Unlock instant, AI-driven research and patent intelligence for your innovation.

Digital signature method based on strong rivest-shamir-adleman (RSA) hypothesis

A technology for digital signature and signature generation, which is applied to the public key and key distribution of secure communication, can solve the problems of multi-calculation cost, and achieve the effect of saving computing resources, low computing cost, and reducing computing cost

Inactive Publication Date: 2011-04-13
INST OF SOFTWARE - CHINESE ACAD OF SCI
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2000, Cramer and Shoup proposed a secure signature scheme under the standard model, but the scheme is based on a stronger assumption - the strong RSA assumption
The main advantage of these schemes is that they all have security proofs under the standard model. The main disadvantage is that they need to pay more computational cost compared to the RSA scheme.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method based on strong rivest-shamir-adleman (RSA) hypothesis
  • Digital signature method based on strong rivest-shamir-adleman (RSA) hypothesis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The method of the present invention will be further described below according to specific examples.

[0045] A digital signature method based on a strong RSA assumption, comprising the steps of:

[0046] 1) The signature server generates a digital signature

[0047] A. According to the security parameter k and the index length l, and the message length l m and parameter length l e , satisfy l m e , generate public key PK and private key SK based on strong RSA assumption;

[0048] B. The signature server uses the above-mentioned private key to generate a signature (υ, e, s) for the message m to be transmitted. The specific steps are as follows:

[0049] The first step is to calculate υ=b γ modn and λ=γ×e-β, where b is a random element γ∈ R [0,2 l ), β∈ R [0,2 l ) is the selected random number, randomly select e as a prime number, and the length is l e ; n is the RSA modulus.

[0050] In the second step, a message appears After that, calculate s=λ-α×m, α∈ ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital signature method based on strong rivest-shamir-adleman (RSA) hypothesis. The method comprises the following steps: 1) a signature server generates a public key (PK) and a secret key (SK) based on the strong RSA hypothesis according to the safe parameter k, index length l, message length 1cm and parameter length le (le is greater than 1m); 2) a signature (upsilon, e, s) is generated by using the secrete key aiming at the message m required to be transmitted, wherein upsilon=b gamma modn, lambda=gamma*e- beta, b is a random element, n is an RSA modulus, gamma and beta which are respectively an element of a set of R [0, 21) are random numbers, e is a random prime number with the length of le, s=lambda- alpha*m, and alpha which is an element of the set of R [0, 21) is an random number; 3) the signature (u, e, s) corresponding to the message m is transmitted to a receiving server; and 4) the receiving server verifies the signature (u, e, s), and the public key is used to judge that whether the signature is valid.

Description

technical field [0001] The invention mainly relates to a digital signature method for information security, in particular to an efficient digital signature method based on a strong RSA assumption. Background technique [0002] With the continuous development of network technology, the interaction of network information is becoming more and more frequent. Only encrypted information is far from meeting the demand, and the application of digital signatures has become more and more extensive. [0003] Digital signatures are a fundamental primitive in modern cryptography. In a signature scheme, the signer generates a key pair including a signing key and a verification key. The signing key is kept secret by the signer, and the verification key is made public to potential verifiers. For a message, the signer uses the signature function and the signing key to generate a string, which is called the signature of the message. The verifier can then use the verification function and v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/30
Inventor 喻平薛锐
Owner INST OF SOFTWARE - CHINESE ACAD OF SCI