Online and offline aggregated signature method based on identity and constant signature length

An offline, identity technology, applied in the field of information security, can solve the problems of burden, increased signature, shortened signature storage space, etc., to achieve the effect of short signature length, simplified generation, and low network bandwidth requirements

Active Publication Date: 2017-09-15
西安千喜网络科技有限公司
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] To sum up, the problem existing in the existing technology is: in the existing aggregated signature method, the final signature is only to compress the signatures of multiple messages into one signature, which indeed shortens the storage space of the signature, but the length of the signature will be reduced. It increases with the number of messages, and the longer the signature length, the higher the requirement for network bandwidth; when a large number of messages need to be signed, because the signature length is too long, it will burden the entire network transmission process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Online and offline aggregated signature method based on identity and constant signature length
  • Online and offline aggregated signature method based on identity and constant signature length
  • Online and offline aggregated signature method based on identity and constant signature length

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] The application principle of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0050] One, the applied mathematical theory of the embodiment of the present invention:

[0051] 1. Bilinear pairing

[0052] In the present invention, bilinear pairing is a mapping that satisfies bilinearity, non-degenerateness, and computability, and it maps two elements in the prime order group G to the prime order group G T an element in . For example, the Weil pair and Tate pair defined on supersingular elliptic curves are bilinear pairs that satisfy the condition.

[0053] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of information security, and discloses an online and offline aggregated signature method based on identity and constant signature length. The method is divided into an online stage and an offline stage, pre-computation of a signature is performed in the offline stage, and the signature is generated according to a message and a user identity ID based on a computation result of the offline stage and verified at a receiving side in the online stage; when a user further signs the message, pre-computation of the signature of the offline stage does not need to be performed again, and computation directly starts from the online stage to generate the signature. The signature is performed in the online and offline stages, just once computation is needed in the offline stage, when the user further signs the signature, generation of the signature only needs to start from the online stage; when the user signs the plurality of messages, the length of the finally generated signature is not increased along with the number of the messages, the short and constant length is always kept, and thus signature speed and transmission efficiency are improved; the method is simple and strong in practicability, and has a popularization function.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an identity-based online and offline aggregation signature method with a constant signature length. Background technique [0002] The rapid development of computer technology has provided human beings with a high degree of automation and modernization, and the rapid development of networks has provided people with a convenient and fast way of information exchange, making human society quickly enter the information age. Since the process of information transmission, storage, and processing is often carried out on an open communication network, the information on the Internet is easily threatened by various attack methods such as eavesdropping, interception, modification, forgery, and replay, and its security is extremely fragile. . Especially the network system is facing a great threat and has become one of the serious social problems. With the developme...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0861H04L9/3247H04L63/06H04L63/083H04L63/0876
Inventor 张应辉闫铭郑东吕柳迪苏昊楠
Owner 西安千喜网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products