Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Agent signature method based on Mamo

A proxy signature and formula technology, applied in the field of proxy signature based on Mambo, can solve the problems of violating the concept of proxy signature and infringing on the legitimate rights and interests of proxy signers, and achieve the effect of simple verification procedure and small amount of calculation.

Pending Publication Date: 2022-04-12
JIANGSU OCEAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] Analyzing the above signature scheme, it is found that the proxy signer can sign the message to generate a proxy signature scheme, and the original signer can also sign the message to forge a proxy signature scheme; even if the signature verifier verifies the proxy signature scheme is correct, and will only think that the scheme is sent by the proxy signer. In fact, the signature scheme may also be forged by the original signer, which violates the concept of proxy signature and violates the legal rights of the proxy signer; A Proxy Signature Method Based on Mambo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent signature method based on Mamo
  • Agent signature method based on Mamo
  • Agent signature method based on Mamo

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Example: see figure 1 , the present invention provides a technical solution: a Mambo-based proxy signature method, the specific method steps are as follows:

[0040] S1: Initialization: randomly select a large prime number p, q is a large prime factor of p-1, and g is generator; A is the original signer; B is the proxy signer; C is the signature verifier; A’s private key and public key pair are (x A ,y A ), B's private key and public key pair is (x B ,y B ),and m represents the message to be signed;

[0041] S2: The process of key generation: A randomly selects an integer k, calculates r and s through formulas (W1) and (W2), and then sends (r, s) as a proxy key to B through a secure channel; the specific formula as follows:

[0042] r=g k mod p (W1)

[0043] s=(x A the y A +kr) mod q (W2);

[0044] S3: The process of verifying the proxy key: After receiving (r, s), B first verifies the equation Whether it is established, if it is established, it can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a proxy signature method based on Mamo, which comprises the following steps: A randomly selects an integer k, solves r and s through a formula, and sends (r, s) as a proxy key to B through a secure channel; after receiving the (r, s), B firstly verifies whether the equation is established or not, if so, (r, s) can be considered to be sent by A, and the commission of A can be accepted, otherwise, the commission of A can be refused to be accepted or A is required to send a copy (r, s) again; and B, after the verification equation is established, calculating a proxy public key Y by using the proxy secret key and a private key of the B, and publicizing the proxy public key Y. Calculating a hash value H (m) of the message m to be signed through a hash function; then (u, v) is solved, and (u, v) is sent to C as a proxy digital signature of the message m to be signed; after receiving (u, v) and m, the C verifies whether the equations are equal; if yes, the received signature is valid; the verification program of the proxy signature is simple; only the proxy signature needs to be verified each time, and the calculation amount is small.

Description

technical field [0001] The invention relates to the field of proxy signatures, in particular to a Mambo-based proxy signature method. Background technique [0002] Proxy signature means that the original signer entrusts his signature rights to the proxy signer, and then lets the proxy signer generate a valid signature on his behalf; this signature method is often used in the commercial field and has always been highly scientific and practical value; the existing Mambo proxy signature scheme is specifically: [0003] First assume that A is the original signer, B is the proxy signer, and C is the signature verifier. Randomly select a large prime number p, q is a large prime factor of p-1, and g is generator of . A's private key and public key pair are (x A ,y A ), B's private key and public key pair is (x B ,y B ),in The message to be signed is marked as m, and the specific process is as follows: [0004] (1) The process of proxy key generation; [0005] The or...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/64G06F21/45
Inventor 查明明廖大见金文杰丁颖唐小珂
Owner JIANGSU OCEAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products