Digital signature method, device and cryptographic device

A digital signature and signature generation technology, applied in the field of cryptography, can solve problems such as failure of the buffer mechanism, no data in the buffer, difficulty in meeting signature requirements, etc., and achieve the effects of resisting linear attacks, high computing efficiency, and improving efficiency

Active Publication Date: 2020-02-18
GUANGDONG CERTIFICATE AUTHORITY
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] During the implementation process, the inventors found that there are at least the following problems in the traditional technology: On the one hand, for heavy load occasions, the signature request submitted by the traditional technology may exceed the computing power of the hardware device to calculate multiple points. At this time, the buffer may always be in the In the state without data, the pre-computed buffer mechanism will completely fail
On the other hand, attackers can monitor and track the signature results of historical data and construct linear equations through related data to extract the user's private key. That is, traditional technologies also have weaknesses in resisting linear attacks and are limited by hardware devices. performance, it is difficult to meet the signature requirements of massive users concurrent execution, which restricts the efficiency of digital signature

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature method, device and cryptographic device
  • Digital signature method, device and cryptographic device
  • Digital signature method, device and cryptographic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] In order to solve the problem that the traditional technology has weaknesses in resisting linear attacks, and is limited by the performance of hardware devices, it is difficult to meet the signature requirements of a large number of users concurrently executed, which restricts the efficiency of digital signatures, the present invention provides an embodiment of a digital signature method 1; figure 1 It is a schematic flow chart of Embodiment 1 of the digital signature method of the present invention; as figure 1 As shown, the following steps may be included:

[0075] Step S110: Obtain the result of multiplication point multiplication on the elliptic curve, and generate signature material data according to the result of point multiplication;

[0076] Step S120: Obfuscate the signature material data to obtain the obfuscated signature material data;

[0077] Step S130: Perform digital signature according to the obfuscated signature material data, and obtain the signature...

Embodiment 2

[0174] In order to solve the problem that traditional technology has weaknesses in resisting linear attacks, and is limited by the performance of hardware devices, it is difficult to meet the concurrent signature requirements of a large number of users and restrict the efficiency of digital signatures. At the same time, based on the above technical ideas of digital signature methods, this paper The invention also provides Embodiment 2 of a digital signature cryptographic device; Figure 8 It is a schematic structural diagram of Embodiment 2 of the digital signature cryptographic device of the present invention; as Figure 8 As shown, may include a cryptographic card and a graphics processor; the cryptographic card includes a signature component; the graphics processor includes a signature material generator and an obfuscation multiplier;

[0175] The signature material generator obtains the result of the multi-point multiplication operation on the elliptic curve, and generates...

Embodiment 3

[0178] In order to solve the problem that traditional technology has weaknesses in resisting linear attacks, and is limited by the performance of hardware devices, it is difficult to meet the concurrent signature requirements of a large number of users and restrict the efficiency of digital signatures. At the same time, based on the above technical ideas of digital signature methods, this paper The invention also provides Embodiment 3 of a digital signature cryptographic device; Figure 9 It is a schematic structural diagram of Embodiment 3 of the digital signature cryptographic device of the present invention; as image 3 As shown, the functions of signature material generator, confusion multiplier and signature component can also be implemented in the same cryptographic device, such as a cryptographic card. If the signature material generator is implemented outside the password card, and then sent to the inside of the password card to complete the subsequent processing, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digital signature method, device and cipher device. The digital signature method comprises the steps of obtaining multi-point multiplication operation results on an elliptic curve and generating signature material data according to the multi-point multiplication operation results; carrying out mixing operation processing on the signature material data, thereby obtaining mixed signature material data; and carrying out digital signature according to the mixed signature material data, thereby obtaining a signature result. According to the method and the devices, the mixed operation based on point addition is carried out on the known multi-point operation results, thereby resisting a linear attack and obtaining high enough operation efficiency. On the basis of random numbers generated by a low-speed hardware device and the multi-point multiplication operation results, more multi-point operation results are generated through adoption of the mixing algorithm, and the signature efficiency is improved. Through adoption of the mixing algorithm, the correlation among the mixing output results is relatively low, and the linear attack can be effectively resisted.

Description

technical field [0001] The invention relates to the technical field of cryptography, in particular to a digital signature method, device and cryptographic equipment. Background technique [0002] The efficiency of the digital signature device will be restricted due to the consumption of a large number of computing resources for multi-point calculations. In order to improve the efficiency of calculation of multiple point calculations on elliptic curves, many optimization methods have been proposed in the traditional technology. r G, or use a more efficient finite field calculation method, etc. [0003] Specifically, for example, the traditional technology proposes a step of pre-calculating and storing elliptic curve multiple point calculations on the GPU, and then calling the stored pre-calculation by the CPU to complete the signature calculation step. This technical solution can solve the sudden business of signature requests through pre-computation, and calculate and stor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3252
Inventor 张永强
Owner GUANGDONG CERTIFICATE AUTHORITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products