Signature verification method based on Gaussian sampling

A technology for signature verification and signed message, applied in the field of information security, which can solve the problems of low execution efficiency, short running time and occupying storage space, etc.

Active Publication Date: 2014-09-10
XIDIAN UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to solve the problem of low execution efficiency when the modulus is not a power of 2 in the original Gaussian sampling algorithm, and propose a Gaussian sampling-based signature verification method with high execution efficiency, short running time, and small storage space occupation. To reduce the time overhead and storage space consumption of signature generation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature verification method based on Gaussian sampling
  • Signature verification method based on Gaussian sampling
  • Signature verification method based on Gaussian sampling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with the accompanying drawings.

[0029] like figure 1 As shown, the signer S in the scenario signs the message M that needs to be signed, and the verifier V verifies the validity of the signature.

[0030] refer to figure 2 , the invention is figure 1 The steps to sign in the scene are as follows:

[0031] Step 1, the signer S selects the parameters and uses the key generation algorithm to generate the signature key sk and the verification key vk.

[0032] (1a) From the signature message space {0,1} l Select the required signature message M, where l is the length of the signature message, satisfying the inequality l≤(p-1)? n, where p is the smallest prime factor of q, q is a modulus and not a power of 2, and n is a security parameter;

[0033] (1b) Select generator matrix make each element subject to Uniform distribution on , choose the trapdoor matrix Make each element of the trapdoor ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a signature verification method based on Gaussian sampling. The problem that an existing signature technology based on Gaussian sampling is low in execution efficiency when the modulus is not the power of two is mainly solved. The signature verification method based on Gaussian sampling comprises the steps that (1) parameters are selected, a key production algorithm is used for generating a signature key sk and a verification key vk; (2) the signature key sk is used for generating a trap door matrix R' of an expanding matrix AM; (3) the trap door matrix R' of the expanding matrix AM is used for signing a selected signature message M to obtain the signature sign; (4) the verification key vk is used for verifying the validity of the signature sign. According to the signature verification method, the calculated amount of the signature verification method based on Gaussian sampling is greatly reduced through an aspherical basic Gaussian sampling algorithm, and the signature verification method can be used for generation of signature in public key codes based on grids and personal private keys in encryption based on identities.

Description

technical field [0001] The invention belongs to the technical field of information security, and further relates to a signature verification method, which can be used for signature in lattice-based public key cryptography and generation of personal private key in identity-based encryption. Background technique [0002] Human beings are about to enter the era of quantum information. Lattice-based public key cryptography, as a typical representative of post-quantum cryptography, that is, cryptography that resists quantum computing attacks, occupies an important position in the field of cryptography. Lattice-based public-key cryptography has special advantages: (1) Clear security proof, that is, good protocol properties. Lattice-hard problems have the property of worst-case to average-case reduction, which guarantees that solving a lattice-hard random instance is equivalent to solving the worst-case lattice-hard problem, a property not shared by other cryptographic archetypes. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 胡予濮贾惠文詹海峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products