Supercharge Your Innovation With Domain-Expert AI Agents!

Adapter signature generation method based on SM2 algorithm

An adapter and algorithm technology, applied in digital transmission systems, user identity/authority verification, secure communication devices, etc., can solve problems such as lack of adapter signatures

Pending Publication Date: 2021-09-28
WUHAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But the adapter signature based on the domestic cipher SM2 algorithm is still missing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Adapter signature generation method based on SM2 algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] First, explain the symbols and definitions involved in this embodiment.

[0023] The group of elliptic curves whose order is a prime number q, whose elements are points on the elliptic curve.

[0024] G: cyclic group A generator of .

[0025] The set of integers consisting of the integers 1, 2, ..., q-1.

[0026] mod n: modulo n operation.

[0027] H( ): cryptographic hash function

[0028] m; message value

[0029] σ: signature value

[0030] ||: bit string concatenation

[0031] The four algorithms involved in this embodiment are introduced below: a pre-signature generation algorithm, a pre-signature verification algorithm, an adaptation algorithm, and an extraction algorithm.

[0032] Suppose the security parameter λ is input, the system parameter is The signer generates its public-private key pair according to the key generation algorithm of the SM2 signature algorithm, and records its private key sk as Its public key pk is P=sP. Discrete Logarithm ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an adapter signature generation method based on an SM2 algorithm, and the method comprises the steps: sequentially carrying out pre-signature generation and pre-signature verification, and carrying out pre-signature adaptive calculation in the pre-signature verification, specifically, inputting a system parameter PP, a pre-signature value and a discrete logarithm solution y based on an adaptive algorithm, and calculating a complete signature value sigma = (r, s). The adapter signature scheme designed by the invention not only has the correctness and unforgeability of the traditional signature, but also has the correctness of the pre-signature, the adaptability of the pre-signature and the extractability of evidence. Meanwhile, the method is designed for a domestic SM2 signature algorithm, and can meet the compliance requirements of autonomous and controllable domestic commercial password application.

Description

technical field [0001] The invention relates to an adapter signature generation method, in particular to an adapter signature generation method based on SM2 algorithm. Background technique [0002] AdapterSignature, also known as scriptless scripts, has recently become an important tool to solve the scalability and interoperability problems of blockchain applications such as cryptocurrencies. Adapter signatures are an extension to traditional digital signatures that encode a cryptographically hard problem in a signed value. At the same time, it has the following three properties: 1) The complete signature can only be generated by users who know the solution to the difficult problem; 2) The signature value will reveal the solution to the difficult problem; 3) The complete signature can be verified by a standard verification algorithm. Based on these characteristics, adapter signatures have been widely used in various blockchain applications, such as payment channel networks,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3252H04L9/3218
Inventor 何德彪彭聪罗敏刘丽群崔晓晖黄欣沂
Owner WUHAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More