Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-quantum computing proxy digital signature method and signature system based on asymmetric key pool, and computer equipment

A quantum computing and digital signature technology, applied in the field of secure communication, can solve the problems of digital signature method cracking, digital signature being cracked by quantum computer, etc.

Active Publication Date: 2019-04-02
RUBAN QUANTUM TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 1. In the prior art, since the quantum computer can quickly obtain the corresponding private key through the public key, the digital signature method based on the public and private key is easily cracked by the quantum computer
[0014] 2. In the existing technology, the input and output of digital signatures based on public and private keys can be known by others. In the presence of quantum computers, the private key may be deduced, resulting in digital signatures being cracked by quantum computers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum computing proxy digital signature method and signature system based on asymmetric key pool, and computer equipment
  • Anti-quantum computing proxy digital signature method and signature system based on asymmetric key pool, and computer equipment
  • Anti-quantum computing proxy digital signature method and signature system based on asymmetric key pool, and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0045] In order to better describe and illustrate the embodiments of the application, reference may be made to one or more drawings, but additional details or examples used to describe the drawings should not be regarded as an invention of the application, the presently described implementation limitations on the scope of any of the examples or preferred modes.

[0046] In the present invention, the process of performing ordinary digital signature and verifica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-quantum computing proxy digital signature method and an anti-quantum computing proxy digital signature system based on an asymmetric key pool, and computer equipment.The anti-quantum computing proxy digital method comprises the steps that: an original signature party uses a signature private key of the original signature party to generate a proxy key, and transmits an original text to be signed, the proxy key and a public key pointer random number corresponding to a signature public key of the original signature party to a proxy signature party; the proxy signature party obtains the signature public key of the original signature party from a secret key card of the proxy signature party according to the public key pointer random number, and utilizing the signature public key to verify the proxy key; performing signature operation on the original text by utilizing the proxy key to generate a file signature by the proxy signature party after the verification passes, and transmitting the original text, the file signature and the public key pointer random number to a verification party; and the verification party obtains a signature public key of the original signature party from a secret key card of the verification party according to the public key pointer random number, and verifies file the signature by utilizing the signature public key.

Description

technical field [0001] The invention relates to the field of secure communication, in particular to a proxy digital signature method using key card technology to realize anti-quantum computing. Background technique [0002] In the real world, people often need to entrust some of their powers to reliable agents, and let the agents exercise these powers on behalf of themselves. Among the powers that can be delegated are people's signature rights. The traditional method of delegating signature rights is through the use of seals, which can be passed flexibly between people. A digital signature is an electronic analog of a handwritten signature, but a digital signature cannot provide proxy functionality. [0003] In 1996, Mambo, Usuda and Okamoto proposed the concept of proxy signature and gave a way to solve this problem. The proxy signature scheme should satisfy the six properties of non-repudiation, verifiability, unforgeability and distinguishability. Since proxy signatur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32H04L29/06
CPCH04L9/0863H04L9/0869H04L9/30H04L9/3247H04L63/0442
Inventor 富尧钟一民汪仲祥
Owner RUBAN QUANTUM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products