Digital signature method based on multivariable array problem and super logarithm problem

A digital signature and super-logarithmic technology, which is applied to the public key of secure communication, user identity/authority verification, etc., can solve the problems of large security parameters, reduced signature efficiency, waste of storage space, etc.

Inactive Publication Date: 2010-06-23
苏盛辉 +3
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, with the improvement of computer computing speed, their security parameters have to become larger and larger, which greatly wastes storage space and reduces signature efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method based on multivariable array problem and super logarithm problem
  • Digital signature method based on multivariable array problem and super logarithm problem
  • Digital signature method based on multivariable array problem and super logarithm problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0108] The characteristic of the public-key digital signature method based on the multivariate permutation problem and the super-logarithm problem is that it allows each user to obtain two keys, one key can be made public, and one key can only be privately owned. In this way, there is no need to worry about the secret key being leaked during the transfer process. When it is agreed that the communication parties transmit information on the Internet, the sender uses his own private key to digitally sign the file or message, and the receiver uses the sender's public key to verify it after receiving the file and signature code.

[0109] Each user can obtain two keys from the designated CA digital certificate center. The CA center is an institution that registers users, generates, distributes and manages keys. Its main function is to use the key generation method to generate a pair of public key and private key of the user.

[0110]This digital signature method can be implemented...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A digital signature method based on multivariable array problem and super logarithm problem belongs to encryption and computer technical field; the method includes three parts, namely key generation, digital signature and authentication; the user has two keys, namely a private key and a public key, and the private key cannot be derived by the public key; the private key of the sender is used for generating a file or the signature code of a message, the public key of the sender is used by the receiver to verify the corresponding file or the signature code of the message; the method can effectively defend the attacks employing analysis approaches, has the characteristics of small modulus, high computation speed and public technology, is applicable to the signature and verification of any file and data of mobile phones, computers and communication networks, and is also applicable to the authentication and content acknowledgment of e-government affairs and e-business.

Description

(1) Technical field [0001] Public key digital signature method (referred to as public key digital signature method or signature method) belongs to the field of cryptography and computer technology, and is one of the core technologies of information security. (2) Background technology [0002] The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1976, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. At present, the commonly used digital signature technologies include RSA scheme, Rabin scheme and ElGamal scheme (see "Applied Cryptography", written by Bruce Schneier in the United States, translated by Wu Shizhong, Zhu Shixiong, etc., Mechanical Industry Press, January 2000, No. 334-342 Page). In order to improve security, the ElGamal scheme is often implemented on the elliptic curve. At this time, it is cal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 苏盛辉吕述望蔡吉人
Owner 苏盛辉
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products