Supercharge Your Innovation With Domain-Expert AI Agents!

A Digital Signature and Message Hash Value Restoration and Signature Verification Method

A technology of digital signature and signature verification, applied in the field of cryptography, which can solve the problems of not supporting the recovery of message hash values ​​and inability to call cryptographic modules.

Active Publication Date: 2020-10-30
WUHAN UNIV OF TECH
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there will be such a problem in practical applications: the digital signature application program uses the method of recovering the hash value of the message during the signature operation from the signature value to perform signature verification, while the digital signature application program calls the cryptographic module to digitally sign the message. The digital signature algorithm does not support the recovery of the hash value of the message from the signature value, so the digital signature application program will not be able to call the interface function of the cryptographic module to recover the hash value of the message from the signature value, and the signature value to be verified The hash value of the message when the signature operation is restored to complete the digital signature verification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] The digital signature function provided by the cryptographic module includes digital signature using a digital signature algorithm that does not support recovering the hash value of the message from the signature value, but the cryptographic module does not have an interface function to recover the hash value of the message from the signature value, such as Windows CSP , for this cryptographic module, it is necessary to implement digital signature method and signature verification method of the present invention respectively in its digital signature interface function (as CPSignHash of Windows CSP) and signature verification interface function (as CPVerifySignature of Windows CSP), specifically as follows.

[0017] During the execution of the digital signature interface function, the cryptographic module judges whether the algorithm type of the signer’s private key used by the digital signature application supports recovery of the hash value of the message during the sign...

Embodiment 2

[0020] The digital signature function provided by the cryptographic module includes the use of a digital signature algorithm that does not support the recovery of the message hash value from the signature value to perform digital signatures. In addition to the signature verification interface function, the cryptographic module also has the function of recovering the message hash value from the signature value. List value interface functions, such as PKCS#11 cryptographic module, for this kind of cryptographic module, it needs to be in its digital signature interface function (such as PKCS#11 C_Sign, C_SignRecovery class interface function), signature verification interface function (such as PKCS#11's C_Verify class interface function) and the interface function (such as the C_VerifyRecovey class interface function of PKCS#11) that recover message hash value from signature value implement digital signature method of the present invention, signature verification method and message...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Aiming at a digital signature algorithm not supporting that a message hash value, when signature operation is carried out, is recovered from a signature value, the invention provides a digital signature and message hash value recovery method. When signature operation is carried out, a cryptographic module takes the message hash value as filling or additional data, and fills or adds the message hash value into the signature value after signature operation of the message hash value is carried out by using a private key, such that a final signature value is formed; when a digital signature application program requests for recovering the message hash value, when the digital signature operation is carried out, from the signature value by using a public key of a signer, the cryptographic module obtains or separates the filled or added message hash value after signature operation from the signature value; then, the signature value after cryptographic operation by using the private key of the signer is subjected to signature verification by using the obtained message hash value and the public key of the signer; if verification is passed, the message hash value obtained or separated from the signature value is used as the recovered message hash value and returned; and otherwise, a fixed value or a random value is used as the recovered message hash value and returned.

Description

technical field [0001] The invention belongs to the technical field of cryptography, in particular to a method for recovering digital signatures and message hash values. Background technique [0002] There are currently two types of digital signature schemes. [0003] A kind of digital signature, using the signer's private key to sign the message (message) hash value (hash value) (referred to as the message hash value) to perform encrypted cryptographic operations, that is, signature operations, and the result of the operation is used as a message signature The signature value (signature value); in digital signature verification, use the signer's public key to perform decryption cryptographic operations on the signature value, decrypt and obtain the hash value of the message during the signature operation, and then use the hash value of the message to verify the signature Perform a comparison (direct comparison of the hash values), if the two are the same, the digital signa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/0643H04L9/3247
Inventor 龙毅宏何翔
Owner WUHAN UNIV OF TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More