Unlock instant, AI-driven research and patent intelligence for your innovation.

State digital signature method and system based on symmetric cryptography

A technology of digital signature and symmetric cryptography, which is applied in the direction of digital data protection, etc., can solve the problem of large signature length and achieve the effects of short signature length, reduced signature length, and fast signature and verification speed

Active Publication Date: 2021-11-02
SHANDONG UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, compared with digital signatures based on lattice difficulty problems, digital signatures based on symmetric ciphers still have the problem of larger signature lengths

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • State digital signature method and system based on symmetric cryptography
  • State digital signature method and system based on symmetric cryptography
  • State digital signature method and system based on symmetric cryptography

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] In this embodiment, on the basis of Katz, Kolesnikov and Wang's preprocessing "MPC-in-the-head technology (KKW), combined with the characteristics of the block cipher structure, the block cipher circuit is decomposed into the first block cipher circuit and the second block cipher circuit. Two parts of the cipher circuit; define the block cipher F(x)=f 2 f 1 (x)=f 2 (y 1 )=y, where the first block cipher circuit f 1 (x)=y 1 , let C denote the circuit corresponding to F, the second block cipher circuit C (2) means f 2 Corresponding circuit, f 2 Corresponding circuit C (2) The scale is significantly smaller than C; after the first signature is completed, subsequent signatures are based on the status of the first signature, combined with random mask multiplexing technology, for C (2) Apply zero-knowledge proof without revealing any information about x, y 1 information, convince the verifier that the prover does know x, and ensure that f 2 Knowledge can be extracte...

Embodiment 2

[0050] This embodiment provides a state digital signature system based on symmetric cryptography, which applies the state digital signature method based on symmetric cryptography in Embodiment 1, including a preprocessing module, a certification module and a conversion module:

[0051] The preprocessing module is configured to: preprocess the first signature to obtain a block cipher circuit; decompose the block cipher circuit into a first block cipher circuit and a second block cipher circuit;

[0052] The proof module is configured to: apply a zero-knowledge proof to the second block cipher circuit in the preprocessing module based on the first signature state for subsequent signatures and in combination with random mask multiplexing technology;

[0053] The conversion module is configured to: use the Fiat-Shamir conversion technology to convert the zero-knowledge proof of the second block cipher circuit in the proof module.

Embodiment 3

[0055] This embodiment provides an electronic device, including a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the program, it implements the symmetric encryption-based The state digital signature method.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a state digital signature method and system based on symmetric cryptography, and the method comprises the following steps: S01, obtaining a block cipher circuit and a first signature message, carrying out the preprocessing, and completing the first signature; S02, decomposing the block cipher circuit into a first block cipher circuit and a second block cipher circuit; S03, applying zero-knowledge proof to the second block cipher circuit in the step S02 based on the first signature state of the subsequent signature and by combining a random mask multiplexing technology; S04, converting the second block cipher circuit zero-knowledge proof in the step S03 by using a Fiat-Shamir conversion technology in combination with the signature message, and generating a signature; S05, repeating the steps S03-S04 for subsequent signature messages, and sequentially generating subsequent signatures. According to the invention, under the scene that a signer and a verifier have multiple signature demands, the signature length can be significantly reduced, and the performance of multiple signature and verification is improved.

Description

technical field [0001] The disclosure belongs to the technical field of cyberspace security, and in particular relates to a state digital signature method and system based on symmetric cryptography. Background technique [0002] Digital signature is one of the key technologies to ensure the security of cyberspace. It is used to identify the authenticity and integrity of data. It is unforgeable, non-repudiable, and transferable. It is widely used in finance, government affairs, education, medical care and other fields. However, with the rapid development of quantum computer technology research, the security of widely used digital signature schemes is threatened by quantum computing. In order to defend against the possible attacks of quantum computing in the future, the United States, the European Union, etc. have launched a research program on a new generation of cryptographic algorithms that are capable of resisting quantum computer attacks, including digital signature schem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64
CPCG06F21/64Y02D30/50
Inventor 张涵东李劲松魏普文刘国霄
Owner SHANDONG UNIV