Digital signature and verification method, device and system

A digital signature and application system technology, which is applied in the direction of user identity/authority verification, encryption device with shift register/memory, etc., can solve the problems of high hardware requirements, low SM9 encryption efficiency, low signature efficiency, etc., and achieve improved signature Efficiency, ensuring data integrity, and achieving non-repudiation effects

Active Publication Date: 2021-04-20
中科美络科技股份有限公司
View PDF9 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the prior art, the hash algorithm is used to hash the plaintext and the logo to obtain the summary information, and then the signature certificate is used to sign the obtained summary information. In essence, the asymmetric encryption algorithm is still used for signing, but the SM9 encryption efficiency is low. , has high requirements on hardware, therefore, the existing technology has the technical problem of low signature efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital signature and verification method, device and system
  • Digital signature and verification method, device and system
  • Digital signature and verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] The invention is applied to a digital signature and verification system, and the system includes: a user end, an application system and an encryption machine, wherein the user end communicates with the application system remotely; the application system and the encryption machine are deployed on the same side, and the two realize short-distance confidential communication.

[0065] figure 1 A schematic flow diagram of a digital signature method provided by an embodiment of the present invention, such as figure 1 As shown, a digital signature method is applied to a client, and the client has an SM9 private key in advance, and the method includes:

[0066] S101: Obtain a dynamic identifier of the client, use the combination of the SM9 private key and the dynamic identifier as input, and use the SM3 algorithm to obtain a first hash result.

[0067] Exemplarily, a dynamically generated random number may be used as the dynamic identifier, and the length of the random number ...

Embodiment 2

[0087] figure 2 A schematic flow diagram of a digital signature verification method provided by an embodiment of the present invention, such as figure 2 As shown, Embodiment 2 of the present invention is implemented based on Embodiment 1. Embodiment 2 of the present invention is applied to an application system, and the method includes:

[0088] S201: Receive the encrypted signature, ciphertext, dynamic identification, user information and time stamp sent by the client, and send the ciphertext, user information and time stamp to the encryption machine, so that the user information of the user end of the encryption machine can be queried The SM9 private key generates a verification signature according to the ciphertext, the SM9 private key obtained from the query and the time stamp, and sends the verification signature to the application system.

[0089] The client sends the signature of the ciphertext, that is, the second hash result; ciphertext; dynamic identification; tim...

Embodiment 3

[0101] image 3A schematic flow diagram of a digital signature verification method provided by an embodiment of the present invention, such as image 3 As shown, Embodiment 3 of the present invention is realized based on Embodiment 1 and Embodiment 2. Embodiment 3 of the present invention is applied to an encryption machine, and several user information SM9 private key pairs are preset in the encryption machine. The method include:

[0102] S301: Receive the ciphertext sent by the application system, the user information of the client, and the timestamp, query the SM9 private key obtained according to the user information, and generate a verification signature according to the ciphertext, the SM9 private key obtained from the query, and the timestamp; The signature is sent to the application system, so that the application system compares and verifies whether the signature is consistent with the encrypted signature;

[0103] S302: Receive the dynamic identification when comp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a digital signature and a verification method, device and system, and the method comprises the steps: obtaining a dynamic identification of a user side, taking the combination of an SM9 private key and the dynamic identification as an input, and obtaining a first hash result through an SM3 algorithm; taking the first hash result as a key, and encrypting the plaintext by using an SM4 algorithm to obtain a ciphertext; taking a combination of the SM9 private key, the ciphertext and the timestamp as input, obtaining a second hash result by using an SM3 algorithm, and taking the second hash result as an encrypted signature of the ciphertext; and sending the encrypted signature of the ciphertext, the ciphertext, the dynamic identifier, the user information of the user side and the timestamp to an application system, so that the application system verifies the encrypted signature of the ciphertext.

Description

technical field [0001] The invention relates to the technical field of data encryption, in particular to a digital signature and verification method, device and system. Background technique [0002] With the rapid development of Internet technology, in order to ensure security and fairness, signature verification technology is more and more applied to e-commerce transactions and document approval. [0003] The invention patent with the application number of 201410616744.6 in the prior art discloses a data signature method, a signature verification method, a data signature device and a verification server. The data signature method includes: when receiving the first signature request, extracting the signature identifier and For the data to be signed, generate the digest information of the data to be signed, and determine the target signature certificate corresponding to the signature identifier among the preset multiple signature certificates, and use the target signature cer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06
Inventor 罗健飞王明明郑建辉李勇周超
Owner 中科美络科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products