Unlock instant, AI-driven research and patent intelligence for your innovation.

One-way encrypted electronic signature method and system

An electronic signature and encryption algorithm technology, which is applied in the transmission system, digital transmission system, encryption device with shift register/memory, etc., can solve the problems that PKI cannot be widely used, the key management process is complicated, and the interoperability problems are prominent, etc. Problems, to achieve the effect of low technology research and development costs, simple user application, and high security level

Active Publication Date: 2022-04-19
丁爱民
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(2) Partial information held by less than k participants cannot reconstruct P0
[0014] (2) When signing, the electronic signature creation data is only controlled by the electronic signatory;
Key management includes key generation, distribution, verification, update, storage, backup, validity period, destruction, recovery, etc. from key generation to key destruction. The key management process is complex and expensive
[0021] 2. PKI, the electronic signature implementation method based on asymmetric encryption technology, cannot be widely promoted and applied. The main defects of PKI electronic signature include high system cost, high implementation cost, prominent interoperability problems, and the integration of PKI system and other systems. Adjustment or even replacement, use and management of PKI requires more training, third-party certification bodies, users need to apply for electronic certificates, users need higher computer application skills, etc. These problems have led to the implementation of the "Electronic Signature Law" since 2005 It has been more than 12 years since this implementation is difficult to be widely used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • One-way encrypted electronic signature method and system
  • One-way encrypted electronic signature method and system
  • One-way encrypted electronic signature method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0059] Such as figure 1 As shown, it is a schematic diagram of an electronic signature method in the embodiment of the present invention, including:

[0060] 101. The method of retaining the electronic signature production data: the electronic signatory retains the electronic signature production data MD and the electronic signature authorization password Pin; MD and Pin are two components of the electronic signature production data.

[0061] 102. The method ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention provides a method and system for one-way encrypted electronic signature, which retains the electronic signature creation data and the digital abstract of the electronic signature authorization password as the electronic signature verification data Dmdy and Dpy; the way to generate the electronic signature is: based on the electronic signature creation data, Authorization password, digital digest Dmd, Dp, Dw of data message W, use one-way encryption algorithm system DSESS to construct electronic signature ES. The way to verify the electronic signature is: based on the Dw decoded from ES, the retained Dmdy and Dpy, use DSESS to construct the electronic signature verification code ESy; compare ES and ESy, if they are the same, it means that the electronic signature ES and its None of the data items in has been tampered with; calculate the digital digest Dwy of the data message, compare the calculated Dwy with the decoded Dw, if the two are the same, it means that the data message has not been tampered with. The embodiment of the present invention does not use keys, avoids the complexity of key management, and reduces technical difficulty and management difficulty.

Description

technical field [0001] The invention relates to the technical field of computer information security, in particular to a one-way encrypted electronic signature method and system. Background technique [0002] The concept of electronic signature was originally proposed by Diffie and Hellman. They proposed that each user publish a public key to verify the signature, and also save a private key to generate the signature. In Diffie and Hellman's digital signature strategy, the user's signature on the message depends on the message itself and the user's private key, and the signature can be verified by using the user's public key. [0003] Data encryption technology is the cornerstone of electronic signature technology. Data encryption is divided into two categories: one-way encryption and two-way encryption. One-way encryption means that only data can be encrypted, but there is no way to decrypt the encrypted data. Two-way encryption refers to encrypting plaintext data into ci...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/06
CPCH04L9/0625H04L9/0631H04L9/0643H04L9/3247H04L9/3249
Inventor 丁爱民
Owner 丁爱民