Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Novel RSA blind signature method

A technology of RSA algorithm and blind signature, applied in the field of information security

Active Publication Date: 2019-12-03
杭州后量子密码科技有限公司
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The blind signature protocol has great advantages, but there are also some problems, such as: how to closely combine blind signature with other signature methods to improve its efficiency and security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel RSA blind signature method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] (1) The signer Bob who participates in the blind signature selects security parameters according to the RSA algorithm, calculates his public key (e, n) and private key d, and publishes a secure one-way hash algorithm at the same time

[0015] (1.1) Bob randomly selects two large prime numbers p and q, calculates n=p*q, and calculates the Euler function value φ(n)=(p-1)*(q-1) of n;

[0016] (1.2) Bob randomly selects a large integer e such that (e, φ(n)) = 1;

[0017] (1.3) According to the extended Euclidean algorithm, calculate the private key d so that it satisfies ed=1mod(φ(n)).

[0018] (2) Alice selects the information to be signed to sign:

[0019] (2.1) Alice selects the message to be signed and two different random numbers

[0020] (2.2) Alice calculates m 1 = r 1 ae h(m), blind the information m, and m 1 Send to Bob;

[0021] (2.3) Alice calculates H=h(m) modn. Public H is convenient for public verification;

[0022] (3) Bob blindly signs the mes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel RSA blind signature method, and aims to realize protection of sensitive private data in electronic contract signature in network transaction. The method is technicallycharacterized in that an information owner Alice blinds a message needing to be signed, a signer Bob blinds the blinded message, the Alice blinds the message blindly signed by the Bob, and finally, arandom third-party verifier Miner completes final signature verification. The method realizes unforgeability and blindness while having correctness and security, and is suitable for privacy sensitiveinformation protection in an electronic contract signing process.

Description

technical field [0001] The invention belongs to the technical field of information security and relates to a blind signature method based on an RSA algorithm. Background technique [0002] Digital signatures can guarantee data integrity and are widely used in military, business, financial and other fields. In some scenarios, signed messages need to satisfy both authenticity and anonymity. In the traditional digital signature, the signer can check the details of the message, which is not suitable for the fair signing of electronic contracts and other fields. Blind signature means that the signer cannot view the details of the document to be signed, but only performs the specific operation of signing to achieve the purpose of signing. [0003] Blind signatures not only need to retain various characteristics of digital signatures, but also need to be blind and untraceable. Blindness means that the signer cannot see the content of the signed message; untraceability means that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3257H04L9/3249
Inventor 李凤银王东风李清华王伊蕾
Owner 杭州后量子密码科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products