Threshold digital signature method and system having forward security

A digital signature and forward security technology, applied in the field of information security, can solve the problems of long signature key and verification key, invalid signature, difficult calculation, etc.

Inactive Publication Date: 2009-05-06
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The concept of forward security signature was introduced by Anderson in 1997, which solves some defects of common digital signatures: once the secret key is lost (or stolen), all previous signatures generated by this key become invalid
In 2001, Abdalla and Miner proposed a forward-safe threshold digital signature, but the signature key and verification key of the scheme are relatively long
) However, if the square root of U is not known, then is difficult to calculate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Threshold digital signature method and system having forward security
  • Threshold digital signature method and system having forward security
  • Threshold digital signature method and system having forward security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] In our forward-secure threshold digital signature system, all participants including n signature servers (participants in the scheme) use P i It means that 1≤i≤n, they are all located on a broadcast network, and there is a secure channel between them for confidential communication. Such a channel can be implemented on the broadcast channel using encryption technology, and the encryption algorithm used should be the previous one. Toward a secure public key encryption algorithm. In addition, the system also includes a trusted distributor. The signature server and distributor can carry out broadcast communication or point-to-point encrypted communication. Any one of the signature servers can accept the signature request, initiate and organize a signature, and finally send the generated signature to the signature requester. Finally, we require the system to be synchronized, and they can send their information synchronously at a certain stage of the agreement.

[0104] The content...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information safety, which relates to a signature problem of numerical information, in particular to a numerical information method and a system thereof which can increase the difficulty of stealing a signature key for opponents and can lighten the influence of signature key leakage. The signature method adds a threshold mechanism and a sub-secret replacing mechanism through applying a Shamir secret sharing technology and a multiaspect security computing technology. The threshold mechanism enhances the security of the signature key, and can play the action of right dispersedness. The sub-secret replacing mechanism realizes the front safety of the signature key, namely even if obtaining the signature key of the current time bucket, the opponents also can not forge a legalized signature belonging to the previous time bucket through the key so that the validity of original signatures is protected, and the loss of key leakage is reduced. In addition, the signature method also comprises a member adding mechanism which enhances the security and the application range of the scheme.

Description

Technical field [0001] The present invention belongs to the field of information security technology, and relates to the problem of signing digital information. More specifically, it relates to a digital signature method and system that can increase the difficulty of an adversary in stealing a signature key and can reduce the impact of signature key leakage. Background technique [0002] The concept of forward security signature was introduced by Anderson in 1997 to solve some of the shortcomings of common digital signatures: once the secret key is lost (or stolen), all the signatures previously generated by this key become invalid. In order to reduce such losses, Anderson proposed to divide the validity period of the key into periods. At the end of each period, the signer obtains a new secret key for the next period from the secret key of the current period in a one-way mode, and Safely delete secret keys that are no longer used. The public key remains unchanged throughout the l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 许春香张辉
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products