Non-forgeable knowledge proof and message signature authentication method based on bilinear pairings
A message signature and knowledge proof technology, applied in the field of cryptography, can solve the problems of not being able to provide unforgeable security, not being able to provide identity authentication functions, not being able to prove the security of signatures, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment approach
[0155] given in are public, e A Is a Efficient bilinear pairmaps (note that The elements in represent more than is shorter, so the signature obtained below is correspondingly shorter). based on Efficient bilinear pairwise mappings can be obtained accordingly. and It can be either the same cyclic group or different groups ( and Different takes precedence). like and same, and Can be either equal or unequal. Record m as the information to be signed. The identity of the signer is
Embodiment approach -1
[0157] Public Key: The signer's public key consists of: The signer's public key can also contain values that the verifier can compute beforehand: and / or and / or δ, where is x 1 The x-axis coordinate value, or δ is from A randomly chosen constant c in , or h δ is an output belonging to the hash function, yes A subset of. In some interactive application environments, δ can be determined by interacting with the user Interactive other users generate and send to
[0158] private key: x 1 , where x 1 From randomly selected from.
[0159] Signature: the signer calculates where H 1 is a domain of {0, 1} * output belongs to a hash function for . τ A as a signature on message m. Note: The computational complexity of the signer is equivalent to an exponential operation. In some applications, the identity of the signer can also be as H 1 One of the input parameters. if x 1 h 1 (X 1 , m)+δ=0, let or order where r is a random number and (...
Embodiment approach -2
[0163] Public Key: The signer's public key consists of: and The signer's public key can also contain values that the verifier can compute beforehand.
[0164] private key: x 1 , x 2 , where x 1 , x 2 From randomly selected from.
[0165] Signature: the signer calculates where H 1 is an output belonging to a hash function for . δ is 0 (δ=0 is a preferred implementation), or δ is a A randomly chosen constant in , or δ is X 1 , X 2 One of the x-axis coordinate values for N A modulo of , or where H δ is an output belonging to the hash function, yes A subset of. In some interactive application environments, δ can be determined by interacting with the user Interactive other users generate and send to τ A as a signature on message m. In some applications, the identity of the signer can also be as H 1 One of the input parameters.
[0166] Verification: get (m, τ A ), the signature verifier calculates and verifies whether The verification o...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



