusteeship of the decrypted private key on the premise of keeping the key management complexity unchanged, and has extremely wide application in a privacy protection scene. The obtained hierarchical signature encryption system can provide efficient confidentiality and authentication protection at the same time, also supports hierarchical storage of private keys and safe decryption private key escrow, can add signature function to a public key encryption scheme deployed and applied, upgrades the public key encryption scheme into a hierarchical signature encryption scheme, provides authenticatable confidential communication service and supports individual decryption private key escrow, and therefore outsourcing of the decryption service or compliance audit of confidential information is allowed.
According to some embodiments, the invention adopts the following technical scheme:
a construction method of a universal hierarchical signature encryption system comprises the following steps:
running a system parameter generation algorithm of public key encryption and knowledge proof of non-interactive zero knowledge to obtain corresponding parameters, selecting a one-way function F, and synthesizing to obtain public parameters;
generating a signature private key and a public key, calculating a one-way function value of the signature private key as a random number, operating a key generation algorithm encrypted by a bottom public key, and outputting the obtained decryption private key;
the signature party orders the function G to take the random number as input, outputs a public key obtained by a key generation algorithm, constructs a one-way relation between a signature private key and the public key according to the function G and the one-way function F, and generates a knowledge certificate of the signature private key as a signature of a message;
the verifier takes the public key, the message to be signed and the signature as input, analyzes the public key as an example, analyzes the message as auxiliary input, analyzes the signature as a certificate, and verifies the signature.
As an alternative implementation, a bit string is randomly selected as a signature private key, a one-way function value of the signature private key is calculated as a random number, a key generation algorithm encrypted by a bottom layer public key is operated to generate a public key and a decryption private key, and the signature private key and the public key are output.
As an alternative embodiment, the encryption algorithm in the construction method is an underlying public key encryption algorithm.
As an alternative embodiment, the decryption algorithm in the construction method is an underlying public key decryption algorithm.
As an alternative embodiment, the signature is verified by running a proof verification algorithm with underlying non-interactive zero knowledge.
As an alternative embodiment, the signer takes the public key as an example, takes the private signature key as evidence, takes the message as an auxiliary input, and generates the proof of knowledge of the private signature key as the signature of the message according to the proof generation algorithm of the proof of knowledge of the underlying non-interactive zero knowledge.
As an alternative embodiment, the one-way relationship between the private signature key and the public key is: r _ key { (pk, sk) | pk ═ G (f (sk)) }, where pk is the public key and sk is the signature private key.
A universal hierarchical signature encryption system is obtained by the construction method.
A computer readable storage medium having stored therein a plurality of instructions adapted to be loaded by a processor of a terminal device and to execute the steps of the above method of constructing a generic hierarchical signature encryption system.
A terminal device comprising a processor and a computer readable storage medium, the processor being configured to implement instructions; the computer readable storage medium is used for storing a plurality of instructions which are suitable for being loaded by a processor and executing the steps of the construction method of the universal hierarchical signature encryption system.
Compared with the prior art, the invention has the beneficial effects that:
compared with the existing hierarchical signature encryption system, the invention has the characteristic of the given structure that the signature function can be added on the premise of multiplexing a public key by taking any public key encryption scheme as a starting point, and the signature function is upgraded to the hierarchical signature encryption system. The characteristic is embodied as the advantages of agile development and rapid deployment in engineering practice, and the existing encryption and decryption algorithm and ciphertext format are kept unchanged by only performing incremental upgrading on the existing password system when the service requirement is met.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
FIG. 1 is a hierarchy of private keys and a binary one-way relationship of the present invention.
The specific implementation mode is as follows:
the invention is further described with reference to the following figures and examples.
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
The invention provides a construction method of a hierarchical signature encryption system and a specific instantiation scheme by starting from a common public key encryption scheme (PKE) and combining non-interactive knowledge proof of zero knowledge (NIZKPoK).
The invention can be deployed on an internal cooperative office platform such as Slack or a block chain platform with privacy protection, which needs enterprise level, and supports individual decryption private key escrow while providing certifiable confidential communication service, thereby allowing decryption service outsourcing or supervision and audit of confidential information, and adding signature function to a public key encryption scheme deployed and applied, and upgrading the public key encryption scheme into a hierarchical signature encryption scheme.
Let the random number space of the key generation algorithm of the underlying PKE be {0,1 }. Lambda-m, and the general construction method of the hierarchical signature encryption system based on PKE and NIZKPoK is as follows:
1. system parameter generation Setup
The system builds a cube and runs a system parameter generation algorithm of PKE and NIZKPoK respectively to obtain pp _ PKE and pp _ nizkpoK, and a one-way function F is selected to be {0,1}n→{0,1}mAnd outputs the common parameter pp ═ (pp _ pke, pp _ nizkpok, F).
2. User key generation KeyGen
The user randomly selects a bit string with the length of n as a signature private key sk, calculates a one-way function value F (sk) of the sk as a random number r, runs a key generation algorithm of a bottom-layer PKE to generate a public key pk and a decryption private key dk, and outputs the signature private key sk and the public key pk.
3. Derivation of decryption private keys
The algorithm is part of the algorithm, a user calculates a one-way function value F (sk) of sk as a random number r, operates a key generation algorithm of a bottom-layer PKE, and outputs an obtained decryption private key dk.
4. Encrypting Encrypt
The algorithm is the same as the encryption algorithm of the underlying PKE.
5. Decrypt Decrypt
This algorithm is the same as the decryption algorithm of the underlying PKE.
6. Signature algorithm Sign
The algorithm is run by the signing party. And taking the random number r as an input of the function G, and outputting a public key pk obtained by a PKE key generation algorithm. A one-way relationship between the private and public keys of the signature is defined as R _ key { (pk, sk) | pk ═ G (f (sk)) }. And the signer takes pk as an example, sk as evidence and a message m as auxiliary input, and runs a certificate generation algorithm of the bottom NIZKPoK to generate a knowledge certificate pi of sk as a signature sigma of the message m. The hierarchy of private keys and the binary one-way relationship R _ key are shown in FIG. 1.
The embodiment takes the ElGamal public key encryption scheme and the current most efficient NIZKPoK scheme Spartan as starting points, and a specific hierarchical signature encryption scheme design is given by applying the above conversion. Let G be a circulant group of prime order p.
1. System parameter generation Setup
Randomly selecting the generation element of G as G, and selecting a hash function F: {0,1}256→ Z _ p, the system generation algorithm running NIZKPoK generates the public parameter pp _ NIZKPoK, and outputs the system public parameter pp ═ (g, F, pp _ NIZKPoK).
2. User key generation KeyGen
The user randomly selects a random string with the length of 256 bits as a signature private key sk, and the pk is calculated as gF(sk)E G as a public key, and outputs a key pair (pk, sk).
3. Derivation of decryption private keys
The user takes the signature private key sk as input and outputs a decryption private key dk ═ H (sk) epsilon Z _ p
4. Encrypting Encrypt
The ciphertext sender takes the public key pk of the receiver and the plaintext M to be encrypted as input, randomly selects a random element r in Z _ p, and calculates X-gr∈G,Y=pkr+ M ∈ G, and output ciphertext c ═ X, Y.
5. Decrypt Decrypt
The cipher text receiver takes the decryption private key dk and the cipher text c ═ X, Y as input, and outputs the plain text M ═ Y/Xdk
6. Signature Sign
The signer takes a signature private key sk and a message m to be signed as input, and takes m as auxiliary input to run a proof algorithm pro (pk, sk, m) of the bottom NIZKPoK to generate a knowledge proof of sk as a signature sigma
7. Verifying Verify
And the verifier takes the public key pk, the message m and the signature sigma as input, runs a verification algorithm of the bottom NIZKPoK to detect whether the proof is correct or not, and outputs 1 if the proof passes the detection, otherwise outputs 0.
In the scheme, the signature party, the verification party, the ciphertext sending party and the ciphertext receiving party can use the signature private keys of the signature party, the verification party, the ciphertext sending party and the ciphertext receiving party to sign the message; other users can use the public key of the user to encrypt plaintext, and the user decrypts the ciphertext by using the decryption private key of the user. Therefore, each user can play multiple roles, for example, a party can be a signer and also can be a sender of ciphertext.
The above scheme is based on the deterministic Diffie-Hellman difficulty assumption in bilinear groups to satisfy the joint security of hierarchical signature encryption schemes.
The embodiment is tested by programming, the above specific scheme is realized, and the performance test data is shown in table 1 and table 2 under the security strength of 128 bits.
TABLE 1 calculation efficiency (unit: ms)
Scheme(s) Key generation Derivation of decryption private keys Encryption Decryption Signature Verification label
The invention 0.057 0.0004 0.115 0.056 3.5s 250
TABLE 2 storage Bandwidth efficiency (Unit: bit)
Scheme(s) Public key Signature private key Decryption private key Cipher text Signature
The invention 256 256 256 512 40k
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Although the embodiments of the present invention have been described with reference to the accompanying drawings, it is not intended to limit the scope of the present invention, and it should be understood by those skilled in the art that various modifications and variations can be made without inventive efforts by those skilled in the art based on the technical solution of the present invention.

Claims (9)

1. A construction method of a universal hierarchical signature encryption system is characterized by comprising the following steps: the method comprises the following steps:
running a system parameter generation algorithm of public key encryption and knowledge proof of non-interactive zero knowledge to obtain corresponding parameters, selecting a one-way function F, and taking the obtained parameters and the one-way function as public parameters;
generating a signature private key sk and a public key pk, calculating a one-way function value of the signature private key sk as a random number F (sk), operating a key generation algorithm H encrypted by a bottom layer public key, and outputting an obtained decryption private key dk (H (sk));
in the process of generating the public key pk, the signing party orders the key generation algorithm G to take the random number F (sk) as input, and outputs the public key pk ═ G obtained by the key generation algorithmF(sk)E.g. G, G is a generator of G, a one-way relationship between the signature private key and the public key is constructed according to the function G and the one-way function F, and the knowledge proof of the signature private key is generated as a signature of the message;
the verifier inputs the public key, the message to be signed and the signature, runs a verification algorithm of the bottom NIZKPoK to detect whether the certificate is correct, and verifies the signature.
2. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: randomly selecting a bit string as a signature private key, calculating a one-way function value of the signature private key as a random number, running a key generation algorithm encrypted by a bottom public key to generate a public key and a decryption private key, and outputting the signature private key and the public key.
3. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the encryption algorithm in the construction method is a bottom public key encryption algorithm.
4. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the decryption algorithm in the construction method is a bottom public key decryption algorithm.
5. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: and running a proof verification algorithm of the bottom non-interactive zero knowledge to verify the signature.
6. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the signer takes the public key, the signature private key and the message as input, and generates the knowledge proof of the signature private key as the signature of the message according to the proof generation algorithm of the knowledge proof of the bottom non-interactive zero knowledge.
7. A method of constructing a generic hierarchical signature encryption system as claimed in claim 1 wherein: the one-way relationship between the signature private key and the public key is as follows: r _ key { (pk, sk) | pk ═ G (f (sk)) }, where pk is the public key and sk is the signature private key.
8. A computer readable storage medium having stored therein a plurality of instructions adapted to be loaded by a processor of a terminal device and to perform the steps of a method of building a generic hierarchical signature encryption system according to any one of claims 1 to 7.
9. A terminal device comprising a processor and a computer readable storage medium, the processor being configured to implement instructions; the computer readable storage medium is used for storing a plurality of instructions which are suitable for being loaded by a processor and executing the steps of the method for constructing the universal hierarchical signature encryption system according to any one of claims 1 to 7.
CN202110431894.XA 2021-04-21 2021-04-21 Universal hierarchical signature encryption system and construction method Active CN113259094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110431894.XA CN113259094B (en) 2021-04-21 2021-04-21 Universal hierarchical signature encryption system and construction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110431894.XA CN113259094B (en) 2021-04-21 2021-04-21 Universal hierarchical signature encryption system and construction method

Publications (2)

Publication Number Publication Date
CN113259094A CN113259094A (en) 2021-08-13
CN113259094B true CN113259094B (en) 2022-03-25

Family

ID=77221163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110431894.XA Active CN113259094B (en) 2021-04-21 2021-04-21 Universal hierarchical signature encryption system and construction method

Country Status (1)

Country Link
CN (1) CN113259094B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102017510A (en) * 2007-10-23 2011-04-13 丁素芬 Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols
CN103220146A (en) * 2013-04-02 2013-07-24 西安理工大学 Zero knowledge digital signature method based on multivariate public key cryptosystem
CN104158661A (en) * 2014-07-23 2014-11-19 中国人民武装警察部队工程大学 Disposable public key encryption structuring method based on fuzzy identity

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547199B (en) * 2018-11-19 2021-07-02 武汉大学 Method for generating SM2 digital signature by combining multiple parties
US11973884B2 (en) * 2019-05-27 2024-04-30 Nippon Telegraph And Telephone Corporation Anonymous signature system, signature generation apparatus, anonymous signature generation apparatus, verification apparatus, anonymous signature method and program
US11728991B2 (en) * 2019-05-28 2023-08-15 International Business Machines Corporation Privacy-preserving leakage-deterring public-key encryption from attribute-based encryptions
CN110555772B (en) * 2019-09-06 2023-03-21 深圳前海微众银行股份有限公司 Certificate verification method, device, equipment and readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102017510A (en) * 2007-10-23 2011-04-13 丁素芬 Method and structure for self-sealed joint proof-of-knowledge and Diffie-Hellman key-exchange protocols
CN103220146A (en) * 2013-04-02 2013-07-24 西安理工大学 Zero knowledge digital signature method based on multivariate public key cryptosystem
CN104158661A (en) * 2014-07-23 2014-11-19 中国人民武装警察部队工程大学 Disposable public key encryption structuring method based on fuzzy identity

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Delegated RingCT:faster anonymous transactions;Rui Morais;《arXiv》;20201209;正文第2-5节 *
PGC:Decentralized Confidential Payment System with Auditability;Yu Chen etal.;《ESORICS 2020:Computer security》;20200912;全文 *
Zether:Towards privacy in a smart contract world;Benedikt Bunz etal.;《FC2020:Financial cryptography and data security》;20200718;全文 *
双重***加密研究_获得完全安全的IBE及其扩展;罗颂;《国防科技大学学报》;20120430;第34卷(第2期);全文 *

Also Published As

Publication number Publication date
CN113259094A (en) 2021-08-13

Similar Documents

Publication Publication Date Title
CN111106936B (en) SM 9-based attribute encryption method and system
CN111740828B (en) Key generation method, device and equipment and encryption and decryption method
CN108173639B (en) Two-party cooperative signature method based on SM9 signature algorithm
US8429408B2 (en) Masking the output of random number generators in key generation protocols
US7711113B2 (en) ID-based signature, encryption system and encryption method
CN110830236B (en) Identity-based encryption method based on global hash
US8107620B2 (en) Simple and efficient one-pass authenticated encryption scheme
US9698984B2 (en) Re-encrypted data verification program, re-encryption apparatus and re-encryption system
CN101166088A (en) Encryption and decryption method based on user identity identifier
WO2013174554A1 (en) Key sharing device and system for configuration thereof
CN112564907B (en) Key generation method and device, encryption method and device, and decryption method and device
CN113779645B (en) Quantum digital signature and quantum digital signature encryption method
CN113271209B (en) Trustable public key encryption system and method based on non-interactive zero-knowledge proof
US11463235B2 (en) Encryption device, encryption method, program, decryption device, and decryption method
CN109194474A (en) A kind of data transmission method and device
CN106713349B (en) Inter-group proxy re-encryption method capable of resisting attack of selecting cipher text
CN111314050A (en) Encryption and decryption method and device
US8005211B2 (en) Shuffle-decrypting legitimacy certifying apparatus and method, shuffle-decrypting verifying apparatus and method, program, and recording medium
CN108055134B (en) Collaborative computing method and system for elliptic curve point multiplication and pairing operation
JP5434925B2 (en) Multi-party distributed multiplication apparatus, multi-party distributed multiplication system and method
CN113259094B (en) Universal hierarchical signature encryption system and construction method
CN110798313A (en) Secret dynamic sharing-based collaborative generation method and system for number containing secret
CN114697001B (en) Information encryption transmission method, equipment and medium based on blockchain
CN112733176B (en) Identification password encryption method based on global hash
CN112769539B (en) Method and system for generating RSA key and cooperating with RSA signature and decryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant