Unlock instant, AI-driven research and patent intelligence for your innovation.

A group digital signature, verification method and its equipment and device

A signature device and digital signature technology, applied in the field of information security, can solve problems such as no effective solutions

Active Publication Date: 2021-11-02
CHINA IWNCOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the group digital signature technology, after the group key is generated, how to sign and verify the group members, there is no effective solution yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A group digital signature, verification method and its equipment and device
  • A group digital signature, verification method and its equipment and device
  • A group digital signature, verification method and its equipment and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0130] Embodiment 1: In this embodiment, the group members in the group (i.e., the signature device) include a security module (also called a security chip), and the security module can support all the computing capabilities of the signature device. The signature or verification process of the group members requires Establish a secure authentication communication channel between the signing device / verification device and the issuing device, such as image 3 shown. The specific signature process in this embodiment is as follows:

[0131] 1) The security module has the private key f of the group member and the credential key (A, B, C, D) of the group member. The security module from the finite field Z p Select a random number r', and calculate A'=[r']A, B'=[r']B, C'=[r']C and D'=[r']D; and calculate J=H (bsn);

[0132] 2) The security module calculates K=[f]J.

[0133] 3) Security module from Z p A subset of Randomly select two numbers (r α ,r β ).

[0134] 4) Securit...

Embodiment 2

[0141] Embodiment 2: In this embodiment, the group members in the group (that is, the signature device) do not contain a security module (also called a security chip), and the signature device itself can support all the computing capabilities of the signature device, and the group members The signature or verification process needs to establish a secure authentication communication channel between the signing device / verification device and the issuing device. The specific signature processing process in this embodiment is similar to that of Embodiment 1, except that the execution subject is changed to the signing device itself. For details, see The relevant description of the device released in Embodiment 1.

Embodiment 3

[0142] Embodiment 3: In this embodiment, the group members (i.e., signature devices) in the group contain a security module (also known as a security chip), but the security module has limited computing power, and the security module is only responsible for part of the protocol algorithm design. Processing, the group member signature or verification process needs to establish a safe authentication communication channel between the signing device / verification device and the issuing device. The specific signature processing process in this embodiment is:

[0143] 1) The security module has the private key f of the group members, and the signing device itself has the certificate keys (A, B, C, D) of the group members. Signature device from finite field Z p Select a random number r', and calculate A'=[r']A, B'=[r']B, C'=[r']C and D'=[r']D; and calculate J=H (bsn).

[0144] 2) The signature device sends J to the security module.

[0145] 3) The security module calculates K=[f]J,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a group digital signature and verification method and its equipment and device. The method includes: the signature equipment combines the first parameter, the second parameter, the third parameter and the fourth parameter in the certificate key with the first random number are used as the first signature parameter, the second signature parameter, the third signature parameter and the fourth signature parameter respectively; the fifth signature parameter is determined according to the connection base parameter of the signing device, and the fifth signature parameter and the private signature parameter of the signing device key, determine the sixth signature parameter; determine the first intermediate parameter according to the fifth signature parameter, the sixth signature parameter, the connection base parameter, the message to be signed and the second random number; determine the first intermediate parameter according to the first intermediate parameter, the fifth signature parameter, the The third random number and the prime number corresponding to the group to which the signing device belongs determine the seventh signature parameter; according to the seventh signature parameter, the private key of the signing device, the third random number and the prime number corresponding to the group to which the signing device belongs, determine the eighth signature parameter Signature parameters; send an anonymously signed message.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a digital signature and its verification technology. Background technique [0002] With the development of information technology, a large amount of sensitive information is transmitted through the network. For the purpose of commercial confidentiality and user privacy protection, network security applications such as electronic voting, e-commerce, and anonymous communication need to protect user identity information. With the development of network technology and e-commerce, many e-commerce activities with privacy protection requirements, such as electronic lottery, electronic cash and online games, have become new research fields. The increasing demand for information security and anonymous services has led to the rapid development of research and application of anonymous digital signature technology. [0003] Traditional digital signature technology needs to obta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04L9/32
CPCH04L9/0869H04L9/3247H04L9/08H04L9/32H04W12/04
Inventor 杜志强张国强颜湘李明万洪涛李琴
Owner CHINA IWNCOMM