Generation method based on Edwartz curve digital signature

A digital signature and curve technology, applied in the field of information security, can solve problems such as multiple storage spaces, inability to use, and security issues

Active Publication Date: 2019-08-02
SHAANXI NORMAL UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Edwards-curve Digital Signature Algorithm was proposed by Daniel J.Bernstein et al. in High-speed high-security signatures[J].Journal of Cryptographic Engineering,2012,2(2):77-89. Now it has Widely used in Internet projects such as OpenSSH and GnuPG, this method is a one-party signature method and cannot be used in IoT scenarios that require two-party signatures
[0005] In view of the defects of the above technical problems, in 2017, He Debiao and others proposed a method of "GOST digital signature generation method and system" to generate digital signatures through cooperation between the two parties. This method requires more storage space and directly converts simple random numbers into As a private key and key parameters to participate in the operation, the defect of the random number generator itself brings security problems, and verification requires more calculations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Generation method based on Edwartz curve digital signature
  • Generation method based on Edwartz curve digital signature
  • Generation method based on Edwartz curve digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0113] The steps of the generation method based on the Edwards curve digital signature of the present embodiment are as follows, see figure 1 , 2 , 3:

[0114] (1) Negotiate to generate a system key

[0115] 1) Generate the sub-public key and sub-private key of the first communication party

[0116] The first communication party chooses a 1 A random string of bytes is used as the private key string k of the first communication party 1 ,w 1is 32, use the cryptographic hash function Hash to obtain the hash value str of the private key string of the first communication party with formula (1) 1 :

[0117] str 1 =Hash(k 1 ) (1)

[0118] The first communication party uses formula (2) to obtain the first communication party's sub-private key sl 1 :

[0119]

[0120] Wherein the hash function Hash selects the national secret SM3 method, len is the bit length of the hash value output by the hash function SM3, the value of len is 256, and the value of l is 2; the first com...

Embodiment 2

[0196] The steps of the generation method based on the Edwards curve digital signature of the present embodiment are as follows:

[0197] (1) Negotiate to generate a system key

[0198] 1) Generate the sub-public key and sub-private key of the first communication party

[0199] The first communication party chooses a 1 A random string of bytes is used as the private key string k of the first communication party 1 ,w 1 is 48, use the cryptographic hash function Hash to obtain the hash value str of the private key string of the first communication party with formula (1) 1 :

[0200] str 1 =Hash(k 1 ) (1)

[0201] The first communication party uses formula (2) to obtain the first communication party's sub-private key sl 1 :

[0202]

[0203] Wherein the hash function Hash selects the SHA-512 method, the value of len is 512, and wherein l is 4; the first communication party uses formula (3) to obtain the first communication party identifier perix1:

[0204]

[0205...

Embodiment 3

[0223] The steps of the generation method based on the Edwards curve digital signature of the present embodiment are as follows:

[0224] (1) Negotiate to generate a system key

[0225] 1) Generate the sub-public key and sub-private key of the first communication party

[0226] The first communication party chooses a 1 A random string of bytes is used as the private key string k of the first communication party 1 ,w 1 is 64, use the cryptographic hash function Hash to obtain the hash value str of the private key string of the first communication party with formula (1) 1 :

[0227] str 1 =Hash(k 1 ) (1)

[0228] The first communication party uses formula (2) to obtain the first communication party's sub-private key sl 1 :

[0229]

[0230] Wherein the hash function Hash selects the SHA-256 method, the value of len is 256, and wherein l is 8; the first communication party uses formula (3) to obtain the first communication party identifier perix1:

[0231]

[0232...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a generation method based on an Edwartz curve digital signature. The method comprises the steps of negotiating to generate a system secret key, negotiating to generate a digital signature, and verifying the signature. According to the invention, a sub-private key adopted in the step of negotiating to generate the system secret key is fairly and safely generated by the hashvalues of the private key character strings of a first communication party and a second communication party; the first communication party and the second communication party are required to negotiateto generate a signature system public key, any party cannot forge the signature system public key, and the obtained signature system public key is compressed and stored by using an Edwartz curve upper point compression method, so that the occupied space for system storage is reduced. In the step of negotiating to generate the digital signature, a part of the signature r is divided into two parts,a part of the signature s is divided into three parts, the homomorphic encryption method ensures that both parties cannot obtain the information of the opposite party, any party cannot obtain the information of the opposite party and counterfeit the signature privately, so that the security of the signature and the fairness of both participating parties are improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for generating an Edwards curve digital signature. Background technique [0002] With the development of computers and the Internet, network and information security has become a hot spot that people pay attention to. As an important part of the information security field, digital signature technology plays an important role in identity authentication, data integrity and anonymity. [0003] In the Internet of Things, many device execution instructions require the joint signature of the user and the control server to authorize execution, and under the Internet of Things, not only computing resources and storage resources are very limited, but also signatures are required to have high security. [0004] Edwards-curve Digital Signature Algorithm was proposed by Daniel J.Bernstein et al. in High-speed high-security signatures[J].Journal of Cryptogra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/008H04L9/3236H04L9/3247
Inventor 张明瑞杨波侯红霞
Owner SHAANXI NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products