Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A cryptosystem and digital signature method

A cryptographic system, digital signature technology, applied in the field of cryptography

Active Publication Date: 2018-12-11
WUHAN UNIV OF TECH
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The identification password is easy to use. However, when the identification password is used for digital signatures, since the private key is generated by the user's previous private key generation system (private key generator) and not generated at the user end, this will cause repudiation problems: electronic orders, The signer of the electronic contract can say that the signature of the electronic order and electronic contract is not generated by himself, because the operator of the private key generation system can use the private key generation system to generate the private key of the signer, and then use the generated private key to impersonate the signer Signed electronic orders and electronic contracts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A cryptosystem and digital signature method
  • A cryptosystem and digital signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The specific implementation of the present invention will be described below.

[0037] (1) Implementation of bilinear mapping (pairing) algorithm and group of bilinear mapping

[0038] There are multiple different bilinear mapping algorithms (pairing algorithm) at present, as Weil pairing, Tate pairing, Ate pairing, R-ate pairing etc., with regard to the present invention, what kind of bilinear mapping algorithm (pairing algorithm) is adopted ) is not limited, as long as the functions of the present invention can be realized.

[0039] The group used in the bilinear mapping (pairing operation) is not limited in the present invention, as long as the group suitable for the bilinear mapping (pairing operation) is used, usually an elliptic curve point group satisfying certain conditions.

[0040] (2) Regarding the implementation of user identification information and key qualification information

[0041] User identification information is information used to identify and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a cryptographic system and a digital signature method. The cryptographic system comprises a key service system and a cryptographic component. The key service system has a master key sm adopting bilinear mapping cryptography. The cryptographic component has the master keys sU, PU1, PU2 and PUpub= [sU] PU2 adopting bilinear mapping cryptographic operation, where PU1 and PU2are the generators of bilinear mapping groups GU1 and GU2 of the cryptographic component, respectively. The key service system digitally signs the data including the user's identity information U, PUpub and key restriction information of the cryptographic component by using the master key sm to generate the authentication data CU of the PUpub. The cryptographic component uses the key sU to digitally sign the data by using the identification cryptographic algorithm or the elliptic curve cryptographic algorithm, and the signed data contains the CU. After verifying the validity of the CU, the signature verifier verifies the digital signature of the data by using PU1, PU2 and PUpub.

Description

technical field [0001] The invention belongs to the technical field of encryption, in particular to a double-line mapping-based encryption system and digital signature method with anti-repudiation capability. Background technique [0002] Compared with PKI (Public Key Infrastructure) which uses digital certificate technology, Identity Based Cryptography (IBC) saves the troublesome link of obtaining the public key digital certificate of the private key owner, and the technology is simple to implement. People's attention, has broad application prospects. [0003] Identity passwords can be used for both data encryption (called Identity Based Encryption, IBE) and digital signatures (called Identity Based Signature, IBS). Most of the current identification encryption algorithms are based on bilinear mapping (bilinear mapping, also known as pairing operation, Pairing) algorithm, wherein the bilinear mapping (pairing operation) is: [0004] e:G 1 ×G 2 →G T , where G 1 , G 2 ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/30H04L9/08
CPCH04L9/0825H04L9/3073H04L9/3247H04L9/3252
Inventor 龙毅宏
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products