Password reverse firewall method suitable for digital signature

A digital signature and firewall technology, applied in the field of information security, can solve the problems of difficult implementation of password reverse firewall technology and high requirements for re-randomization, and achieve the effects of enhancing security, protecting privacy and improving security.

Active Publication Date: 2020-07-10
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Although the password reverse firewall is more convenient and simpler than the previous technology, and it does not need to analyze the internal algorithm to experiment with the internal random number, but the password reverse firewall has certain limitations, and its requirements for re-randomization are relatively high
Because the requirem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password reverse firewall method suitable for digital signature
  • Password reverse firewall method suitable for digital signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0034] The invention is a cryptographic reverse firewall method suitable for digital signatures, comprising:

[0035] Due to the existence of hash functions in the algorithm implementation of most digital signatures (such as Schnorr signatures, DSS signatures, Hess signatures, etc.), and the irreversible nature of hash functions, the requirement of re-randomization cannot be realized. What the present invention uses is a kind of special signature, and this signature is Waters B in 2005 [Efficient Identity-Based Encryption Without Random Oracles.In: Cramer R. (eds) Advances in Cryptology–EUROCRYPT 2005.LNCS, vol 3494.Springer , Berlin, Heidelberg] in a signature proposed by the signer using Instead of the original H(ID) to represent th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password reverse firewall method suitable for a digital signature, and belongs to the technical field of information security. The method comprises the following steps: firstly, setting a transparent and credible password reverse firewall at a signature party, and setting related system parameters; when the password reverse firewall receives the parameters, resetting partof the parameters and then forwarding to the signature party; the signature party signing the message based on the received parameters to obtain a signature result and transmitting the signature result to a password reverse firewall of the signature party, and the password reverse firewall resetting part of sub-signatures in the signature result and then transmitting the sub-signatures to the verification party; and the verification party carrying out verification processing on the received signature, verifying a legal signature about the message, outputting acceptance if the verification ispassed, and outputting rejection if the verification is not passed. The arrangement of the password reverse firewall meets three basic requirements of the password reverse firewall, transparency and credibility are achieved, leakage is prevented, the safety of a user is improved, and the attack behavior of an internal attacker is particularly protected.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a cryptographic reverse firewall method suitable for digital signatures. Background technique [0002] The password reverse firewall technology appeared after the Snowden Prism incident in 2014. It is aimed at monitoring internal attackers and under the control of security software backdoors, how to ensure that the information transmitted by users is not leaked. It is a new technology that assumes that the computer used by the user is compromised, but how to ensure that the information he transmits will not be leaked. The fundamental difference is that the attacks considered before are all external adversaries, while the cryptographic reverse firewall technology mainly solves internal problems. Because many facts in real life have proved that various encryption software and other security-related things have backdoors, and the existence of internal attackers is cert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L9/08H04L9/06H04L29/06
CPCH04L9/3247H04L9/0825H04L9/0643H04L63/02
Inventor 李发根欧阳梦迪智妍妍胡哲彬
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products