Digital signature method based on identity

A digital signature and identity technology, applied in the direction of user identity/authority verification, etc., can solve problems affecting system operation efficiency, high calculation cost of verification equations, CDH difficult problem assumptions, etc.

Inactive Publication Date: 2009-10-21
HOHAI UNIV
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] 2. CDH (computational Diffie-Hellman) difficult problem assumption
[0029] However, this scheme has a very big disadvantage: when the verifier verifies the signature, the calculation cost of the verification equation is very high, and there are

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method based on identity
  • Digital signature method based on identity
  • Digital signature method based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The technical solution of the present invention will be further specifically described below in conjunction with the accompanying drawings.

[0060] The present invention includes the steps of: generating system parameters for signing and verifying the signature; generating the user's private key according to the user's identity information and the system parameters; using the obtained private key (including the verification process of the private key) to The message is signed; the verifier verifies the signature of the message according to the system public parameters and the identity of the signer.

[0061] According to the system module flow chart, namely figure 2 , provide the concrete steps of the present invention through following each module to operate successively:

[0062] System parameter generation module (Setup):

[0063] PKG operation system parameter generation algorithm: first, the system selects a large prime number p, p factorial method cyclic group...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a digital signature method based on identity. The method comprises the following steps: a system parameter is generated which is used for signature and signature verification; a private key of a user is generated according to identity information of the user and the system parameter; the private key is used for signature on information; signature verification is carried on the signature on information according to the system public parameter and the identity of a signer. For some calculations of verification equation arithmetic in signature arithmetic is determined as constants by system parameter, precomputation is carried out when system parameter is generated, which greatly reduces calculation cost of verification equation; When signatures is carried out on the same user with different information, special treatment (detailed specification is in the text) is carried out to greatly lower communication cost. After such treatment, operation efficiency of the system is improved greatly on the basis of not lowering safety.

Description

technical field [0001] The invention relates to a digital signature technology, in particular, an identity-based digital signature method is designed. Background technique [0002] In the traditional public key cryptography system, the public key certificate infrastructure PKI (Public Key Infrastructure) is mainly used to verify the correlation between the public key and the identity of the user. The association between the user identity and the public key is realized through the public key certificate issued by the certification authority (Certifying Authority: CA). The certificate management process in this way requires high computing overhead and storage overhead. [0003] The idea of ​​identity-based cryptosystem was first proposed by Shamir in 1984. In this system, the public key is the user's identity information (or directly derived from the user's identity information), such as the IP address of a host in the network or the email address of a user. PKG is directly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 李继国姜年进
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products