Certificateless signature algorithm for user identity authentication in network environment

A technology for user identity authentication and network environment, applied in the field of certificateless signature, it can solve the problem of low execution efficiency of secure certificateless signature algorithm, and achieve the effect of easy implementation, high execution efficiency and high security.

Inactive Publication Date: 2013-03-20
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a certificateless signature method for user identity authentication in a network environment, which solves the problem of low execution efficiency of the existing secure certificateless signature algorithm

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless signature algorithm for user identity authentication in network environment
  • Certificateless signature algorithm for user identity authentication in network environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0025] In this embodiment, the non-certificate signature method is performed according to the following steps:

[0026] (1) Assume two cyclic groups G of order q 1 and G 2 , a bilinear pair e:G 1 ×G 1 →G 2 and the master key of the Key Generation Center (KGC) and two secure hash functions Let P be G 1 generator, Q=sP is the public key of KGC, g=e(P, p), then the key generation center (KGC) public parameter PP=(e, H 1 ,H 2 , Q, g); In this embodiment, the P-192 elliptic curve recommended by the National Institute of Standards and Technology is selected, and the corresponding bilinear pair e and generator P are determined by it. Hash function H 1 ,H 2 Select SHA-2, master key s select A random number in .

[0027] (2) The user enters the master key and the user's identity ID ∈ {0,1} * , KGC randomly selects and calculate R ID = r ID P and z ID = r ID +H 1 (ID, R ID )smod; finally, KGC will (R ID ,z ID ) is sent to the user whose identity is ID; ID∈{0,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient certificateless signature algorithm which solves the problem of certificate management in a traditional public key cryptosystem and the problem of key escrow based on an identity password system, and safety is guaranteed in a certificateless environment. The certificateless signature is simple and efficient in computational process and high in, specific hush function does not need, and the length of an output signature is also short. The certificateless signature algorithm has high safety and execution efficiency, and can be effectively used in a signature environment which has a high requirement for safety.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a certificateless signature method for user identity authentication in a network environment. Background technique [0002] In the network environment, we need to confirm the integrity of the data sent by the user and the identity of the user, which requires a secure digital signature algorithm. The digital signature algorithm is realized by using the public key cryptosystem. Due to the problems of certificate management and verification in the traditional public key cryptosystem, and the key escrow problem in the identity-based public key cryptosystem, many current digital signature schemes are based on the certificateless public key cryptosystem. In the certificateless public key cryptosystem, the user's public key does not need to be authenticated, and its private key is jointly determined by the Key Generation Center (KGC) and the user, thus avoiding...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 黄刘生田苗苗杨威张琛
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products