Unlock instant, AI-driven research and patent intelligence for your innovation.

An Efficient Aggregate Signature Method

An efficient and signature verification technology, applied in the field of information security, can solve the problems of network security environment not suitable for computing resources and limited bandwidth, low efficiency of aggregated signature calculation, slow transmission speed, etc., saving storage space and strong practicability , to achieve a simple effect

Active Publication Date: 2022-04-08
TONGLING UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The problem to be solved by the present invention is that the calculation efficiency of the existing aggregation signature is low, the transmission speed is slow, and it is not suitable for the network security environment with limited computing resources and bandwidth.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Efficient Aggregate Signature Method
  • An Efficient Aggregate Signature Method
  • An Efficient Aggregate Signature Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040]Referring to the accompanying drawings, through the description of the embodiments, the specific embodiments of the present invention include the shape, structure, mutual position and connection relationship of each part, the function and working principle of each part, and the manufacturing process of the various components involved. And the method of operation and use, etc., are described in further detail to help those skilled in the art have a more complete, accurate and in-depth understanding of the inventive concepts and technical solutions of the present invention.

[0041] The applied mathematical theory of the embodiments of the present invention:

[0042] 1. Elliptic curve discrete logarithm problem

[0043] The elliptic curve discrete logarithm problem is: Suppose E(F c ) is a finite field F c On the elliptic curve, it is known that P is E(F c ) of a generator of order q, when Q∈E(F c ) and Q=k·P, find the integer k (0≤k≤q-1).

[0044] 2. Trapdoor hash fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses an efficient aggregation signature method, including the following steps: Step 1, system initialization: generate system public parameters according to the input security parameters; Step 2, key generation: the key generation center generates public and private keys for each user right (y i ,Y i ), and the public key Y i public, the private key y i Transmission to the user through a secure channel; step 3, individual signature stage: use the individual signature algorithm to sign each user's message, and verify its correctness; step 4, aggregation signature stage: the aggregation center performs each legal individual signature Aggregation generates an aggregate signature, and its correctness is judged according to the verification equation. The technical solution provided by the invention can greatly improve the verification efficiency of the signature, and the length of the signature does not increase with the increase of the number of signers, thereby effectively saving the transmission bandwidth.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an efficient and constant-length aggregation signature method. Background technique [0002] Network technology is a double-edged sword. While it brings convenience and high efficiency to people, its security problems also seriously affect people's daily life. Digital signature technology is one of the core technologies of network security, and also one of the key technologies of secure e-commerce and secure e-government, providing message authentication, integrity and non-repudiation attributes. Anyone who knows the signer's public key can check the validity of the signature. This characteristic enables digital signatures to be effectively applied to one-to-one and one-to-many application scenarios. [0003] In order to solve the problem of multiple users signing multiple messages in practical applications, in 2003, Boneh et al. proposed the concept of aggregate s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/06H04L9/08H04L9/30H04L9/32
Inventor 束红孙钢钢陈付龙孙丽萍黄永青钟志水王刚
Owner TONGLING UNIV