Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity-based digital signature password reverse firewall method

A digital signature and firewall technology, which is applied in the field of information security, can solve the problems of difficult implementation of password reverse firewall technology and high requirements for re-randomization, and achieve the effects of enhancing security, protecting privacy, and improving security

Active Publication Date: 2020-06-05
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Although the password reverse firewall is more convenient and simpler than the previous technology, and it does not need to analyze the internal algorithm to experiment with the internal random number, but the password reverse firewall has certain limitations, and its requirements for re-randomization are relatively high
Because the requirement of re-randomization exists, and most digital signatures (such as Schnorr signature, DSS signature, Hess signature and some famous signatures) have a hash function in the algorithm implementation, and the hash function is irreversible, which means that the password Reverse firewall technology is difficult to implement on most digital signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity-based digital signature password reverse firewall method
  • Identity-based digital signature password reverse firewall method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0038] In 1985, Shamir proposed identity-based encryption (IBE) for the first time, but he did not find an effective and convenient method. Boneh.Dan's follow-up work and identity-based encryption have been successfully implemented and successfully ported to various areas of cryptography, such as identity-based signatures (IBS). The IBS system consists of four parts (Setup, Extract, Sign, Verify). The present invention adopts Paterson and Schuldt in 2006 [Efficient Identity-Based Signatures Secure in the Standard Model. In: Batten L.M., Safavi-Naini R. (eds) Information Security and Privacy. ACISP 2006. LNCS, vol 4058. Springer, Berlin, Heidelberg ], and successfully demonstrated that it satisfies the three basic requirements of a cryp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based digital signature password reverse firewall method, and belongs to the technical field of information security. The method comprises the following steps: firstly, a transparent and credible password reverse firewall is set at a signature end, and related system parameters are set; the password reverse firewall re-randomizes part of the received parametersand then transmits the re-randomized parameters and other non-re-randomized parameters to the signature end; the signature end carries out signature to obtain a signature result sigma = (V, Ru, Rm), the rear two parts of the signature result are reset through the password reverse firewall of the signature end, and then the partially reset signature result is transmitted to a verification end; andthe verification end verifies the legality of the received signature result, if the signature result passes the verification, 'acceptance' is output, and otherwise, 'rejection' is output. According tothe identity-based digital signature password reverse firewall method, transparency and credibility are realized, leakage is prevented, the safety of a user is improved, and the attack behavior of aninternal attacker is particularly protected.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a reverse firewall method suitable for identity-based signature passwords. Background technique [0002] The password reverse firewall technology appeared after the Snowden Prism incident in 2014, aiming at how to ensure that the information transmitted by users is not leaked under the monitoring and backdoor control of "big brothers". It is a new technology that assumes that the computer used by the user is fully compromised, but how to ensure that the information he transmits will not be leaked. The fundamental difference is that the attacks considered before are all external adversaries, but many facts in real life have proved that various encryption software and other security-related things have backdoors. If there are internal attackers, how should people solve this problem. [0003] After the Snowden incident, more and more people pay more attention to the pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L29/06
CPCH04L9/0869H04L9/3236H04L9/3247H04L63/02
Inventor 李发根欧阳梦迪智妍妍胡哲彬
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products