State digital signature method and system based on symmetric cryptography
A technology of digital signature and symmetric cryptography, which is applied in the direction of digital data protection, etc., can solve the problem of large signature length and achieve the effects of short signature length, reduced signature length, and fast signature and verification speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] In this embodiment, on the basis of Katz, Kolesnikov and Wang's preprocessing "MPC-in-the-head technology (KKW), combined with the characteristics of the block cipher structure, the block cipher circuit is decomposed into the first block cipher circuit and the second block cipher circuit. Two parts of the cipher circuit; define the block cipher F(x)=f 2 f 1 (x)=f 2 (y 1 )=y, where the first block cipher circuit f 1 (x)=y 1 , let C denote the circuit corresponding to F, the second block cipher circuit C (2) means f 2 Corresponding circuit, f 2 Corresponding circuit C (2) The scale is significantly smaller than C; after the first signature is completed, subsequent signatures are based on the status of the first signature, combined with random mask multiplexing technology, for C (2) Apply zero-knowledge proof without revealing any information about x, y 1 information, convince the verifier that the prover does know x, and ensure that f 2 Knowledge can be extracte...
Embodiment 2
[0050] This embodiment provides a state digital signature system based on symmetric cryptography, which applies the state digital signature method based on symmetric cryptography in Embodiment 1, including a preprocessing module, a certification module and a conversion module:
[0051] The preprocessing module is configured to: preprocess the first signature to obtain a block cipher circuit; decompose the block cipher circuit into a first block cipher circuit and a second block cipher circuit;
[0052] The proof module is configured to: apply a zero-knowledge proof to the second block cipher circuit in the preprocessing module based on the first signature state for subsequent signatures and in combination with random mask multiplexing technology;
[0053] The conversion module is configured to: use the Fiat-Shamir conversion technology to convert the zero-knowledge proof of the second block cipher circuit in the proof module.
Embodiment 3
[0055] This embodiment provides an electronic device, including a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the program, it implements the symmetric encryption-based The state digital signature method.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


