RSA digital signature generation method and system based on identity

A digital signature and identity technology, applied in the field of information security, can solve problems such as key leakage and weak signature key protection

Active Publication Date: 2018-02-23
WUHAN UNIV
View PDF3 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The implementation method based on secret sharing has weak protectio

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • RSA digital signature generation method and system based on identity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described in detail below in conjunction with examples. The following embodiments only show that the present invention is a possible implementation, not all possible implementations, and are not intended to limit the present invention.

[0037] One, at first set forth the method principle of the present invention.

[0038] The key generation center generates a pair of RSA public-private key pair (e, d), and a pair of random numbers satisfying part of the signing key send P 1 , send to P 2 , where H(ID) is a hash value generated based on user identity. At the same time, select and generate a set of public-private key pairs (pk, sk) of the homomorphic encryption algorithm, and send (pk, sk) to P 1 , pk sent to P 2 . Both parties involved in digital signature generation P 1 and P 2 , respectively generate a random number r 1 and r 2 . P 1 calculate first Encrypt r using homomorphic encryption method 1 get C 1 , followed by ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a RSA digital signature generation method and a RSA digital signature generation system based on an identity. The method specifically comprises the steps as follows: a secretkey generation center generates a public and secret key pair of a pair of RAS and a pair of random numbers; one part of a signature secret key is sent to P1, and the other part of signature secret keyis sent to P2; the two parties P1 and P2 participating into generation of a digital signature separately generate a random number r1 and a random number r2; the P1 firstly computes r1, encrypts the r1 to acquire C1, and then sends the C1 and r1 to the P2; the P2 computes r2 and returns the same to the P1; meanwhile, the P2 a ciphertext C2; the P2 sends the ciphertext C2 to the P1; And the P1 decrypts the C2, and computes to acquire signatures S and R by using one part of own signature secret key, and after the signatures pass authentication, the P1 publishes the complete RAS digital signature(R, S) based on the identity. According to the method and the system provided by the invention, security of the signature secret key is ensured, and the fairness of the two parties participating intothe digital signature is improved.

Description

technical field [0001] The invention belongs to the field of information security, in particular to an identity-based RSA digital signature generation method and system. Background technique [0002] Digital signature is the simulation of traditional handwritten signature in the digital environment, which can provide the unforgeability, authenticity and integrity of digital information. Digital signatures involve two keys: the signing key and the verification public key. Regarding the verification of the security and irreplaceability of the public key, the traditional solution is to use the public key infrastructure, that is, to bind the user's public key and identity through a digital certificate issued by a trusted authority. In order to solve the difficult problem of certificate management in this method, researchers have proposed identity-based digital signatures. In this type of signature, the key generation center uses the user's identity to generate a public-private...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/30H04L9/08H04L9/00H04L9/32
CPCH04L9/008H04L9/0825H04L9/302H04L9/3221H04L9/3249
Inventor 何德彪冯琦孙金龙
Owner WUHAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products