Certificateless signature method based on elliptic curve discrete logarithm problem

A discrete logarithm problem and elliptic curve technology, applied in the field of information security, can solve the problems of time-consuming bilinear pairing operations and the need for bilinear pairing operations, etc., and achieve the effects of efficient algorithms, short signature lengths, and high computational efficiency

Inactive Publication Date: 2013-04-03
SUZHOU INST FOR ADVANCED STUDY USTC
View PDF3 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although some secure certificateless signature algorithms have been proposed, most of these algorithms require bilinear pairing operations
Because the bilinear pai...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Certificateless signature method based on elliptic curve discrete logarithm problem
  • Certificateless signature method based on elliptic curve discrete logarithm problem
  • Certificateless signature method based on elliptic curve discrete logarithm problem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The above solution will be further described below in conjunction with specific embodiments. It should be understood that these examples are used to illustrate the present invention and not to limit the scope of the present invention. The implementation conditions used in the examples can be further adjusted according to the conditions of specific manufacturers, and the implementation conditions not indicated are usually the conditions in routine experiments.

[0019] Embodiment Implementation of certificateless signature method based on elliptic curve discrete logarithm problem

[0020] The non-certificate signature method based on the elliptic curve discrete logarithm problem adopted in this embodiment includes the following steps:

[0021] (1) The Key Generation Center (KGC) selects an elliptic curve G with order q and the master key and three secure hash functions H 1 : { 0,1 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient certificateless signature method based on an elliptic curve discrete logarithm problem. The method has the advantages of a common certificateless signature algorithm, namely a certificate management problem of a traditional public key system and a key escrow problem in an identity password system are eliminated; and the algorithm is simple in calculation process, and time-consuming bilinear operation does not need to use. The algorithm can be efficiently applied to fields such as e-commerce and the like of requiring the electronic signature.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a certificateless signature method based on an elliptic curve discrete logarithm problem. Background technique [0002] At present, network applications such as e-commerce are becoming more and more popular, which has greatly changed people's way of life. Although these applications have brought great convenience to people, their inherent security threats require us to seriously address them, otherwise these applications will only be passing clouds. [0003] Among all the security issues that need to be considered, the integrity of the data sent by the user and the authentication of the authenticity of the user's identity are one of the most basic issues. The solution to this problem requires the use of secure digital signature algorithms. Digital signature algorithms are generally implemented using public key cryptography. Due to the problems of certi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30
Inventor 黄刘生田苗苗杨威
Owner SUZHOU INST FOR ADVANCED STUDY USTC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products