Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-repudiation identification private key generation and digital signature method, system and device

A technology for identifying private keys and digital signatures, which is applied in the field of cryptography and can solve problems such as the inability of digital signatures to achieve non-repudiation

Active Publication Date: 2020-04-28
WUHAN UNIV OF TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] The purpose of the present invention is to propose a corresponding solution to the problem that the current identification-based digital signature cannot realize non-repudiation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-repudiation identification private key generation and digital signature method, system and device
  • Anti-repudiation identification private key generation and digital signature method, system and device
  • Anti-repudiation identification private key generation and digital signature method, system and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] This embodiment relates to the implementation of the identification private key generation method, digital signature method and signature verification method of the present invention.

[0066] The implementation of the identification private key generation method of the present invention involves bilinear mapping (pairing operation) e:G 1 ×G 2 →G T ;Group G 1 The generator of is P 1 , group G 2 The generator of is P 2 ;Group G 1 , G 2 , G T The order of is a prime number n;

[0067] The implementation of the identification private key generation method of the present invention involves the identification private key generation server (PrivateKey Generation Server) at the server end and the identification private key generation client (Private Key GenerationClient) at the user end;

[0068] The identification private key generation server has the system master key s in [1, n-1] m (or system master private key s m ); m There is a corresponding system master pu...

Embodiment 2

[0102] The difference between this embodiment and embodiment 1 is:

[0103] The identification private key generation client does not randomly select an integer in [1, n-1] as the user master key (master private key) s U , do not directly calculate the group G 1 element P in U1 =[s U ]P 1 , do not directly calculate the group G 2 element P in U2 =[(s U ) -1 ]P 2 , where (s U ) -1 for s U The modulo n multiplicative inverse of ;

[0104] The identification private key generation client and the identification private key generation server cooperate to generate the SM9 identification private key d for signing corresponding to the user identification in the following manner A , and collaboratively generate the user master key s U , and the collaborative computing P U1 ,P U2 :

[0105] The server's identity private key generation server randomly selects an integer s in [1, n-1] U0 , the client’s identity private key generation client randomly selects an integer s i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-repudiation identification private key generation and digital signature method, system and device. P1 and P2 are respectively generators of groups G1 and G2 of an SM9algorithm, wherein n is the order of the group; a private key generation server has a system main key sm and a system main public key Ppub = [sm]P2; a client has a user master key sU, PU1 = [sU]P1, PU2 = [(sU)-1]P2; the client side and the server side take s = (smsU) mod, wherein n is a main secret key to cooperatively generate an SM9 private key dA of the user, and the server side cannot obtain the dA; a signature party uses P1 as a generator of a group G1, uses PU2 as a generator of a group G2, uses Ppub as a main public key, uses dA as a private key, and uses an SM9 signature algorithm to generate a digital signature (h, S) of a message; after verifying that the e (PU1, PU2) is equal to the e (P1, P2), a verification party uses P1 as a generator of the group G1, PU2 as a generator of the group G2 and Ppub as a main public key, and verifies the validity of the (h, S) by adopting an SM9 signature algorithm.

Description

technical field [0001] The invention belongs to the technical field of cryptography, in particular to a double-line mapping-based identification private key generation and digital signature method, system and device with non-repudiation capability. Background technique [0002] Compared with PKI (Public Key Infrastructure) which uses digital certificate technology, identity-based cryptography (Identity Based Cryptography, IBC) saves the troublesome link of obtaining the public key digital certificate of the private key owner, and the technical implementation is simple. It has been paid more and more attention by people and has broad application prospects. [0003] Identity-based ciphers can be used for both data encryption (called Identity Based Encryption, IBE) and digital signatures (called Identity Based Signature, IBS). At present, most identification-based cryptographic algorithms use algorithms based on bilinear mapping (bilinear mapping, also known as pairing operati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/30H04L9/32
CPCH04L9/0866H04L9/3073H04L9/3247
Inventor 龙毅宏
Owner WUHAN UNIV OF TECH