Supercharge Your Innovation With Domain-Expert AI Agents!

Signature, signature verification and copy simulation method and system based on designated verifier

A designated verifier and signature verification technology, applied in the field of signature based on designated verifier, signature verification and signature copy simulation, can solve the problems of high computational complexity, large signature length, unfavorable and efficient implementation, etc.

Active Publication Date: 2017-11-03
GUANGDONG CERTIFICATE AUTHORITY
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The more practical and lattice-based signature method is the designated verifier signature scheme of Lyubashevsky's Lyubashevsky signature scheme. However, the scheme has the problems of large signature length and high computational complexity, which is not conducive to efficient implementation in practical applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Signature, signature verification and copy simulation method and system based on designated verifier
  • Signature, signature verification and copy simulation method and system based on designated verifier
  • Signature, signature verification and copy simulation method and system based on designated verifier

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and do not limit the protection scope of the present invention.

[0074] In the following description, first, the embodiments of the signature method based on the designated verifier, the signature verification method, and the signature copy simulation method of the present invention will be described, and then the signature system, the signature verification system, and the signature copy simulation method based on the designated verifier of the present invention will be described. Various embodiments of the simulation system are described.

[0075] see figure 1 As shown in , it is a schematic flowchart of an embodiment of the signat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a signature, signature verification and copy simulation method and system based on a designated verifier. The signature method includes the steps of: setting a hash function H: {0, 1}*→{‑1, 0, 1}k ;Randomly select and calculate and output with probability 1 / M. If not output this time, return to the step of random selection and calculation; calculate and calculate and then output with probability; if not output this time, return to the step of selecting and calculating; output the signature result It can reduce the length of signature and the complexity of signature calculation, and improve signature efficiency.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a signature, signature verification and signature copy simulation method and system based on a designated verifier. Background technique [0002] Cloud computing represents a technological development trend that has been widely deployed. In fact, through limited energy mobile devices, users can utilize cloud computing services to implement a complex computing task or store a large amount of streaming photos and other multimedia data. There are many cloud storage services that provide users with a large amount of storage space for free. Because these services are free, stored data may be lost due to performance optimizations or general hardware problems. These user data storage possibilities make data auditing an inevitable service. [0003] A basic branch of data auditing is the user's own checking of the integrity of user data. Considering the limited energy res...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 张永强田海博
Owner GUANGDONG CERTIFICATE AUTHORITY
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More