Digital signature method based on non-homogeneous ultra-increasing sequence

A digital signature, non-uniform technology, applied to the public key and key distribution of secure communication, which can solve problems such as weakening of security strength

Inactive Publication Date: 2009-02-18
苏盛辉 +2
View PDF1 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the increase of computer computing speed, their sec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method based on non-homogeneous ultra-increasing sequence
  • Digital signature method based on non-homogeneous ultra-increasing sequence
  • Digital signature method based on non-homogeneous ultra-increasing sequence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0100] The characteristic of the public key digital signature method based on leverage function and super-incremental sequence is that it allows each user to obtain two keys, one key can be made public, and one key can only be privately owned. In this way, there is no need to worry about the secret key being leaked during the transfer process. When it is agreed that the communicator transmits information on the Internet, the sender uses his own private key to digitally sign the file or message, and the receiver uses the sender's public key to verify it after receiving the file and signature code.

[0101] Each user can obtain two keys from the designated CA (Certificate Authentication) certification center. CA certification center is an organization that registers users, generates, distributes and manages keys. It uses the key generation method in Section 3.2.2 to generate the user's public key and private key.

[0102] This digital signature method can be realized with a lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the cryptography and the computer science. A public key digital signature method is worked out based on a non-uniform super increasing sequence and super logarithm puzzles comprising a key generation part, a digital signature part and an authentication part; the user has two keys, that is a private key and a public key, and the private key is not calculated from the public key; the private key is used for generating a signature code of a file or a message, the public key is used for authenticating the signature code of the file or the message. The method of the invention can effectively defend against the attack of the prior analysis means and be suitable for the signature and the authentication of any files in the computer and communication network, the personal identification and the content confirmation in the e-government and the e-commerce and the authentication and the anti-counterfeiting of the finance bills and relative certificates in the real world.

Description

(1) Technical field [0001] Public key digital signature method (referred to as public key digital signature method or digital signature method) belongs to the field of cryptography and computer technology, and is one of the core technologies of information security. (2) Background technology [0002] The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1978, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. At present, the commonly used digital signature technologies include RSA scheme, Rabin scheme and ElGamal scheme (see "Applied Cryptography", written by Bruce Schneier in the United States, translated by Wu Shizhong, Zhu Shixiong, etc., Mechanical Industry Press, January 2000, No. 334-342 Page). In order to improve security, the ElGamal scheme is often implemented on the elliptic curve. At this time, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08
Inventor 苏盛辉李健吕述望
Owner 苏盛辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products