A lightweight digital signature method based on the hyperlogarithm problem

A digital signature, lightweight technology, applied to the public key of secure communication, user identity/authority verification, etc., can solve the problem of public key system

Inactive Publication Date: 2016-03-09
数字兵符(福州)科技有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At the same time, due to various reasons, the FAPKC3 and REESSE1 public key systems are not really used in practice

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A lightweight digital signature method based on the hyperlogarithm problem
  • A lightweight digital signature method based on the hyperlogarithm problem
  • A lightweight digital signature method based on the hyperlogarithm problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0127] The characteristic of the lightweight digital signature method based on the superlogarithmic problem is that it allows each user to obtain two keys, one key can only be privately owned for digital signature, and one key can be made public for identity verification . In this way, verification is not restricted by time, place and confidentiality policy, which becomes very convenient. When the correspondent is agreed to transmit information on the Internet, the sender uses his own private key to sign the message, and the receiver uses the sender's public key to verify it after receiving the message and signature code.

[0128] Each user can obtain the corresponding key certificate from the designated CA digital certificate center. The CA center is an organization that registers and manages users and generates, distributes and controls keys. It uses the key generation component to output a pair of public key and private key of the subject user, and only outputs the public...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a lightweight digital signature method based on a translog problem, belonging to the fields of cryptographic technology and computer technology. The method comprises three parts, i.e. secret key generation, digital signature and authentication. A sending user in the method has two secret keys, i.e. a private key and a public key, wherein the private key cannot be deduced from the public key; the private key of the sending part is used to generate a name guide of a message; and the public key of the sending part is used for a receiving part to verify the name guide of the corresponding message. With the method provided by the invention, the attack of the existing analysis method can be effectively resisted. The method has the advantages of high calculation speed and the like, the modular length is less than 96 bits, and the technology can be published; and the method can be applied to the signature and the verification of any message in mobiles, computers and communication networks, also can be used for identity authentication and content confirmation in electronic banking, e-commerce and e-government affairs, and can be used for the anti-counterfeiting of bills, certificates and high order goods.

Description

(1) Technical field [0001] The public key digital signature method (digital signature method or digital signature scheme for short) belongs to the field of cryptography and computer technology, and is one of the core technologies of electronic financial security, e-commerce security, e-government security, information security, identity authentication and trusted computing. one. (2) Background technology [0002] Digital signature technology is an extension of cryptographic technology. The development of cryptography has gone through three stages: classical cryptography, symmetric cryptography and public key cryptography. In 1976, American scholars Diffie and Hellman proposed the idea of ​​public key cryptography, marking the advent of public key cryptography. At present, the commonly used public key cryptography has schemes such as RSA and ElGamal (see "Applied Cryptography", written by Bruce Schneier in the United States, translated by Wu Shizhong, Zhu Shixiong, etc., Me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
Inventor 苏盛辉吕述望蔡吉人
Owner 数字兵符(福州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products