Unlock instant, AI-driven research and patent intelligence for your innovation.

Digital signature, signature authentication device and digital signature method

A technology of digital signature and signature authentication, applied in the software field, can solve the problems of reducing the efficiency of digital signature and signature authentication, increasing the complexity of signature authentication operation, difficulty in cracking and complexity, etc. The effect of improving efficiency and ensuring safety

Active Publication Date: 2014-09-17
BEIJING UNIV OF POSTS & TELECOMM
View PDF8 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0015] The inventors of the present invention found that in the above-mentioned existing elliptic curve digital signature algorithm, according to the formula P 0 =k 0 G 0 , calculate the point P 0 The coordinates (x p0 1,y p0 1), has made k 0 Characterized by impenetrability and complexity
However, in the existing elliptic curve digital signature algorithm, since the original information is not encrypted, the attacker can directly obtain the hash value e according to the original information, and obtain s and r from the signature. Therefore, in the existing elliptic curve digital signature algorithm In the signature algorithm, the known e, r and the unobtainable unknowns k, d must be combined with very time-consuming multiplication and inversion operations, that is, s=k -1 (e+dr)mod n to prevent attackers from posing as signatures
However, although the above method ensures the security of the signature, it also increases the computational complexity of the signature and the computational complexity of the signature verification
In fact, if the elliptic curve digital signature algorithm is applied to an environment that requires relatively low computing power (such as embedded devices), there are certain restrictions on the resources occupied by signature and authentication and the speed of operation, which reduces the number of digital signatures and Efficiency of Signature Authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature, signature authentication device and digital signature method
  • Digital signature, signature authentication device and digital signature method
  • Digital signature, signature authentication device and digital signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below with reference to the accompanying drawings and preferred embodiments. However, it should be noted that many of the details listed in the specification are only for readers to have a thorough understanding of one or more aspects of the present invention, and these aspects of the present invention can be implemented even without these specific details.

[0078] As used herein, terms such as "module" and "system" are intended to include computer-related entities such as, but not limited to, hardware, firmware, a combination of hardware and software, software, or software in execution. For example, a module may be, but is not limited to being limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and / or a computer. For example, both an applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a digital signature, a signature authentication device and a digital signature method. The method includes the steps that a sender conducts hash operation on original information M to obtain a hash value e and conducts encryption operation on the M through an encryption public key to obtain encrypted information; the sender conducts digital signature on the M through the e to obtain the signature of the M and then sends the signature of the M and the encrypted information together to a receiver; the receiver conducts decryption on the encrypted information through an encryption private key to obtain the M and then conducts hash operation on the M obtained through decryption to obtain the hash value e; the receiver conducts signature authentication through the obtained e and the signature of the received M. By means of the digital signature, the signature authentication device and the digital signature method, digital signature efficiency and signature authentication efficiency can be improved, and meanwhile information safety is improved.

Description

technical field [0001] The invention relates to the field of software, in particular to a digital signature, a signature authentication device and a digital signature method. Background technique [0002] Digital signature is the application of asymmetric key encryption technology and digital abstract technology, mainly including the information signature of the sender and the information signature authentication of the receiver. As an important technology for signature authentication, digital signature can provide security services such as identity verification, data integrity, and non-repudiation. [0003] At present, digital signature schemes can be roughly divided into RSA signature algorithm, DSA (Digital Signature Algorithm, digital signature algorithm) algorithm and ECDSA (Elliptic Curve Digital Signature Algorithm, elliptic curve digital signature) algorithm. Among them, since the ECDSA digital signature scheme is mainly based on the special geometric operation of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 高锦春裴君波刘元安马晓雷
Owner BEIJING UNIV OF POSTS & TELECOMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More