Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Cryptographic Reverse Firewall Applicable to Digital Signature

A digital signature and firewall technology, which is applied in the field of information security, can solve the problems of difficult implementation of password reverse firewall technology and high requirements for re-randomization, and achieve the effects of enhancing security, protecting privacy, and improving security

Active Publication Date: 2022-06-03
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Although the password reverse firewall is more convenient and simpler than the previous technology, and it does not need to analyze the internal algorithm to experiment with the internal random number, but the password reverse firewall has certain limitations, and its requirements for re-randomization are relatively high
Because the requirement of re-randomization exists, and most digital signatures (such as Schnorr signature, DSS signature, Hess signature and some famous signatures) have a hash function in the algorithm implementation, and the hash function is irreversible, which means that the password Reverse firewall technology is difficult to implement on most digital signatures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Cryptographic Reverse Firewall Applicable to Digital Signature
  • A Cryptographic Reverse Firewall Applicable to Digital Signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the implementation methods and accompanying drawings.

[0034] The invention is a cryptographic reverse firewall method suitable for digital signatures, comprising:

[0035] Due to the existence of hash functions in the algorithm implementation of most digital signatures (such as Schnorr signatures, DSS signatures, Hess signatures, etc.), and the irreversible nature of hash functions, the requirement of re-randomization cannot be realized. What the present invention uses is a kind of special signature, and this signature is Waters B in 2005 [Efficient Identity-Based Encryption Without Random Oracles.In: Cramer R. (eds) Advances in Cryptology–EUROCRYPT 2005.LNCS, vol 3494.Springer , Berlin, Heidelberg] in a signature proposed by the signer using Instead of the original H(ID) to represent th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cryptographic reverse firewall method suitable for digital signatures, and belongs to the technical field of information security. This book first sets up a transparent and credible password reverse firewall on the signer and sets relevant system parameters; when the password reverse firewall receives the parameters, it resets some of the parameters and then forwards them to the signer; the signer based on the parameters received Sign the message to obtain the signature result and pass it to the password reverse firewall of the signer, and the password reverse firewall resets part of the sub-signatures in the signature result and then passes it to the verifier; the verifier verifies the received signature, Verify the legal signature of the message, if the verification is passed, output "accept", otherwise output "reject". The setting of the password reverse firewall of the present invention meets the three basic requirements of the password reverse firewall, achieves transparency and credibility, prevents leakage, improves user security, and especially protects internal attackers from attacking behavior.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a cryptographic reverse firewall method suitable for digital signatures. Background technique [0002] The password reverse firewall technology appeared after the Snowden Prism incident in 2014. It is aimed at monitoring internal attackers and under the control of security software backdoors, how to ensure that the information transmitted by users is not leaked. It is a new technology that assumes that the computer used by the user is compromised, but how to ensure that the information he transmits will not be leaked. The fundamental difference is that the attacks considered before are all external adversaries, while the cryptographic reverse firewall technology mainly solves internal problems. Because many facts in real life have proved that various encryption software and other security-related things have backdoors, and the existence of internal attackers is cert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/06H04L9/40
CPCH04L9/3247H04L9/0825H04L9/0643H04L63/02
Inventor 李发根欧阳梦迪智妍妍胡哲彬
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products