Terminal and non-repudiation encrypted signature method and device thereof

A technology of signing device and signing public key, which is applied in the direction of encryption device with shift register/memory, security device, secure communication device, etc.

Active Publication Date: 2017-08-29
SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
View PDF9 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this protection method that performs the complete encryption method and signature method separately will result in the output result being the total length of the encryption method output and the signature method output

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and non-repudiation encrypted signature method and device thereof
  • Terminal and non-repudiation encrypted signature method and device thereof
  • Terminal and non-repudiation encrypted signature method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0115] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0116] refer to figure 1 , the embodiment of the present invention provides a non-repudiable encrypted signature method, including:

[0117]S1. The encrypted signature terminal obtains the identification cryptographic system parameters of the key generation center, and generates a key pair of a signature public key and a signature private key;

[0118] S2. Encrypt the message M using the ID_B of the decryption verification terminal, and perform a short signature on the encrypted result data and the message M using the signature private key to generate encrypted signature result data;

[0119] S3. Decrypt the private key D_B and the signature public key by using the identification cryptographic system parameters and the identification corresponding to the identification ID_B through the decryption and verification ter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates a terminal and a non-repudiation encrypted signature method and device thereof. The method comprises that an encrypted signature end obtains parameters of an identification cipher system of a secret key generating center, and generates a key pair including a public signature key and a private signature key; a message M is encrypted by utilizing an identification ID_B of a decrypted signature verification end, short signature is carried out on encryption result data and the message M by utilizing the private signature key, and encrypted signature result data is generated; and the decrypted signature verification end carries out decrypted signature verification on the encrypted signature result data by utilizing the parameters of the identification cipher system, an identification decrypting private key D_B corresponding to the identification ID_B and the public signature key, and if verification fails, an output null is decrypted. According to the invention, the encrypted signature result data is generated via short signature, an output result of the encrypted signature end is short, verification is simple, and both the data privacy and authenticity can be ensured.

Description

technical field [0001] The invention relates to the field of digital signatures, in particular to a terminal and its non-repudiable encrypted signature method and device. Background technique [0002] In some security applications, the data needs to be encrypted and protected, and at the same time, the authenticity of the identity of the sender of the data must be guaranteed. The general method is to sign the data and then encrypt the data, or encrypt the data first and then sign the data. However, this protection method that performs the complete encryption method and the signature method separately will cause the output result to be the total length of the encryption method output and the signature method output. [0003] A cryptographic signature method with short output length and simple verification method is in demand. Contents of the invention [0004] The main purpose of the present invention is to provide a terminal with short output length and simple verificati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/30H04L9/32H04W12/02H04W12/06
CPCH04L9/0643H04L9/0825H04L9/0866H04L9/0869H04L9/3066H04L9/3226H04L9/3247H04W12/02H04W12/06
Inventor 程朝辉杜峰薛芳芳
Owner SHENZHEN OLYM INFORMATION SECURITY TECHOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products