Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Quantum-computing-resistant identity-based digital signature scheme

A digital signature and quantum computing technology, which is applied in the field of information security, can solve problems such as large amount of calculation and inability to resist quantum computing, and achieve the effect of strong implementation performance, improved security, and simple calculation form

Pending Publication Date: 2022-04-12
苏州鸿链信息科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Identity-based digital signature is an important part of identity-based cryptography technology. Most of the internationally recognized identity-based digital signature algorithms are still based on traditional cryptography problems such as discrete logarithm and large integer decomposition, which require a large amount of calculation. And it is unable to resist quantum computing, so it is necessary to design a highly anti-quantum computing identity-based effective digital signature scheme

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Quantum-computing-resistant identity-based digital signature scheme
  • Quantum-computing-resistant identity-based digital signature scheme
  • Quantum-computing-resistant identity-based digital signature scheme

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The identity-based digital signature proposed by the present invention will be described below in combination with specific implementation methods.

[0074] Define A and B as protocol participants, A as the signer, B as the verifier, PKG as the trusted key generator, and generate signatures in the following four stages.

[0075] 1. System initialization

[0076] 1.1.PKG selects appropriate integers n, m and r, remembers v=n-m, and determines the finite field F=GF(2 r )structure.

[0077] 1.2. The hash function H used in the PKG determination scheme.

[0078] 1.3. PKG updates the master key, updates some parameters B, C and P of the public key mapping P k,1 ,P k,2 ,1≤k≤m (if no

[0079] Update the public key mapping P, you can skip this step):

[0080] PKG randomly selects the system master key masterKey, and performs the following operations:

[0081] dataPk=masterKey Ptimestamp

[0082] For k=1 to m

[0083] dataPk=H(dataPk,v 2 )

[0084] P k,1 =assignment(...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity-based digital signature scheme resisting quantum computing. Firstly, in a system initialization stage, a key generator PKG selects a master key which comprises a system scale, a finite field, a hash function and partial public key mapping parameters; secondly, in a private key extraction stage, the signature party A sends a request for obtaining a private key to the PKG, the PKG acts on a hash function on a master key of the PKG, identity information of the user A and a timestamp, and private key data is generated and sent to the PKG; in a signature generation stage, A determines a unique solution by means of data such as private key data, a signed message and a timestamp to obtain a signature. The A sends the signature and the timestamp to a verification party B, and the B can perform verification in a signature verification stage. The identity-based digital signature scheme is constructed by using the multivariate public key cryptography technology, has the advantages of identity data signature and the capability of resisting quantum computing attack, and is related to the PKG master key and key generation time, so that the security is further enhanced.

Description

technical field [0001] The invention relates to the field of information security, in particular to an identity-based digital signature. The bottom layer of the signature scheme uses multivariate public key cryptography technology, which has the characteristic of anti-quantum computing. Background technique [0002] Quantum computer is a kind of physical device that follows the laws of quantum mechanics to perform high-speed mathematical and logical operations, store and process quantum information. One of its most direct application fields is password deciphering. Today, the development speed of quantum computers has greatly exceeded people's imagination. In July 2018, Pan Jianwei's team at the University of Science and Technology of China realized the entanglement of 18 optical qubits for the first time in the world. The increase in the number of bits achieves an exponential improvement. Once quantum computers become a reality, existing information security systems based ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L9/32
Inventor 邱望洁吴发国袁波
Owner 苏州鸿链信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products