Discrete logarithm-based directed transitive signature method

A discrete logarithm and edge signature technology, applied in the field of information security, can solve problems such as low efficiency

Inactive Publication Date: 2016-04-27
HOHAI UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, the DTS-G scheme is not very efficient for complex directed graphs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Discrete logarithm-based directed transitive signature method
  • Discrete logarithm-based directed transitive signature method
  • Discrete logarithm-based directed transitive signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The discrete logarithm-based directed transfer signature method proposed by the present invention will be described in detail below in conjunction with the accompanying drawings:

[0049] First, a simple flow of the MR02 scheme is given.

[0050] Such as figure 1 As shown, the directed transitive signature scheme based on discrete logarithm includes system setting, establishment of new nodes, edge signature, edge signature verification, and composite edge signature.

[0051] 1. System settings:

[0052] The signer chooses a standard digital signature scheme for signing nodes, and a pair of public / private key pairs, and publishes the public key. To sign an edge, choose two large prime numbers p and q, satisfying q∣(p-1); choose two generators g, It is computationally infeasible for others to seek h with respect to the discrete logarithm of base g, where Represents the set {1,2,...,p-2,p-1}, where p is a large prime number.

[0053] 2. Create a new node:

[0054] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for transmitting signatures in a directed mode based on discrete logarithms. The method comprises the processes of system setting, node adding, node removing, side signature arithmetic, side signature synthesis, side signature verification, Hash arithmetic and online task allocating. A Hash arithmetic unit is used for returning secret tags of nodes to a node adding machine after conducting the Hash arithmetic on the secret tags of the nodes. A node removing machine is used for removing the directional nodes and making nodes separate from a graph. An online task allocator is used for processing the signatures, or transmitting massages or sending requests. A side signature arithmetic unit, a side signature synthesizer, and a side signature verifier are used for processing the signatures on directional sides in the graph, conducting signature synthesis of non-adjacent sides, and verifying correctness of the side signatures respectively. According to the method for transmitting the signatures in the directed mode based on the discrete logarithms, directional state functions are constructed through node secret values, directional relationships among the nodes of the complex directed graph are systematically and easily marked, therefore the method for transmitting the signatures in the directed mode aiming at the complex directed graph is successfully constructed, and the problem of exposure is effectively solved.

Description

technical field [0001] The invention belongs to the technical field of information security, and specifically refers to a directed transfer signature method based on discrete logarithms. Background technique [0002] Digital signature technology is developing at an astonishing speed, and signature schemes used in different fields emerge in endlessly. However, general signature schemes are not ideal for some special cases. For example, in the military command system, when the superior A issues an order to the subordinate B, in order to ensure the legitimacy of the order, A must prove to the subordinate B that it has the right to issue an order to it, that is, A needs to provide a signature of an authority T ( For example, the signature of the headquarters), which is used to prove that A is B's superior. There are two approaches to this problem: one is that T issues a signature for each member pair that has a "command" relationship. But this has an obvious disadvantage, tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 李继国张亦辰汪鑫蒋勇钱惠玲滕美林蒋鑫郭宇燕
Owner HOHAI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products