Batch authentication method for elliptic curve digital signature algorithm under implicit certificate

An implicit certificate and elliptic curve technology, applied in the field of information security, can solve the problems of high authentication overhead and achieve the effects of improving authentication efficiency, reducing computing overhead, and reducing authentication performance overhead

Active Publication Date: 2019-07-05
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] In view of the above-mentioned shortcomings in the prior art, the batch authentication method of the elliptic curve digital signature algorithm under the imp...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Batch authentication method for elliptic curve digital signature algorithm under implicit certificate
  • Batch authentication method for elliptic curve digital signature algorithm under implicit certificate
  • Batch authentication method for elliptic curve digital signature algorithm under implicit certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The specific embodiments of the present invention are described below so that those skilled in the art can understand the present invention, but it should be clear that the present invention is not limited to the scope of the specific embodiments. For those of ordinary skill in the art, as long as various changes Within the spirit and scope of the present invention defined and determined by the appended claims, these changes are obvious, and all inventions and creations using the concept of the present invention are included in the protection list.

[0051] Such as figure 1 As shown, the batch authentication method of the elliptic curve digital signature algorithm under the implicit certificate includes the following steps:

[0052] S1. Obtain each data to be authenticated, the signature generated by the sender for the data to be authenticated, and the corresponding implicit certificate;

[0053] S2. Obtain the sum of the first parameters of the signature of each data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a batch authentication method for an elliptic curve digital signature algorithm under an implicit certificate. The method mainly comprises the following steps: judging whetherthe sum of the first parameters of the signatures of the to-be-authenticated data is equal to the sum of the products of the inverse of the second parameters of the signatures of the to-be-authenticated data and the abstract values of the to-be-authenticated data and the products of the base points on the corresponding elliptic curves plus the inverse of the second parameters of the signatures ofthe to-be-authenticated data and the signatures; the sum of the product of the x coordinate value of the first parameter, the abstract value of the to-be-signed part of the implicit certificate and the reconstruction factor of the public key of the data sender plus the result obtained by the product of the sum of the product of the inverse of the second parameter of the signature of each piece ofto-be-authenticated data and the x coordinate value of the first parameter of the signature and the public key of the certificate center. if yes, the data packets of the batch are all legal and pass the authentication, otherwise, the authentication is not passed. The batch authentication method provided by the invention can obviously improve the throughput rate of the system.

Description

technical field [0001] The invention relates to the field of information security, in particular to a batch authentication method of an elliptic curve digital signature algorithm under an implicit certificate. Background technique [0002] Data in computers and the Internet are easily intercepted and tampered by malicious users. In order to protect data, the field of information security puts forward the requirements of data confidentiality, data integrity, data authentication and data accountability. [0003] There are two keys in the digital signature algorithm: the private key and the public key. The private key is used to generate a signature for the data and needs to be kept private, and the public key is used to verify the signature and be disclosed to anyone in the system. Data authentication usually includes two processes, one is that the sender uses his private key to generate a signature for the data, and the other is that the receiver uses the sender's public key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/30H04L9/16
CPCH04L9/16H04L9/3066H04L9/3252H04L9/3263
Inventor 孙罡刘伟虞红芳孙健
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products