This paper constructs a digital fingerprint system based on the difficulty of the discrete logarithm problem. Since the system uses the encryption and decryption algorithm in the symmetric cryptographic system for the copies to be issued, and the key used by the user to decrypt the data group is the solution vector of the linear equation system given by the system, it has good implementation efficiency. In addition, this scheme introduces a completely trusted third-party fingerprint distribution center. The user's decryption key and the digital fingerprint embedded in the copy are provided by a trusted third party. The publisher and any other user cannot frame an innocent user, which increases the user's security.
1 Basic scheme description
The entities involved in the protocol are: issuer (M), user (B), fingerprint distribution center (FIC), judge (J). The basic protocols are: initialization protocol, fingerprint copy generation (i.e. fingerprint embedding) protocol, tracking protocol, and trial protocol. The cryptographic primitives used are: symmetric cryptographic system and digital signature system.
2.2 Security Analysis
(1) Security of Issuer M
The encrypted data group with copy is encrypted by M using B's public key, and is sent to B after being signed. The third-party fingerprint distribution center cannot obtain the copy with fingerprint, thus avoiding the illegal use of the copy by the third party and reducing the risk of the publisher.
(2) Security of User B
B's decryption key is invisible to M and other users (i.e., the user's decryption key is unknown). The system keeps the linear equations confidential, and M and other users cannot obtain the solution vector from other means. The digital fingerprint contains (gi mod p), where i is a positive integer randomly selected and saved by the user, and p is only disclosed to the fingerprint distribution center. Therefore, M and other users cannot forge digital fingerprints to frame innocent users.
(3) Security of third-party fingerprint distribution center
This solution is based on the complete trust of the third-party fingerprint distribution center. The fingerprint generation required p and decryption key are open to the fingerprint distribution center, and only the copy with fingerprint is kept confidential to the fingerprint distribution center. If the third-party fingerprint distribution center obtains the copy with fingerprint and uses it illegally, the issuer and the user will be at great risk. Therefore, the third-party fingerprint distribution center must be completely trustworthy.
This paper constructs a digital fingerprint system based on the difficulty of discrete logarithm problem. Since the system mainly adopts the encryption and decryption algorithm in the symmetric cryptographic system, and the symmetric key is randomly selected by the publisher; the key used by the user to decrypt the data group, that is, the solution vector of the linear equation system randomly generated by the system, is easy to calculate and has good implementation efficiency. The digital fingerprint in the copy is determined by the user and the trusted third-party fingerprint distribution center, so that the publisher and other users cannot frame innocent users, which increases the security of users. It is worth noting that this scheme requires that the third-party fingerprint distribution center must be completely trusted, otherwise both the publisher and the user will be at risk.
Previous article:A congestion avoidance mechanism for WSN nodes based on information entropy
Next article:Distributed Control System (DCS) FAQ
- Popular Resources
- Popular amplifiers
- Molex leverages SAP solutions to drive smart supply chain collaboration
- Pickering Launches New Future-Proof PXIe Single-Slot Controller for High-Performance Test and Measurement Applications
- CGD and Qorvo to jointly revolutionize motor control solutions
- Advanced gameplay, Harting takes your PCB board connection to a new level!
- Nidec Intelligent Motion is the first to launch an electric clutch ECU for two-wheeled vehicles
- Bosch and Tsinghua University renew cooperation agreement on artificial intelligence research to jointly promote the development of artificial intelligence in the industrial field
- GigaDevice unveils new MCU products, deeply unlocking industrial application scenarios with diversified products and solutions
- Advantech: Investing in Edge AI Innovation to Drive an Intelligent Future
- CGD and QORVO will revolutionize motor control solutions
- Innolux's intelligent steer-by-wire solution makes cars smarter and safer
- 8051 MCU - Parity Check
- How to efficiently balance the sensitivity of tactile sensing interfaces
- What should I do if the servo motor shakes? What causes the servo motor to shake quickly?
- 【Brushless Motor】Analysis of three-phase BLDC motor and sharing of two popular development boards
- Midea Industrial Technology's subsidiaries Clou Electronics and Hekang New Energy jointly appeared at the Munich Battery Energy Storage Exhibition and Solar Energy Exhibition
- Guoxin Sichen | Application of ferroelectric memory PB85RS2MC in power battery management, with a capacity of 2M
- Analysis of common faults of frequency converter
- In a head-on competition with Qualcomm, what kind of cockpit products has Intel come up with?
- Dalian Rongke's all-vanadium liquid flow battery energy storage equipment industrialization project has entered the sprint stage before production
- Allegro MicroSystems Introduces Advanced Magnetic and Inductive Position Sensing Solutions at Electronica 2024
- Car key in the left hand, liveness detection radar in the right hand, UWB is imperative for cars!
- After a decade of rapid development, domestic CIS has entered the market
- Aegis Dagger Battery + Thor EM-i Super Hybrid, Geely New Energy has thrown out two "king bombs"
- A brief discussion on functional safety - fault, error, and failure
- In the smart car 2.0 cycle, these core industry chains are facing major opportunities!
- The United States and Japan are developing new batteries. CATL faces challenges? How should China's new energy battery industry respond?
- Murata launches high-precision 6-axis inertial sensor for automobiles
- Ford patents pre-charge alarm to help save costs and respond to emergencies
- New real-time microcontroller system from Texas Instruments enables smarter processing in automotive and industrial applications
- NeoPixel Clock Using ESP8266
- ESP32-S2-Saola-1 simulates mouse circle drawing
- Please help me design a delay circuit
- EEWORLD University Hall----Live Replay: ST Wireless Connection Solution for Both Near and Far
- Discussion: 6G is on the way, what about 5G?
- 【Sipeed LicheeRV 86 Panel Review】VI. Configuration, kernel trimming, results...
- RF Op Amp
- 6 common alarm programs in single chip microcomputer
- Function of a component
- ESP32C3 development board burning micropython firmware