Realizing method of general-purpose digital signing scheme

A digital signature and implementation method technology, applied in the field of information security, can solve problems such as unsatisfactory digital signature schemes and difficult implementation of threshold digital signature schemes, and achieve the effects of saving communication bandwidth, reducing signature length, and good scalability

Active Publication Date: 2008-08-27
GUANGZHOU XINRUI NETWORK TECH
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The digital signature scheme of Chen et al. uses the inverse operation of the private key in the digital signature generation process, and it is difficult to implement the threshold digital signature scheme
[0009] As can be seen from the above, the published digital signature schemes in the prior art are not ideal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realizing method of general-purpose digital signing scheme
  • Realizing method of general-purpose digital signing scheme
  • Realizing method of general-purpose digital signing scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] Taking the smart card as an example to illustrate the specific implementation of the digital signature scheme when n=1 and the safe storage area is 100 data pairs in the present invention.

[0041] 1. For the smart card implementing the digital signature scheme in the present invention, it is necessary to store the following public information {E, p, q, P, G, f, H, (JG, JS, JV), (VK, Y, h, σ) } and the following secret information {(SK, x, k * ), (k i , k i P), i ∈ {1...100}}

[0042] Among them, the public information (JG, JS, JV) is any provably secure digital signature algorithm, here selected as the Boneh-Lynn-Shacham short signature algorithm, the signature length is 160 bits, and the parameters of the signature algorithm (E, p, q, k, P, G) are suggested as follows:

[0043] E: y 2 =x 3 +3

[0044] Q=p=1461501624496790265145448589920785493717258890819

[0045] q=1461501624496790265145447380994971188499300027613

[0046] MOV degree k=12

[0047] P=(x,y)

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for realizing a universal digital signature scheme generating and verifying the digital content, comprising the following procedures: setting system parameters, generating a private key of the user signature and a public verifying key, and generating the digital signature in an off-line or on-line mode and verifying the digital signature. The invention creates a novel double-trapdoor chameleon function in a special way, so the limitation that the group inverse operation is needed when part of the data is calculated in advance in the background technique is solved, and the calculating amount is reduced; the limitation to the number of signers is removed; the problem of key leakage in the background technique of threshold digital signature scheme is solved; the calculating amount of the digital signature and verification is reduced; the signature length is shortened, and the memorizing requirement is reduced; therefore, the method has higher efficiency and better scalability.

Description

technical field [0001] The invention relates to the field of information security. In particular, the present invention relates to a digital signature generation and verification system based on any specific digital signature scheme. Background technique [0002] Digital signature is a basic information security technology, which has important applications in identity authentication, data integrity, non-repudiation, and anonymity, especially in key distribution, authentication, e-commerce, and e-government in network security communications. plays an important role in the system. Digital signature is an important tool for authentication. [0003] The generation and verification of digital signatures require the signer's signature private key and verification public key. The signer's private signing key is known only to the signer. The verification public key of the signer is public. The generation of a digital signature requires the use of the signer's signature private...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 陈晓峰田海博张方国韦宝典陈满祥
Owner GUANGZHOU XINRUI NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products