Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Proxy digital signature method based on elliptic curve

An elliptic curve and digital signature technology, applied in digital data authentication, digital data protection, electronic digital data processing, etc., can solve the non-repudiation of abolishing the signature power of the proxy signer B, failing to obtain the original signer, and not meeting the signature requirements Sex and other issues, to achieve the effect of simple verification procedures

Pending Publication Date: 2021-12-28
JIANGSU OCEAN UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] In this scheme, no one can obtain the private key of the original signer A, which can be guaranteed according to the elliptic curve discrete logarithm problem; in this scheme, the original signer A can abolish the proxy signer B by declaring Q0 invalid The signature power of -1 (m+rσ)mod n does not contain the private key of the proxy signer B, B can deny the signature, which does not meet the non-repudiation required by the signature; for this purpose, a proxy digital signature method based on elliptic curve is provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Proxy digital signature method based on elliptic curve
  • Proxy digital signature method based on elliptic curve
  • Proxy digital signature method based on elliptic curve

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0049] Example: see figure 1 , the present invention provides a technical solution: a proxy digital signature method based on elliptic curve, the specific method steps are as follows:

[0050] S1: initialization process; A represents the original signer; B represents the proxy signer; C represents the proxy signature verifier;

[0051] S11: Let E be built on a finite field F q An elliptic curve on P ∈ E and the order of point P is n;

[0052] S12: A randomly selects a positive integer k A , 0A A =k A P;

[0053] S13: B randomly selects a positive integer k B , 0B B =k B P;

[0054] S14: Public coefficient parameters {E, n, P, P A , P B};

[0055] S2: Entrustment process; A pairs entrusted information m A Do the following:

[0056] S21: A randomly selects k 1 , 01 A =k 1 P=(x A ,y A );

[0057] S22: Calculate r A ≡x A mod n, e 1 =h(m A ,r A ), s A ≡ e 1 k A +k 1 (mod n);

[0058] S23: Will (m A ,Y A ,s A ) to B, (Y A ,s A ) is to A to m A The s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy digital signature method based on an elliptic curve. The method specifically comprises the following steps: S1, an initialization process; S2, a delegation process; S3, a proxy key generation process; and S4, a verification process of the proxy secret key. In the proxy signature scheme of the invention, the proxy signature contains a private key kB of the B, any other person cannot pretend to be the B because of not knowing the private key kB, and the B cannot repudiate the signature; and an authorization parameter sA is equivalent to e1kA+k1(modn) comprises a private key kA of an original signer, and only B authorized by A can generate an effective proxy signature. The method is suitable for temporary and short-term agent authorization; the method is suitable for the condition that different persons are verified each time; the verification program is simple; and in the method, other people cannot pretend, and different roles in the scheme cannot pretend to each other.

Description

technical field [0001] The invention relates to the field of proxy signatures, in particular to a proxy digital signature method based on elliptic curves. Background technique [0002] In the context of the rapid development of the Internet, the degree of social informatization is getting higher and higher. The communication between people is becoming more and more international, and mankind has really entered the "information age". The information on the Internet is chaotic and complicated, and there are potential risk factors such as counterfeiting or tampering. We must pay more attention to and improve the electronic signature system to maintain online information security. Proxy signature is a special digital signature. In this special digital signature system, there must be two subjects: the original signer and the proxy signer. The original signer transmits the information to a third party (the proxy signer), who creates a proxy signature based on various public para...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/45G06F7/72
CPCG06F21/64G06F21/45G06F7/722
Inventor 廖大见查明明封宇谦丁颖金文杰
Owner JIANGSU OCEAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products