Unlock instant, AI-driven research and patent intelligence for your innovation.
A group digital signature, verification method and its equipment and device
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A signature device and digital signature technology, applied in the field of information security, can solve problems such as no effective solutions
Active Publication Date: 2021-11-02
CHINA IWNCOMM
View PDF4 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0005] In the group digital signature technology, after the group key is generated, how to sign and verify the group members, there is no effective solution yet
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0130] Embodiment 1: In this embodiment, the group members in the group (i.e., the signature device) include a security module (also called a security chip), and the security module can support all the computing capabilities of the signature device. The signature or verification process of the group members requires Establish a secure authentication communication channel between the signing device / verification device and the issuing device, such as image 3 shown. The specific signature process in this embodiment is as follows:
[0131] 1) The security module has the private key f of the group member and the credential key (A, B, C, D) of the group member. The security module from the finite field Z p Select a random number r', and calculate A'=[r']A, B'=[r']B, C'=[r']C and D'=[r']D; and calculate J=H (bsn);
[0132] 2) The security module calculates K=[f]J.
[0133] 3) Security module from Z p A subset of Randomly select two numbers (r α ,r β ).
[0134] 4) Securit...
Embodiment 2
[0141] Embodiment 2: In this embodiment, the group members in the group (that is, the signature device) do not contain a security module (also called a security chip), and the signature device itself can support all the computing capabilities of the signature device, and the group members The signature or verification process needs to establish a secure authentication communication channel between the signing device / verification device and the issuing device. The specific signature processing process in this embodiment is similar to that of Embodiment 1, except that the execution subject is changed to the signing device itself. For details, see The relevant description of the device released in Embodiment 1.
Embodiment 3
[0142] Embodiment 3: In this embodiment, the group members (i.e., signature devices) in the group contain a security module (also known as a security chip), but the security module has limited computing power, and the security module is only responsible for part of the protocol algorithm design. Processing, the group member signature or verification process needs to establish a safe authentication communication channel between the signing device / verification device and the issuing device. The specific signature processing process in this embodiment is:
[0143] 1) The security module has the private key f of the group members, and the signing device itself has the certificate keys (A, B, C, D) of the group members. Signature device from finite field Z p Select a random number r', and calculate A'=[r']A, B'=[r']B, C'=[r']C and D'=[r']D; and calculate J=H (bsn).
[0144] 2) The signature device sends J to the security module.
[0145] 3) The security module calculates K=[f]J,...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The invention discloses a group digital signature and verification method and its equipment and device. The method includes: the signature equipment combines the first parameter, the second parameter, the third parameter and the fourth parameter in the certificate key with the first random number are used as the first signature parameter, the second signature parameter, the third signature parameter and the fourth signature parameter respectively; the fifth signature parameter is determined according to the connection base parameter of the signing device, and the fifth signature parameter and the private signature parameter of the signing device key, determine the sixth signature parameter; determine the first intermediate parameter according to the fifth signature parameter, the sixth signature parameter, the connection base parameter, the message to be signed and the second random number; determine the first intermediate parameter according to the first intermediate parameter, the fifth signature parameter, the The third random number and the prime number corresponding to the group to which the signing device belongs determine the seventh signature parameter; according to the seventh signature parameter, the private key of the signing device, the third random number and the prime number corresponding to the group to which the signing device belongs, determine the eighth signature parameter Signature parameters; send an anonymously signed message.
Description
technical field [0001] The invention relates to the technical field of information security, in particular to a digital signature and its verification technology. Background technique [0002] With the development of information technology, a large amount of sensitive information is transmitted through the network. For the purpose of commercial confidentiality and user privacy protection, network security applications such as electronic voting, e-commerce, and anonymous communication need to protect user identity information. With the development of network technology and e-commerce, many e-commerce activities with privacy protection requirements, such as electronic lottery, electronic cash and online games, have become new research fields. The increasing demand for information security and anonymous services has led to the rapid development of research and application of anonymous digital signature technology. [0003] Traditional digital signature technology needs to obta...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.