Secure bidirectional heterogeneous digital signature method between PKI and IBC

A digital signature, heterogeneous technology, applied in digital transmission systems, secure communication devices, user identity/authority verification, etc., can solve problems such as being unable to meet user communication requirements.

Active Publication Date: 2020-06-26
SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Before 2010, users communicated based on the same cryptographic system, based on the public key infrastructure environment, or based on the identity environment, or based on the non-certificate environment, but the communication parties all over the world use different cryptographic systems, so only in one environment Medium communication, can no longer meet the user's communication requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure bidirectional heterogeneous digital signature method between PKI and IBC
  • Secure bidirectional heterogeneous digital signature method between PKI and IBC
  • Secure bidirectional heterogeneous digital signature method between PKI and IBC

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0114] The first embodiment is: if the user in the public key infrastructure environment is the signer, the user in the identity-based encryption environment is the verifier;

[0115] The second embodiment is: if the user in the identity-based encryption environment is the signer, the user in the public key infrastructure environment is the verifier.

[0116] The specific steps of the first embodiment involved in the present invention are:

[0117] Step 1: The private key generation center selects a cyclic addition group and a cyclic multiplication group whose order is a prime number to generate a bilinear pair, defines two collision-free hash functions, and randomly selects a number from an integer group whose order is a prime number as the master key key and set the master public key to disclose system parameters;

[0118] The private key generation center selects a cyclic addition group and a cyclic multiplication group whose order is a prime number to generate a bilinear ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure bidirectional heterogeneous digital signature method between a PKI and an IBC. System parameters are generated through a private key generation center, and the systemparameters are disclosed; the user in the public key infrastructure environment and the user based on the identity encryption environment generate a public key and a private key respectively; whereinthe user in the public key infrastructure environment is a signer, the user based on the identity encryption environment is a verifier, the signer generates a signature and sends the signature to theverifier, and the verifier verifies the signature, passes the verification and accepts the message, otherwise, refuses to accept the message; wherein the user based on identity encryption is a signer,the user in the public key infrastructure environment is a verifier, the signer generates a signature and sends the signature to the verifier, and the verifier verifies the signature, passes the verification and accepts the message, otherwise, refuses to accept the message. According to the invention, the safety, correctness, non-repudiation and unforgeability of communication between the publickey infrastructure and the user based on the identity encryption environment are protected, and the safety and privacy requirements are met.

Description

technical field [0001] The invention belongs to the technical field of user communication security, and in particular relates to a secure two-way heterogeneous digital signature method between PKI and IBC. Background technique [0002] Public Key Infrastructure (PKI) is the main means of deploying traditional Public Key Cryptography (PKC) at present. The identity of a user is bound to a certificate, and the identity of a user and its public key are linked The binding relationship is obtained in the form of a digital certificate, which is issued to the user by a trusted certificate authority (Certificate Authority, CA). All data is signed by the certificate authority with its own private key to form a certificate. Before issuing a certificate to a user, the certificate authority first verifies the authenticity of the user's identity. Any communication party that trusts the certificate authority can establish a trust relationship with the other party by verifying the digital...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3236H04L9/3247H04L9/3263
Inventor 孟博王潇潇王德军王俊
Owner SOUTH CENTRAL UNIVERSITY FOR NATIONALITIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products