Summary of the invention
The purpose of this invention is to provide a kind of method of the anonymous ring of message being signed, solve existing ring signature system unsafe defective under quantum calculation based on the multivariable public key cryptography.
The technical solution adopted in the present invention is that based on the method for multivariable public key cryptography to the anonymous ring signature of message, this method is implemented according to following steps:
Step 1. generation system parameter
1) k=GF (q) being set is the finite field that is characterized as p, wherein q=p
l, l is a positive integer;
2) make K
Be n the expansion of finite field k, n is a positive integer here, and g (x) is n irreducible function on the finite field k;
3) make that m is the number of equation in the multivariable equation group, n is the number of variable;
4) select H:{0,1}
*→ k
mBe the unidirectional irreversible hash function of the anti-collision of cryptography safety, system parameters be (k, q, p, l, m, n, H);
Step 2. key generates
1) supposes in the ring t user arranged, be made as U={u, u
1..., u
T-1;
2) according to the multivariable public-key cryptosystem, each user u
i(0≤i≤t-1) selection Fi is from k
nTo k
mBut inverse mapping, F
iSatisfy:
A) F
i(x
1..., x
n)=(f
I1..., f
Im), f wherein
Ij∈ k[x
1..., x
n], j=1 ..., m;
B) any equation
F
i(x
1,…,x
n)=(y′
1,…,y′
m)
All be easy to find the solution;
3) each user u
i(0≤i≤t-1) selects wherein L
1iBe from k
mTo k
mA reversible affine transformation of selecting at random,
L
1i(x
1,…,x
m)=M
1i·(x
1,…,x
m)
T+a
1i,
M wherein
1iBe the invertible matrix of a m * m on the finite field k, a
1iIt is the column vector of m * 1 on the finite field k;
4) each user u
i(0≤i≤t-1) selects L
2iBe from k
nTo k
nA reversible affine transformation of selecting at random
L
2i(x
1,…,x
n)=M
2i·(x
1,…,x
n)
T+a
2i,
M wherein
2iBe the invertible matrix of a n * n on the finite field k, a
2iIt is the column vector of n * 1 on the finite field k;
5) each user u
i(0≤i≤t-1) announces its PKI
Wherein each
All be k[x
1..., x
n] in multinomial;
6) each user u
i(its private key SK that maintains secrecy of 0≤i≤t-1)
i={ L
1i, F
i, L
2i;
7) public key sets of t user in the ring is designated as
Step 3. ring signature generates
Suppose member u
π(0≤π≤t-1) represents all member U={u in the ring members
0, u
1..., u
T-1To message M ∈ 0,1}
*Sign, the user's of the t in the ring public key sets is designated as
u
πPKI be
Private key is SK
π={ L
1 π, F
π, L
2 π, signer u
πThe step of ring signature is as follows:
1) for i=0,1 ..., t-1 and i ≠ π, picked at random r
i∈ k
n, calculate
If R
iIn have identically, then reselect r
i
2) calculate
h=H(M||L);
3) calculate
If R
πAnd R
iIdentical, then reselect r;
4) calculate
5) output message M is about ring
Ring signature sigma=(r
0, r
1... r
T-1);
The checking of step 4. ring signature
Given ring
The signature sigma about message M=(r
0, r
1... r
T-1), any verifier's checking
Whether set up.If equation is set up, then accept the ring signature, otherwise refuse this ring signature.
Characteristics of the present invention also are,
Wherein in the step 3, signer calculates
Thereby make message M about ring
Ring signature sigma=(r
0, r
1... r
T-1) constituted the closed-loop that can verify and satisfy
Ring endorsement method based on the conventional cipher system, its fail safe is on the hazard under quantum computer, and the ring endorsement method that the present invention is based on the multivariable public-key cryptosystem is safe under quantum calculation, and method of the present invention not only has fail safe but also have the high advantage of computational efficiency.
Embodiment
The technical solution adopted in the present invention is that based on the method for multivariable public key cryptography to the anonymous ring signature of message, this method is implemented according to following steps:
Step 1. generation system parameter
1) k=GF (q) being set is the finite field that is characterized as p, wherein q=p
l, l is a positive integer;
2) order
Be n the expansion of finite field k, n is a positive integer here, and g (x) is n irreducible function on the finite field k;
3) make that m is the number of equation in the multivariable equation group, n is the number of variable;
4) select H:{0,1}
*→ k
mBe the unidirectional irreversible hash function of the anti-collision of cryptography safety, system parameters be (k, q, p, l, m, n, H).
Step 2. key generates
1) supposes in the ring t user arranged, be made as U={u
0, u
1..., u
T-1;
2) according to the multivariable public-key cryptosystem, each user u
i(0≤i≤t-1) selects F
iBe from k
nTo k
mBut inverse mapping, F
iSatisfy:
A) F
i(x
1..., x
n)=(f
I1..., f
Im), f wherein
Ij∈ k[x
1..., x
n], j=1 ..., m;
B) any equation
F
i(x
1,…,x
n)=(y′
1,…,y′
m)
All be easy to find the solution;
3) each user u
i(0≤i≤t-1) selects L at random
1iBe from k
mTo k
mA reversible affine transformation,
L
1i(x
1,…,x
m)=M
1i·(x
1,…,x
m)
T+a
1i,
M wherein
1iBe the invertible matrix of a m * m on the finite field k, a
1iIt is the column vector of m * 1 on the finite field k;
4) each user u
i(0≤i≤t-1) selects L at random
2iBe from k
nTo k
nA reversible affine transformation
L
2i(x
1,…,x
n)=M
2i·(x
1,…,x
n)
T+a
2i,
M wherein
2iBe the invertible matrix of a n * n on the finite field k, a
2iIt is the column vector of n * 1 on the finite field k;
5) each user u
i(0≤i≤t-1) announces its PKI
Wherein each
All be k[x
1..., x
n] in multinomial;
6) each user u
i(its private key SK that maintains secrecy of 0≤i≤t-1)
i={ L
1i, F
i, L
2i;
7) public key sets of t user in the ring is designated as
Step 3. ring signature generates
Suppose member u
π(0≤π≤t-1) represents all member U={u in the ring members
0, u
1..., u
T-1To message M ∈ 0,1}
*Sign, the user's of the t in the ring public key sets is designated as
u
πPKI be
Private key is SK
π={ L
1 π, F
π, L
2 π.Signer u
πThe step of ring signature is as follows:
1) for i=0,1 ..., t-1 and i ≠ π, picked at random r
i∈ k
n, calculate
If R
iIn have identically, then reselect r
i
2) calculate
h=H(M||L);
3) calculate
If R
πAnd R
iIdentical, then reselect r;
4) calculate
5) output message M is about ring
Ring signature sigma=(r
0, r
1... r
T-1).
The checking of step 4. ring signature
Given ring
The signature sigma about message M=(r
0, r
1... r
T-1), any verifier's checking
Whether set up.If equation is set up, then accept the ring signature, otherwise refuse this ring signature.
Respectively correctness, anonymity and unforgeable of signing based on the ring of multivariable public-key cryptosystem of the present invention analyzed below:
Here we are from the correctness of cipher theory proof digital signature method of the present invention.
● correctness
Proposed by the invention is correct based on multivariable ring signature.
If the recipient receives that message M is about ring
Signature sigma=(r
0, r
1... r
T-1), if this signature is to be undertaken by as above signature step, and in the process of transmission, do not change, then because
Obtain
Again because
h=H(M||L),
So
Set up, so the checking formula is set up.
● the signer anonymity
Proposed by the invention satisfies the unconditional anonymity of signer based on multivariable ring signature.
If signature sigma=(r
0, r
1... r
T-1) be the effective signature of message M, according to the generative process of signature, all u
iBe a member in the ring, u
iBy the process that generates the ring signature message M is encircled signature, according to the generative process of signature, all r
i∈ k
n(i=0,1 ..., π-1, π+1 ..., t-1) all be picked at random, and
It also is picked at random.Because h=H (M||U) can be regarded as k
mOn a random value, therefore
Be k
mA value of last completely random,
Be k
nA value of last completely random.Therefore encircle signature sigma=(r
0, r
1... r
T-1) middle r
i∈ k
n(i=0,1 ..., t-1) all be k
nA value of last completely random.So σ=(r
0, r
1... r
T-1) probability that occurs equates, all be
And it is irrelevant with signer.Even if therefore external attacker has illegally obtained the private key of all possible signer, element is a t element in the ring, and the probability that it can determine real signer is no more than
● the signature unforgeable
The present invention propose based on the ring signature scheme of multivariable polynomial about multivariable public-key cryptosystem (MPKC) known attack can not forge, if in MPKC under the known attack, selected multivariable signature system is safe in the ring signature scheme.Here known attack comprises the algebraically attack among the MPKC, and linearisation is attacked, order attack and differential attack etc.
Proof: suppose that the key that is generated by generating algorithm is right
And public key sets
Send to assailant A.A can utilize known attack among the MPKC, attacks as algebraically, and linearisation is attacked, and order is attacked, differential attack or the like.A exports (R
*, M
*, σ
*), if Vrfy
R*(M
*, R
*Set up)=1, success attack.In this process, A can not inquire (*, M
*, σ
*), and
We analyze the ring signature (R that A output is forged now
*, M
*, σ
*) computation complexity.We suppose assailant A imitation signer u
πForgery is about ring R
*Ring signature (R
*, M
*, σ
*), not general, suppose
Step 1) during assailant A generates according to the ring signature, 2), 3) calculate, but in order to forge the signature of certain message M, need be by trying to achieve r
π, satisfy
Forge ring signature sigma=(r
0, r
1... r
T-1).This problem find the solution the problem of finding the solution that belongs to multivariable quadratic polynomial equation group on the finite field, also be the multivariable public-key cryptosystem based on difficult problem.Attack to the multivariable public-key cryptosystem at present has following method:
1) algebraically is attacked: attack at the algebraically of multivariable public-key cryptosystem and be meant and do not knowing under the situation of private key directly from quadratic equation
In find the solution ciphertext r
π Base algorithm and XL algorithm are the most effective algebraically attack methods.If selected actual multivariable public-key cryptosystem can be resisted direct algebraically attack in this programme, the ring signature among the present invention also can be resisted direct algebraically and attack.
2) lienarized equation is attacked: a lienarized equation is meant given PKI
Always have following equation to set up:
R
π∈ k
mOccurrence substitution following formula, we obtain r
πOne affine (linearity) relation.If selected actual multivariable public-key cryptosystem can be resisted and utilize lienarized equation to attack attacking in this programme, the ring signature among the present invention also can be resisted lienarized equation and attack.
3) order is attacked: Goubin and Courtois point out that minimum order is attacked and are applicable to triangle-Jia-subtract system.The complexity that order is attacked is about
Wherein k is F
πMinimum order is the number of the linear combination of r in the component.
If selected actual multivariable public-key cryptosystem can be resisted and utilize minimum order to attack in this programme, then the signature of the ring among the present invention also can be resisted minimum order attack.
4) differential attack: the PKI that provides a multivariable public-key cryptosystem
One group of quadratic polynomial, its difference
Be defined as
This is one group of function about x.Key is to utilize the concealed structure in the difference to attack the multivariable public-key cryptosystem.If actual multivariable public-key cryptosystem selected in this programme can be resisted differential attack, then the signature of the ring among the present invention also can be resisted differential attack.
Know by above proof, if our selected multivariable public-key cryptosystem existing be safe under MPKC is attacked, ring signature then of the present invention existing also be safe under MPKC is attacked.
Embodiment
Anonymity ring signature scheme step 1. generation system parameter based on multivariable public key cryptography TTS (20,28) system
1) k=GF (q)=GF (2 is set
8) be the finite field that is characterized as p=2;
2) make that m=20 is the number of equation in the multivariable equation group, n=28 is the number of variable;
3) select H:{0,1}
*→ k
mBe the unidirectional irreversible hash function of the anti-collision of cryptography safety,
System parameters be (k, q, p, l, m, n, H).
Step 2. key generates
1) supposes in the ring t user arranged, be made as U={u
0, u
1..., u
T-1;
2) according to the multivariable public-key cryptosystem, each user u
i(0≤i≤t-1) selection F is from k
nTo k
mBut inverse mapping, F is the mappings of following central authorities
y
17=x
17+p
17,1x
1x
6+p
17,2x
2x
5+p
17,3x
3x
4+p
17,4x
9x
16+p
17,5x
10x
15+p
17,6x
11x
14+p
17,7x
12x
13;y
18=x
18+p
18,1x
2x
7+p
18,2x
3x
6+p
18,3x
4x
5+p
18,4x
10x
17+p
18,5x
11x
16+p
18,6x
12x
15+p
18,7x
13x
14;
The F here is called as central authorities' mapping of TTS (20,28);
3) each user u
i(0≤i≤t-1) selects wherein L
1iBe from k
mTo k
mA reversible affine transformation of selecting at random,
L
1i(x
1,…,x
m)=M
1i·(x
1,…,x
m)
T+a
1i,
M wherein
1iBe the invertible matrix of a m * m on the finite field k, a
1iThe column vector of m * 1 on the finite field k;
4) each user u
i(0≤i≤t-1) selects L
2iBe from k
nTo k
nA reversible affine transformation of selecting at random
L
2i(x
1,…,x
n)=M
2i·(x
1,…,x
n)
T+a
2i,
M wherein
2iBe the invertible matrix of a n * n on the finite field k, a
2iThe column vector of n * 1 on the finite field k, a
2iChoose feasible
There is not constant component;
5) each user u
i(0≤i≤t-1) announces its PKI
Wherein each
All be k[x
1..., x
n] in multinomial;
6) each user u
i(its private key SK that maintains secrecy of 0≤i≤t-1)
i={ L
1i, F
i, L
2i;
7) public key sets of t user in the ring is designated as
Step 3. ring signature generates
If suppose member u
π(0≤π≤t-1) represents all member U={u in the ring members
0, u
1..., u
T-1Message M is signed, the user's of the t in the ring public key sets is designated as
u
πPKI be
Private key is SK
π={ L
1 π, F
π, L
2 π.Signer u
πThe step of ring signature is as follows:
1) for i=0,1 ..., t-1 and i ≠ π, picked at random r
i∈ k
n, calculate
If R
iIn have identically, then reselect r
i
2) calculate
h=H(M||L);
3) calculate
If R
πAnd R
iIdentical, then reselect r;
4) calculate
Concrete process is as follows:
At first calculate
Calculate a possible x=F then
-1(y) ∈ k
nAs follows:
A) assigned at random x
1..., x
7∈ k attempts finding the solution x
8..., x
16Utilize preceding 9 equations.Because the determinant of this system of linear equations (to x arbitrarily
2X
7) be one about x
1Number of times is 9 multinomial, x
1There are 9/256ths kinds of selections to make first system degradation at most.Do not separate if having, again assigned at random x
1..., x
7∈ k finds x up to us
8..., x
16One separate;
B) the continuous x that finds the solution
17And x
18, use to meet following two equation (x
17And x
18);
C) assign an x at random
0, attempt from last 9 equation solution x
19..., x
27Do not separate if having, again selection x at random
0Separate x up to one
19..., x
27Found;
D) the above-mentioned institute of note tries to achieve and separates (the x into x=
0, x
1..., x
27)=F
-1(y) ∈ k
n, calculate
5) output message M is about ring
Ring signature sigma=(r
0, r
1... r
T-1).
The checking of step 4 ring signature
Given ring
The signature sigma about message M=(r
0, r
1... r
T-1), any verifier can the certifying signature correctness, by checking:
Whether set up.If equation is set up, then accept the ring signature, otherwise refuse this ring signature.
Method of the present invention provides the number of rings word signature of electronic document, can be used for protecting the integrality of electronic document in issue, storage or transmission, the safeguard protection of authenticity; Simultaneously; can protect the anonymity of signer again; do not expose with the information that guarantees the signature user; under the situation of this signature by checking; make certain member's signature in the ring that the verifier of signature can be sure of that this signature is made up of a plurality of users; but the verifier can not confirm this signature on earth by which member's signature, and the probability of each member's signature equates.
The present invention is directed to the appearance of quantum computer, the conventional cipher system is on the hazard, and utilizes the advantage based on multivariable public key cryptography safety under quantum calculation, and solving existing ring signature system will no longer safe defective under quantum calculation.The ring signature scheme based on the multivariable public-key cryptosystem of invention satisfies the unconditional anonymity and the unforgeable of signer, is better than the conventional cipher system on efficient.